Deceptive Techniques to Hide a Compressed Video Stream for Information Security

With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transm...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Jeonghwan Heo, Jechang Jeong
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
Acceso en línea:https://doaj.org/article/6d8a58483761494f8f154857e17e6f3e
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:6d8a58483761494f8f154857e17e6f3e
record_format dspace
spelling oai:doaj.org-article:6d8a58483761494f8f154857e17e6f3e2021-11-11T19:11:06ZDeceptive Techniques to Hide a Compressed Video Stream for Information Security10.3390/s212172001424-8220https://doaj.org/article/6d8a58483761494f8f154857e17e6f3e2021-10-01T00:00:00Zhttps://www.mdpi.com/1424-8220/21/21/7200https://doaj.org/toc/1424-8220With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video.Jeonghwan HeoJechang JeongMDPI AGarticlecodecinformation securityvideo encryptiondeceptive techniqueshigh efficiency video codingH.264/AVCChemical technologyTP1-1185ENSensors, Vol 21, Iss 7200, p 7200 (2021)
institution DOAJ
collection DOAJ
language EN
topic codec
information security
video encryption
deceptive techniques
high efficiency video coding
H.264/AVC
Chemical technology
TP1-1185
spellingShingle codec
information security
video encryption
deceptive techniques
high efficiency video coding
H.264/AVC
Chemical technology
TP1-1185
Jeonghwan Heo
Jechang Jeong
Deceptive Techniques to Hide a Compressed Video Stream for Information Security
description With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video.
format article
author Jeonghwan Heo
Jechang Jeong
author_facet Jeonghwan Heo
Jechang Jeong
author_sort Jeonghwan Heo
title Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title_short Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title_full Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title_fullStr Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title_full_unstemmed Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title_sort deceptive techniques to hide a compressed video stream for information security
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/6d8a58483761494f8f154857e17e6f3e
work_keys_str_mv AT jeonghwanheo deceptivetechniquestohideacompressedvideostreamforinformationsecurity
AT jechangjeong deceptivetechniquestohideacompressedvideostreamforinformationsecurity
_version_ 1718431589796413440