Advertisement

Steganography in a Video Conferencing System

  • Andreas Westfeld
  • Gritta Wolf
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Abstract

We describe a steganographic system which embeds secret messages into a video stream.We examine the signal path which typically includes discrete cosine transformation (DCT) based, lossy compression. Result is the technical realisation of a steganographic algorithm whose security is established by indeterminism within the signal path.

Keywords

Discrete Cosine Transformation Signal Path Secret Message Information Hiding Video Conference 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ingemar J. Cox, Joe Kilian, Tom Leighton, Tatal Shamoon, A Secure, Robust Watermark for Multimedia, In: Proceedings: Information Hiding. Workshop, Cambridge, U.K., May/June, 1996, LNCS 1174.Google Scholar
  2. 2.
    Elke Franz, Anja Jerichow, Steffen Möller, Andreas Pfitzmann, Ingo Stierand: Computer Based Steganography. In: Proceedings: Information Hiding. Workshop, Cambridge, U.K., May/June, 1996, LNCS 1174.Google Scholar
  3. 4.
    Andy C. Hung, PVRG-P64 Codec 1.1, Stanford University, 1993Google Scholar
  4. 5.
    Neil F. Johnson, Steganography, George Mason University, 1996Google Scholar
  5. 6.
    Marit Köhntopp, Steganographie als Verschlüsselungstechnik, iX 4/1996Google Scholar
  6. 7.
    Birgit Pfitzmann: Information Hiding Terminology. In: Proceedings: Information Hiding. Workshop, Cambridge, U.K., May/June, 1996, LNCS.Google Scholar
  7. 8.
    Robert Tinsley, Steganography and JPEG Compression, Final Year Project Report, University of Warwick, 1996Google Scholar
  8. 9.
  9. 10.
  10. 11.
  11. 12.
  12. 13.
  13. 14.

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Andreas Westfeld
    • 1
  • Gritta Wolf
    • 2
  1. 1.Institute for Theoretical Computer ScienceDresden University of TechnologyDresdenGermany
  2. 2.Institute for Operating Systems, Databases and Computer NetworksDresden University of TechnologyDresdenGermany

Personalised recommendations