Skip to main content

The Use of Steganography to Control Multimedia Players

  • Conference paper
  • First Online:
Information and Software Technologies (ICIST 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 538))

Included in the following conference series:

  • 1010 Accesses

Abstract

Addition of automatic control to a multimedia player is desirable. It allows a user to save his/her preferences inside the multimedia content. It also gives the possibility of reducing the media size or delete a chosen part of the recording. Moreover, this solution allows to steer multimedia players during stream transmission. This kind of control is achievable with the use of steganography. Transparent markers are added to an audio track. Each marker can code a group of orders. Orders are used to control the multimedia content flow and its parameters. Markers have a certain structure allowing to keep multiple orders together with their parameters. Each marker is precisely set in time and has enough capacity to keep 256 various orders or their groups. The least significant bit method was used to insert markers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Badura, S., Rymaszewski, S.: Transform domain steganography in DVD video and audio content. In: 2007 IEEE International Workshop on Imaging Systems and Techniques Book Series: IEEE International Workshop on Imaging Systems and Techniques, pp. 195–199 (2007)

    Google Scholar 

  2. Cvejic, N.: Algorithms for Audio Watermarking and Steganography. Oulu University Press, Oulu (2004)

    MATH  Google Scholar 

  3. Djebbar, F., Ayad, B., Meraim, K.: Comparative study of digital audio steganography techniques. Eurasip J. Audio Speech Music Process. 2012, 1–16 (2012) (Article Number: 25)

    Google Scholar 

  4. Gomez-Coronel, S., Escalante-Ramirez, B., Acevedo-Mosqueda, M., et al.: Steganography in audio files by hermite transform. Appl. Math. Inf. Sci. 8(3), 959–966 (2014)

    Article  Google Scholar 

  5. Koziel, G.: Fourier transform based methods in sound steganography. Actual Probl. Econ. 120(6), 321–328 (2011). ISSN 1993-6788

    Google Scholar 

  6. Koziel, G.: Increasing steganographic capacity of the MF method. Actual Probl. Econ. 6(132), 367–373 (2012). ISSN 1993-6788

    Google Scholar 

  7. Koziel, G.: Steganography usage to control multimedia stream. Adv. Sci. Technol. 8(21), 5–8 (2014). doi:10.12913/22998624.1091870

    Article  Google Scholar 

  8. Kumar, H., Anuradha: Enhanced LSB technique for audio steganography. In: 2012 Third International Conference on Computing Communication and Networking Technologies (ICCCNT), Book Series: International Conference on Computing Communication and Network Technologies (2012)

    Google Scholar 

  9. Lach, J.:. SBFS – steganography based file system. In: Proceedings of the 2008 1st International Conference on Information Technology, pp. 171–174 (2008)

    Google Scholar 

  10. Lipinski, P.: Watermarking software in practical applications. Bull. Pol. Acad. Sci. Tech. Sci. 59(1), 21–25 (2011)

    Google Scholar 

  11. Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol. 5332, pp. 1001–1018. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Shine, K.P., Krishna Kumar, S.: Extended bipolar echo kernel for audio watermarking. In: International Conference on Advances in Recent Technologies in Communication and Computing, IEEE Computer Society 2009, pp. 487–489 (2009)

    Google Scholar 

  13. Shirali-Shahreza, S., Sharif, M.: Adaptive wavelet domain audio steganography with high capacity and low error rate. In: Information and Emerging Technologies, ICIET 2007 (2007). doi:10.1109/ICIET.2007.4381305

  14. Srivastava, M., Rafiq, M.: Novel approach to secure communication using audio steganography. In: Mems, Nano and Smart Systems, PTS 1-6, Book Series: Advanced Materials Research, vol. 403–408, pp. 963-969 (2012)

    Google Scholar 

  15. Zielinska, E., Mazurczyk, W., Szczypiorski, K.: Trends in steganography. Commun. ACM 57(3), 86–95 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Grzegorz Koziel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Koziel, G., Milosz, M. (2015). The Use of Steganography to Control Multimedia Players. In: Dregvaite, G., Damasevicius, R. (eds) Information and Software Technologies. ICIST 2015. Communications in Computer and Information Science, vol 538. Springer, Cham. https://doi.org/10.1007/978-3-319-24770-0_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24770-0_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24769-4

  • Online ISBN: 978-3-319-24770-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics