A Survey of different video steganography approaches against man-in-the middle attacks

V. Annapurna, S. Nagaraja Rao, M. N. Giriprasad
{"title":"A Survey of different video steganography approaches against man-in-the middle attacks","authors":"V. Annapurna, S. Nagaraja Rao, M. N. Giriprasad","doi":"10.1109/I-SMAC52330.2021.9640974","DOIUrl":null,"url":null,"abstract":"Steganography is necessary to encrypt data efficiently between different organizations. Steganography can have significant use in transmitting secret data through videos. However, this is susceptible to third party attacks such as video change, copyright change, security update changes etc. Numerous cryptographic algorithms have been proposed to be incorporated into data hiding techniques. As the number of sensitive data required is large, these models require powerful computer memory and high processing cycles to process. In that case, these cryptographic models could not be applied to large video data for integrity computation and encryption. In this paper, different video steganography approaches and their limitations are studied on the video databases.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SMAC52330.2021.9640974","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Steganography is necessary to encrypt data efficiently between different organizations. Steganography can have significant use in transmitting secret data through videos. However, this is susceptible to third party attacks such as video change, copyright change, security update changes etc. Numerous cryptographic algorithms have been proposed to be incorporated into data hiding techniques. As the number of sensitive data required is large, these models require powerful computer memory and high processing cycles to process. In that case, these cryptographic models could not be applied to large video data for integrity computation and encryption. In this paper, different video steganography approaches and their limitations are studied on the video databases.
针对中间人攻击的不同视频隐写方法综述
隐写术对不同组织之间的数据进行有效加密是必要的。隐写术在通过视频传输机密数据方面具有重要的用途。然而,这很容易受到第三方攻击,如视频更改,版权更改,安全更新更改等。许多加密算法已被提出纳入数据隐藏技术。由于需要大量的敏感数据,这些模型需要强大的计算机内存和高处理周期来处理。在这种情况下,这些加密模型无法应用于大型视频数据进行完整性计算和加密。本文研究了不同的视频隐写方法及其在视频数据库中的局限性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信