Cargando…
Deceptive Techniques to Hide a Compressed Video Stream for Information Security
With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transm...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8587723/ https://www.ncbi.nlm.nih.gov/pubmed/34770505 http://dx.doi.org/10.3390/s21217200 |
_version_ | 1784598229390721024 |
---|---|
author | Heo, Jeonghwan Jeong, Jechang |
author_facet | Heo, Jeonghwan Jeong, Jechang |
author_sort | Heo, Jeonghwan |
collection | PubMed |
description | With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video. |
format | Online Article Text |
id | pubmed-8587723 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-85877232021-11-13 Deceptive Techniques to Hide a Compressed Video Stream for Information Security Heo, Jeonghwan Jeong, Jechang Sensors (Basel) Article With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video. MDPI 2021-10-29 /pmc/articles/PMC8587723/ /pubmed/34770505 http://dx.doi.org/10.3390/s21217200 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Heo, Jeonghwan Jeong, Jechang Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title | Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title_full | Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title_fullStr | Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title_full_unstemmed | Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title_short | Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title_sort | deceptive techniques to hide a compressed video stream for information security |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8587723/ https://www.ncbi.nlm.nih.gov/pubmed/34770505 http://dx.doi.org/10.3390/s21217200 |
work_keys_str_mv | AT heojeonghwan deceptivetechniquestohideacompressedvideostreamforinformationsecurity AT jeongjechang deceptivetechniquestohideacompressedvideostreamforinformationsecurity |