Cargando…

Deceptive Techniques to Hide a Compressed Video Stream for Information Security

With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transm...

Descripción completa

Detalles Bibliográficos
Autores principales: Heo, Jeonghwan, Jeong, Jechang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8587723/
https://www.ncbi.nlm.nih.gov/pubmed/34770505
http://dx.doi.org/10.3390/s21217200
_version_ 1784598229390721024
author Heo, Jeonghwan
Jeong, Jechang
author_facet Heo, Jeonghwan
Jeong, Jechang
author_sort Heo, Jeonghwan
collection PubMed
description With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video.
format Online
Article
Text
id pubmed-8587723
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-85877232021-11-13 Deceptive Techniques to Hide a Compressed Video Stream for Information Security Heo, Jeonghwan Jeong, Jechang Sensors (Basel) Article With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video. MDPI 2021-10-29 /pmc/articles/PMC8587723/ /pubmed/34770505 http://dx.doi.org/10.3390/s21217200 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Heo, Jeonghwan
Jeong, Jechang
Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title_full Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title_fullStr Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title_full_unstemmed Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title_short Deceptive Techniques to Hide a Compressed Video Stream for Information Security
title_sort deceptive techniques to hide a compressed video stream for information security
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8587723/
https://www.ncbi.nlm.nih.gov/pubmed/34770505
http://dx.doi.org/10.3390/s21217200
work_keys_str_mv AT heojeonghwan deceptivetechniquestohideacompressedvideostreamforinformationsecurity
AT jeongjechang deceptivetechniquestohideacompressedvideostreamforinformationsecurity