Skip to main content

Steganography in a Video Conferencing System

  • Conference paper
  • First Online:
Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

We describe a steganographic system which embeds secret messages into a video stream.We examine the signal path which typically includes discrete cosine transformation (DCT) based, lossy compression. Result is the technical realisation of a steganographic algorithm whose security is established by indeterminism within the signal path.

This work is sponsored by the German Federal Ministry of Education, Science, Research and Technology (BMBF).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ingemar J. Cox, Joe Kilian, Tom Leighton, Tatal Shamoon, A Secure, Robust Watermark for Multimedia, In: Proceedings: Information Hiding. Workshop, Cambridge, U.K., May/June, 1996, LNCS 1174.

    Google Scholar 

  2. Elke Franz, Anja Jerichow, Steffen Möller, Andreas Pfitzmann, Ingo Stierand: Computer Based Steganography. In: Proceedings: Information Hiding. Workshop, Cambridge, U.K., May/June, 1996, LNCS 1174.

    Google Scholar 

  3. Andy C. Hung, PVRG-P64 Codec 1.1, Stanford University, 1993

    Google Scholar 

  4. Neil F. Johnson, Steganography, George Mason University, 1996

    Google Scholar 

  5. Marit Köhntopp, Steganographie als Verschlüsselungstechnik, iX 4/1996

    Google Scholar 

  6. Birgit Pfitzmann: Information Hiding Terminology. In: Proceedings: Information Hiding. Workshop, Cambridge, U.K., May/June, 1996, LNCS.

    Google Scholar 

  7. Robert Tinsley, Steganography and JPEG Compression, Final Year Project Report, University of Warwick, 1996

    Google Scholar 

  8. ftp://ftp.idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip

  9. ftp://ftp.funet.fi/pub/crypt/steganography/

  10. http://www.rugeley.demon.co.uk/security/hdsk50.zip

  11. http://www.rugeley.demon.co.uk/security/

  12. ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/cypherpunks/steganography/MandelSteg1.0.tar.gz

  13. http://ftp.giga.or.at/pub/hacker/stego/texto_os2.zip

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Westfeld, A., Wolf, G. (1998). Steganography in a Video Conferencing System. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics