Abstract | ||
---|---|---|
OpenPuff is recognised as one of the leading tools in video steganography for its capability to securely hide information. This is in contrast to a number of video steganography tools that apply outdated and highly insecure techniques such as EOF data injection. However, even OpenPuff has subtle vulnerabilities that can be easily exploited. In this paper we propose a method to detect the presence of OpenPuff video steganography across MP4 files. By exploiting modifications to a files' metadata, we successfully identify the existence of hidden content. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1016/j.diin.2015.02.002 | Digital Investigation |
Keywords | Field | DocType |
Steganography,Steganalysis,Video,OpenPuff,MP4,Atom | Metadata,Steganography,Steganography tools,Computer security,Computer science,FLAGS register,Concatenation,Steganalysis | Journal |
Volume | Issue | ISSN |
13 | C | 1742-2876 |
Citations | PageRank | References |
2 | 0.44 | 2 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Thomas Sloan | 1 | 2 | 0.78 |
Julio C. Hernandez-Castro | 2 | 298 | 26.88 |