Hiding Data in Video File: An Overview

The aim of this review is to study the methods of steganography using the video file as a cover carrier. The steganography is the art of protecting the information through embedding data in medium carrier, for instants this study illustrate historically this art, as well as the study describes methods as a review for this art in the video file. The video based steganography can be used as one video file, separated images in frames or images and audio files. Since that, the use of the video based steganography can be more eligible than other multimedia files. As a result of this study, the video based steganography has been discussed and the advantages of using the video file as a cover carrier for steganography have been proposed.

[1]  R. Yando,et al.  Adolescent depressed mood and parental unhappiness. , 1996, Adolescence.

[2]  Laiha Binti Mat Kiah,et al.  High Rate Video Streaming Steganography , 2009, 2009 International Conference on Information Management and Engineering.

[3]  Borko Furht,et al.  New approaches to encryption and steganography for digital videos , 2007, Multimedia Systems.

[4]  Ben J. Atchison,et al.  Developmental trauma disorder , 2011 .

[5]  Lili Wang,et al.  A new video steganalysis based on mode detection , 2008, 2008 International Conference on Audio, Language and Image Processing.

[6]  Judith A. Ashway,et al.  A therapist's pregnancy: An opportunity for conflict resolution and growth in the treatment of children , 1984 .

[7]  Adrian Angold,et al.  Traumatic events and posttraumatic stress in childhood. , 2007, Archives of general psychiatry.

[8]  J M Smith,et al.  The pregnant therapist and the seriously disturbed patient: managing long-term psychotherapeutic treatment. , 1988, Psychiatry.

[9]  Min-kyu Choi,et al.  Data Hiding in Video , 2009 .

[10]  Richard Kagan,et al.  Complex Trauma in Children and Adolescents , 2005 .

[11]  S. Guinjoan,et al.  Consequences of a male therapist disclosing the birth of his child. , 2000, The Journal of the American Academy of Psychoanalysis.

[12]  R. Goldney,et al.  The Psychiatrist's Family—A Comparative Study* , 1979, The Australian and New Zealand journal of psychiatry.

[13]  B BORNSTEIN,et al.  Emotional barriers in the understanding and treatment of young children. , 1948, The American journal of orthopsychiatry.

[14]  R. V. Frankiel The stolen child: a fantasy, a wish, a source of countertransference , 1985 .

[15]  Maddy Cunningham,et al.  Impact of trauma work on social work clinicians: empirical findings. , 2003, Social work.

[16]  J A Tinsley,et al.  Pregnancy of the early-career psychiatrist. , 2000, Psychiatric services.

[17]  H. Racker,et al.  The Meanings and Uses of Countertransference , 2007, The Psychoanalytic quarterly.

[18]  Russell M. Mersereau,et al.  Video error correction using steganography , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[19]  B. Kolk,et al.  Developmental Trauma Disorder: Toward a rational diagnosis for children with complex trauma histories. , 2005 .

[20]  Brian E. Bride,et al.  Prevalence of secondary traumatic stress among social workers. , 2007, Social work.

[21]  Holly Bell,et al.  Strengths and secondary trauma in family violence work. , 2003, Social work.

[22]  A. A. Zaidan,et al.  New Technique of Hidden Data in PE-File with in Unused Area One , 2009 .

[23]  A. A. Zaidan,et al.  A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .

[24]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[25]  Olga Marlin Parenthood in the Life of the Analyst , 1988 .

[26]  M. Shirali-Shahreza A New Method for Real-Time Steganography , 2006, 2006 8th international Conference on Signal Processing.

[27]  M Cullen-Drill,et al.  The pregnant therapist. , 2009, Perspectives in psychiatric care.

[28]  Min Wu,et al.  Data hiding in image and video .II. Designs and applications , 2003, IEEE Trans. Image Process..

[29]  T. Madhloom,et al.  Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis , 2009 .

[30]  Scott E. Umbaugh,et al.  Computer Vision and Image Processing: A Practical Approach Using CVIPTools , 1997 .

[31]  Sajad Shirali-Shahreza,et al.  High Capacity Persian/Arabic Text Steganography , 2008 .

[32]  C Cray,et al.  Stresses and rewards within the psychiatrist's family , 1977, American journal of psychoanalysis.

[33]  J. Norman,et al.  The analyst's visual images and the child analyst's trap. , 1989, The Psychoanalytic study of the child.

[34]  A C Barden The pregnant therapist. , 1985, Journal of psychosocial nursing and mental health services.

[35]  M. Swartz,et al.  Countertransference in the expectant father. , 1984, Psychosomatics.

[36]  Hideki Noda,et al.  Application of BPCS steganography to wavelet compressed video , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[37]  Maureen M. Underwood,et al.  Clinical observations of a pregnant therapist , 1976 .

[38]  Andreas Westfeld,et al.  Steganography in a Video Conferencing System , 1998, Information Hiding.

[39]  J. Osofsky,et al.  The effects of trauma on young children: a case of 2-year-old twins. , 1995, The International journal of psycho-analysis.

[40]  Richard Sterba Aggression in the Rescue Fantasy , 1940 .

[41]  Jane Waldman,et al.  New mother/old therapist: transference and countertransference challenges in the return to work. , 2003, American journal of psychotherapy.