DEVELOPMENT OF A STEGANOGRAPHIC METHOD RESISTANT TO ATTACKS AGAINST EMBEDDED MESSAGES
DOI:
https://doi.org/10.17721/ISTS.2020.1.16-22Keywords:
steganographic method, digital image, resistance to attacks, singular number, matrix blockAbstract
Features of modern network communications make it necessary to use in the organization of the hidden channel communication of steganographic algorithms that are resistant to loss compression, and leaving the tasks of developing new effective steganographic methods are relevant. The paper develops a new block steganographic method, which is resistant to attacks against the built-in message, including strong attacks. This method preserves the reliability of the perception of the formed quilting due to the mathematical basis used. It is based on a general approach to the analysis of the state and technology of information systems functioning, matrix analysis, perturbation theory. A digital image is treated as a container. The bandwidth of a hidden link that is built using the developed method is equal to n -2 bpp, n×n is the size of the blocks of the container that are obtained by the standard breakdown of its matrix. Such bandwidth is achieved with any algorithmic implementation of the method. Additional information is a binary sequence, it is the result of pre-coding of the information that is hidden. The embedding of additional information is done by using formal container matrix parameters that are insensitive to perturbation. These are singular values of its small blocks (n≤8). Increasing the maximum singular value of the block, which occurs when embedding additional information, leads to the stability of the method to the perturbing action and to ensure the reliability of the perception of the hip. The magnitude of the increase in the maximum singular value is determined using the values obtained by raising the singular values of the block to a natural degree k. Algorithmic implementation of the method requires additional studies to determine the parameter k.Downloads
References
M.E. Saleh, A.A. Aly, F.A. Omara, “Data security using cryptography and steganography techniques,” International Journal of Advanced Computer Science and Applications, Vol. 7, Issue 6, pp. 390-397, 2016.
S. Malalla, F.R. Shareef, “Novel approach for Arabic text steganography based on the “BloodGroup” text hiding method,” Engineering, Technology & Applied Science Research, Vol. 7, Issue 2, pp. 1482-1485, 2017.
В.Г. Грибунин, И.Н. Оков, И.В. Туринцев, Цифровая стеганография, М.: СОЛОН-Пресс, 2009. 272 с.
D. Subhashini, P. Nalini, G. Chandrasekhar, “Comparison analysis of spatial Domain and compressed Domain steganographic techniques,” International Journal of Engineering Research and Technology, Vol. 1, Issue 4, pp. 1-6, 2012.
B. Li, “A survey on image steganography and steganalysis,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, Issue 2, pp. 142-172, 2011.
S. Singh, T.J. Siddiqui, “A security enhanced robust steganography algorithm for data hiding,” International Journal of Computer Science Issues, Vol. 9, Issue 3, pp. 131-139, 2012.
S. Singh, T.J. Siddiqui, “Robust image steganography using complex wavelet transform,” in Proceedings of 2013 International Conference on Multimedia, Signal Processing and Communication Technologies, Aligarh, India, 23-25 Nov. 2013, pp.56 – 60.
М.А. Мельник, «Sign-нечувствительность сингулярных векторов матрицы изображения как основа стеганоалгоритма, устойчивого к сжатию», Інформатика та математичні методи в моделюванні, Том 3, № 2, С. 116-126, 2013.
Z. Bao, X. Luo, Y. Zhang, C. Yang, F. Liu, “A robust image steganography on resisting JPEG compression with no side information,” IETE Technical Review, Vol. 35, Issue 1, pp. 4-13, 2018.
J. Tao, S. Li, X. Zhang, Z. Wang, “Towards robust image steganography,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 29, Issue 2, pp. 594-600, 2019.
Г.Ф. Конахович, А.Ю. Пузыренко, Компьютерная стеганография: теория и практика, К.: МК-Пресс, 2006. 288 с.
А.А. Кобозева, М.А. Мельник, «Нечувствительность стеганосообщения к сжатию и формальные достаточные условия ее обеспечения», Збірник наукових праць Військового інституту КНУ імені Тараса Шевченка, № 38, С. 193-203, 2012.
А.А. Кобозева, В.А. Хорошко, Анализ информационной безопасности, К.: ГУИКТ, 2009. 251 с.
М.А. Мельник, «Стеганоалгоритм, устойчивый к сжатию», Інформаційна безпека, № 2(8), с. 99-106, 2012.
Д. Деммель, Вычислительная линейная алгебра: теория и приложения, М.: Мир, 2001. 430 с.
Р. Гонсалес, Р. Вудс, Цифровая обработка изображений, М.: Техносфера, 2006. 1070 с.
C. Bergman, J. Davidson, “Unitary embedding for data hiding with the SVD,” in Proceedings of Security, Steganography, and Watermarking of Multimedia Contents VII, Vol. 5681, pp. 619- 630, 2005.
A.A. Kobozeva, I.I. Bobok, A.I. Garbuz, “General principles of integrity checking of digital images and application for steganalysis,” Transport and Telecommunication, Vol. 17, Issue 2, pp. 128-137, 2016.
И.И. Бобок, «Теоретическое развитие общего подхода к проблеме выявления нарушений целостности цифровых контентов, основанного на анализе полного набора формальных параметров», Інформатика та математичні методи в моделюванні, Том 7, № 3, с. 170-177, 2017.
І.І. Бобок, «Теоретичні основи методу виявлення порушення цілісності цифрового зображення в результаті накладання шуму», Збірник наукових праць Військового інституту КНУ імені Тараса Шевченка, № 63, С. 73-84, 2019.
M.O. Kozina, “Steganographic method for solving a triple task”, Матеріали VII міжнародна науково-практична конференція «Проблеми та перспективи розвитку ІТ-індустрії», Харків, Україна, 17- 18 квітня 2015 р., с. 32.
T.H. The, T.L. Tien, “An efficient blind watermarking method based on significant difference of wavelet tree quantization using adaptive threshold,” International Journal of Electronics and Electrical Engineering, Vol. 1, Issue 2, pp. 98-103, 2013.
R.S. Run, S.J. Horng, W.H. Lin, T.W. Kao, and P. Fan, “An efficient wavelet-tree-based watermarking method,” Expert Systems with Applications., Vol. 38, рp. 14357-14366, 2011.
J.C. Patra, A.K. Kishore, C. Bornand, “Improved CRT-based DCT domain watermarking technique with robustness against JPEG compression for digital media authentication,” in Proceedings of 2011 IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, USA, 9-12 Oct. 2011, pp. 2940–2945.
Y.R. Wang, W.H. Lin, L. Yang, “An intelligent watermarking method based on particle swarm optimization,” Expert Systems with Applications, Vol. 38, pp. 8024-8029, 2011.
