METHOD OF TWO-STAGE IMPLANTATION OF HIDDEN INFORMATION BASED ON STEGANOCOMPRESSION TRANSFORMATIONS

2024;
: 31-38
Authors:
1
V. N. Karazin Kharkiv National University

In the article, the need for further development of the state is directly related to: solving issues of increasing defense capability and information security; development of information and intelligent systems. The necessity of ensuring the required level of completeness of information, compliance with the requirements of its relevance, achievement and maintenance of the appropriate level of integrity, accessibility and confidentiality is substantiated. The article emphasizes that for this purpose, complex systems of coding and information protection are being built. It is shown that recently, in order to further increase the level of security of information resources, methods of hidden embedding of information have been used. In this field of scientific and applied research, the direction of timely delivery of integral video information in a secure mode is outlined. For protection, the following can be used: meta-messages, which are formed on the basis of intelligent analysis of video frames; separate video segments of aerial photographs containing the most important information for decision-making. This article examines a class of methods of steganographic transformations, which are associated with embedding messages in digital containers, which are formed by a stream of video segments (VS). However, existing steganographic systems are based mainly on the use of the amount of psychovisual (PSV) redundancy available for reduction. Therefore, an increase in steganographic capacity leads to a loss of integrity and efficiency of delivery of video-container information. Steganocompression coding in the stegano-polyadic basis was created on the basis of taking into account the amount of redundancy permissible for reduction. In this case, in the process of compression of the components of the VS, the direct embedding of hidden information is organized. Concealment of information is carried out by technological stages, depending on the compression transformation of the transitional syntax of the quilted sequence. The key stage is the technology of two-stage implementation of the elements of the concealed message added to the stegano sequences to the syntax of the steganocompression representation of the BC components.

[1].   Fridrich J. Steganalysis of LSB encoding of Color Images / Fridrich J., Du R., Long M. // Proccedings of ICME 2000, New York City, July 31 – August 2, New York, USA.

[2].   Бараннік Д.В. Метод непрямого стеганографічного приховування даних з урахуванням інформації контуру / Д.В. Бараннік, В.В. Бараннік, О.М. Шатун // Наукоємні технології. – 2018. – №2(38). –
С. 226–231.

[3].   Barannik V., Barannik D. Barannik N.,  Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020): proceedings of 15 th IEEE International Conference, 2020. P. 699–702. DOI: 10.1109/TCSET49122.2020.235522.

[4].   Бараннік В.В., Шульгін С.С., Бараннік Н.В., Бабенко Ю.М., Пугачев Р.В. Проблематичні аспекти забезпечення дистанційного відеосервісу в кризовій ситуації. Кібербезпека. освіта, наука, техніка, 2020, №1(1), С. 13 – 22.

[5].   Medeni M.B. A novel Steganographic Protocol from Error-correcting Codes / M.B. Medeni, El.M Soudi // Journal of Information Hiding and Multimedia Signal Processing. – 2010. –P.339-343.

[6].   Fridrich J. Stegoanalysis of LSB encoding in color image / J. Fridrich, R. Du, M. Long // ICME, 2000.

[7].   Barannik, V.V., Kulitsa, O., Tarasenko, D., Barannik, D., Podlesny, S., The video stream encoding method in infocommunication systems. IEEE 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (IEEE TCSET 2018), 2018, pp. 538-541. DOI: 10.1109/TCSET.2018.8336259.

[8].   Баранник  В.В.  Обоснование  значимых угроз безопасности видеоинформационного  ресурса систем видеоконференцсвязи профильных систем управления / В.В. Баранник, А.В. Власов, С.А. Сидченко // Информационно-управляющие системы на ЖД транспорте. – 2014.  №3.  С. 24 – 31.

[9].    Задирака В.К.Статистический анализ систем с цифровыми водяными знаками / В.К. Задирака,
Н.В. Кошкина, Л.Л. Никитенко // Штучный інтелект. 2008.  №3. – С.315-324

[10]. Adleman L. M., Shamir A., Rivest R. L., A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978. Vol. 21. Iss. 2. P. 120–126. DOI: 10.1145/359340.359342.

[11]. Barannik D., Barannik V., Shatun O., Dodukh O., Tverdokhleb V. The indirect method of steganographic embedding of data in an image container based on the information of the contour // 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology. – 2018. – p. 490– 494. DOI: 10.1109/INFOCOMMST.2018.8632155

[12]. Конахович Г.Ф. Защита информации в телекоммуникационных системах / Г.Ф. Конахович,
В.П. Климчик, С.М. Паук, В.Г. Потапов. – К.: МК – Пресс, 2005. – 288 с.

[13]. Fridrich J. New blind steganalysis and its implication / J. Fridrich, G. Miroslav // Proc. SPIE Elec-tronic Imaging, 2006.

[14]. V. Barannik, D. Barannik, S. Korotin, Olga Veselska Method of Safety of Informational Resources Utilizing the Indirect Steganography. “Development of technology analys for the content semantics,” in Engineer of XXI Century - We Design the Future, Bielsko-Biała, Poland: ATH, 2020. Р.195  202.

[15]. Barannik V., Alimpiev A., Barannik D., Barannik N. Detections of sustainable areas for steganographic embedding // East-West Design & Test Symposium (EWDTS). – IEEE, 2017. P. 555-558.
DOI: 10.1109/EWDTS.2017.8110028.

[16]. Задирака В.К. Новые подходы к разработке алгоритмов скрытия информации / В.К. Задирака,
Л.Л. Никитенко // Штучный інтелект. 2008.  №4. – С.353-357.

[17]. Fortrini M Steganography and digital watermarking: A global view / M. Fortrini // University of California, Davis. Available: http://lia.deis.unibo.it/Courses/RetiDiCalcolatori/Progretti00/fortini/project.pdf [June 2011].

[18]. Albert Lekakh, Tatyana Belikova, Oleksii Dovbenko, Oleksandr Dodukh. Method of Increasing the Capacity of Information Threat Detection Filters in Modern Information and Communication Systems. Advanced Information and Communications Technologies (AICT 2019): proceedings of the ІЕЕЕ 3rd International Conference, 2019. P. 426-429. DОІ: 10.1109/AIACT.2019.8847754.

[19]. Barannik D. Stegano-Compression Coding in a Non-Equalible Positional Base. Advanced Trends in Information Theory (IEEE ATIT 2020): proceedings of the IEEE 2nd International Conference, 2020. P. 83 – 86. DOI: 10.1109/ATIT50783.2020.9349328.

[20]. V. Barannik, D. Barannik, A. Lekakh "A steganographic method based on the modification of regions of the image with different saturation", Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET), 2018 14th International Conference on,2018, pp. 542-545.  DOI: 10.1109/TCSET.2018.8336260

[21]. Rybko B. Information-Theoretical Approach to Steganographic Systems / B. Rybko, D. Ryabko // Proc. IEEE International Symposium on Information Theory, Nice, France, 2007. P.2461-2464.

[22]. Volodymyr Barannik, Dmitriy Barannik, Oleg Shatun, Veronika Kobtseva Development of an indirect method of steganographic data hiding in the container image contour // Informatyka Automatyka Pomiary w Gospodarce i Ochoronie Środowiska (IAPGOŚ). – 2018. – №4. – рр. 22 – 25.

[23]. Medeni M.B. A novel Steganographic Protocol from Error-correcting Codes / M.B. Medeni, El.M Soudi // Journal of Information Hiding and Multimedia Signal Processing. – 2010. –P.339-343.

[24]. Barannik V., Khimenko V., Barannik N. Method of indirect information hiding  in the process of video compression. Radioelectronic and Computer Systems. 2021. №. 4. PP. 119–131. DOI: https://doi.org/10.32620/reks.2021.4.

[25]. Bаrаnnіk V.V., Kаrреnkо S. Mеthоd оf thе 3-D іmаgе рrоcеssіng. Mоdеrn Рrоblеms оf Rаdіо Еngіnееrіng, Tеlеcоmmunіcаtіоns аnd Cоmрutеr Scіеncе (ІЕЕЕ TCSЕT 2008): proceedings of ІЕЕЕ Іntеrnаtіоnаl Cоnfеrеncе, 2008. P. 378-380.

[26]. Бараннік Д.В. Метод стеганокомпресійного кодування на основі поліадичного базису. Наукоємні технології. 2023. № 3. С. 271-279.

[27]. Бараннік Д.В. технологія приховування інформативного контенту в динамічному потоці відеосегментів. 2023. № 4. С. 408-415