Improving the efficiency of the steganographic method of data hiding with the application of iterative functions and noise addition

2021;
: 66-73
https://doi.org/10.23939/ujit2021.02.066
Received: September 28, 2021
Accepted: November 23, 2021

Цитування за ДСТУ: Журавель І. М., Мичуда Л. З., Журавель Ю. І. Підвищення ефективності стеганографічного методу приховування даних із застосуванням ітераційних функцій та додаванням шуму. Український журнал інформаційних технологій. 2021, т. 3, № 2. С. 66–73.

Citation APA: Zhuravel, I. M., Mychuda, L. Z., & Zhuravel, Yu. I. (2021). Improving the efficiency of the steganographic method of data hiding with the application of iterative functions and noise addition. Ukrainian Journal of Information Technology, 3(2), 66–73. https://doi.org/10.23939/ujit2021.02.066

1
Lviv Polytechnic National University, Lviv, Ukraine
2
Lviv Polytechnic National University, Department of Computerized Automation Systems
3
Lviv Polytechnic National University, Lviv, Ukraine

The development of computer and digital technology contributes to the growth of information flows transmitted through open and closed communication channels. In many cases, this information is confidential, financial, or commercial in nature and is of value to its owners. This requires the development of mechanisms to protect information from unauthorized access. There are two fundamental areas of secure data transmission over the open communication channels – cryptography and steganography. The fundamental difference between them is that cryptography hides from others the content of the message, and steganography hides the very fact of the message transmission. This paper is devoted to steganographic methods of data concealment, which are less researched than cryptographic, but have significant potential for use in a variety of applications. One of the important characteristics of most methods is their effectiveness. In general, efficiency is assessed in the context of solving specific problems. However, the most common criteria for the effectiveness of steganographic methods are the amount of hidden data and the method of transmitting the secret key to the receiving party, which will not allow the attacker to intercept it. Because media files make up a significant portion of network traffic, a digital image is chosen as the stegocontainer. It is proposed to determine the coordinates of the embedding location on the basis of iterative functions. The advantage of their use is the compactness of the description of the coordinates of the pixels in which the data will be hidden. In addition, it is proposed to use the Diffie-Gellman algorithm to transfer the parameters of iterative functions to the receiving side. This method of key distribution makes the steganographic method less vulnerable to being stolen by an attacker. The second performance criterion is the amount of hidden data. The paper found that the moderate addition of multiplicative noise makes it possible to increase the amount of hidden data without significantly reducing the visual quality of the stegocontainer. To analyze the distortions in the image-stegocontainer, which are due to the influence of noise and modification of the lower bits of pixels, the method of a quantitative assessment of visual quality is used, which is based on the laws of visual perception.

  1. Frączek, Wojciech, & Szczypiorski, Krzysztof (2016). Perfect undetectability of network steganography. Security Comm. Networks, 9: 2998-3010. https://doi.org/10.1002/sec.1491
  2. Grinchenko, V. T., Matcypura, V. T., & Snarskii, A. A. (2013). Fraktaly: ot udivleniia k rabochemu instrumentu. Naukova dumka, Kyiv, 270 p. [In Russian].
  3. Kadhimab, I. J., Premaratne, P., James, P., & Halloran, Vial & B. (2019). Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. Neurocomputing, 335, 299–326. https://doi.org/10.1016/j.neucom.2018.06.075
  4. Manju, Khari, Aditya, Kumar, Garg, Amir, Gandomi, H., Gupta, Rashmi, Patan, Rizwan, & Balusamy, Balamurugan (2020). Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73–80. https://doi.org/10.1109/TSMC.2019.2903785
  5. Saravanan, M., & Priya, A. (2019). An Algorithm for Security Enhancement in Image Transmission Using Steganography. Journal of the Institute of Electronics and Computer, 1, 1–8. https://doi.org/10.33969/JIEC.2019.11001
  6. Sedighi Vahid, Cogranne Rémi, Fridrich Jessica (2016). Content-Adaptive Steganography by Minimizing Statistical Detectability. IEEE Transactions on Information Forensics and Security, 11(2), 221–234. https://doi.org/10.1109/TIFS.2015.2486744
  7. Sonal, G., & Mer, H. (2017). A survey: Image Steganography using different method. International Journal of Novel Research and Development, 2(4), 48–51.
  8. Wazirali, A., Alasmary, W., Mahmoud, M. E. A., & Alhindi, A. (2019). An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms. IEEE Access, Special Section on Security, Privacy, and Trust Management in Smart Cities, 7, 1–13. https://doi.org/10.1109/ACCESS.2019.2941440
  9. Yunxia, L., Shuyang, L., Yonghao, W., Hongguo, Z., & Sia, L. (2019). Video steganography: A review. Neurocomputing, 335, 238–250. https://doi.org/10.1016/j.neucom.2018.09.091
  10. Zhou, Ri-Gui, Hu, Wenwen, & Fan, Ping (2017). Quantum watermarking scheme through Arnold scrambling and LSB steganography. Quantum Information Processing, 16, article number 212. https://doi.org/10.1007/s11128-017-1640-9
  11. Zhuravel, I. M., & Vorobel, R. A. (2001). Kilkisna otsinka yakosti zobrazhen. Pratsi IV Serednoievropeiskoi konferentsii "Kompiuterni metody i systemy v avtomatytsi i elektrotekhnitsi". CHastyna 1. CHenstokhova, Polsha, 17-18 veresnia, 2001. [In Ukrainian].