Steganographic method for protection the objects of intellectual properties and intellectual rights

Authors

  • Андрей Викторович Сагун Cherkasy State Technological University
  • Леонид Николаевич Щербак Kyiv International university
  • Владислав Владимирович Хайдуров Kyiv International university
  • Валентина Ивановна Кунченко-Харченко Cherkasy State Technological University
  • Станислав Олегович Костянец Cherkasy State Technological University
  • Михаил Сергеевич Тетьора Cherkasy State Technological University

DOI:

https://doi.org/10.18372/2410-7840.19.12207

Keywords:

information security system, intellectual property, intellectual rights law, decomposition on the bitplane, dynamic graphic objects, computing environment MATLAB

Abstract

The protection of information, marked as intellectual property or copyrights, is a very special technical task, because often it is difficult to define, if this information is legally protected or the protection of information is not of-fered as an option. This task can be partly solved by using the “Copyright Demonstration” script, or by script named as “No Copy” script. In the most cases this method of pro-tection is known as information hiding. As a result, the modification of cryptographic embedded type of LSB–algorithm with keys was developed. The strength of algo-rithm has been improved in comparison with classical ste-gano – LSB–algorithms. The main point of proposed ste-ganographic method is the embedding of full-colored im-ages into dynamic full-colored information objects. This way, if the image pixel intensity level changes from 0 to 255, it means that this image can be represented in eight bit-planes. Accordingly, this method is based on LSB–methodology of information hiding. The article deals with the methodology of system development for protecting and transferring graphic, text data to dynamic graphic objects.The modeling was made in the MATLAB application environment and thus the time depending results were ob-tained. On the basis of the developed LSB–method modi-fication one can improve the protection of intellectual property rights in animated and video graphic objects by embedding the various full-colored digital watermarks. Also, the proposed method may have also a versatile usage.

Author Biographies

Андрей Викторович Сагун, Cherkasy State Technological University

candidate of engineering sciences, associate professor at the department of informatics and information security, Cherkasy State Technological University, Cherkassy, Ukraine.

Леонид Николаевич Щербак, Kyiv International university

doctor of engineering sciences, profes-sor of the of computer science department, Kyiv International university, Kyiv, Ukraine.

Владислав Владимирович Хайдуров, Kyiv International university

senior lecturer of computer science department, Kyiv International university, Kyiv, Ukraine.

Валентина Ивановна Кунченко-Харченко, Cherkasy State Technological University

doctor of engineer-ing sciences, professor at the department of informatics and information security, Cherkasy State Technological University, Cherkassy, Ukraine.

Станислав Олегович Костянец, Cherkasy State Technological University

master of informatics and information security department, Cherkasy State Technological University, Cherkassy, Ukraine

Михаил Сергеевич Тетьора, Cherkasy State Technological University

master of informatics and information security department, Cherkasy State Technological University, Cherkassy, Ukraine

References

M. Khosrow-Pour, "Encyclopedia of E-Commerce, E-Government and Mobile Commerce", Resources Management Association. Idea Group Reference, pp. 480-487, 2006.

M. Barni, F. Bartolini, Watermarking Systems Engineering, NewYork: Marcel Dekker, inc., 2004, 485 p.

Цивільний кодекс України. Стаття 505. Поняття комерційної таємниці: [Електронний ресурс]. Режим доступу: http:// radnuk. info / komentar / chky / chky-knuga4/140-kn4-glava46/2214--505-.html.

F. Shih, Watermarking, Steganography, and Forensics, New York: CRC Press, 2012, 424 p.

К. Защелкин, А. Ищенко, Е. Иванова, "Решение проблемы классификации блоков контейнера при JPEG-атаке на стеганографический метод Бенгана-Мемона-Эо-Юнг", Радіоелектронні і комп’ютерні системи, №6(70), С. 164-168, 2014.

J. Fridrich, Steganography in Digital Media, New York: Cambridge University. Press, 2010, 448 p.

I. Cox, M. Miller, J. Bloom, J. Fridrich, Digital Watermarking and Steganography, Burlington: Morgan Kaufmann Publishers, 2008, 592 p.

В. Федосеев, Цифровые водяные знаки и стеганография, Самара. Издательство СГАУ, 2015, 128 с.

F. Hartung, B. Girod, "Watermarking of Uncom-pressed and Compressed Video", Signal Processing, vol. 66, no. 3, pp. 283–301, 1998.

T. Kalker, A.J.E.M. Janssen, "Analysis of Watermark Detection using SPOMF", Proceedings of ICIP, vol. 1, pp. 316-319, 1999.

H.J. Wang, P.C. Su, C.C.J. Kuo, "Wavelet-based digital image watermarking", Optics Express, vol. 3, no. 12, pp. 491–496, 1998.

R. Wang, Introduction to Orthogonal Transforms: with Applications in Data Processing and Analysis, Cambridge University Press, 2011.

Н. Глумов, В. Митекин, "Алгоритм встраивания полухрупких цифровых водяных знаков для задач аутентификации изображений и скрытой передачи информации", Компьютерная оптика, Т. 35, С. 262–267, 2011.

Цивільний кодекс України. ч. 2 ст. 433. [Електронний ресурс]. Режим доступу: Закон України "Про авторське право і суміжні права". Ст. 11. [Електронний ресурс]. Режим доступу: http://zakon2. rada.gov.ua/laws/show/3792-12/page.

Published

2017-12-11

Issue

Section

Articles