Research of the dependence of steganographic systems on the characteristics of hidden information

Authors

  • E.A. Mustafayeva

DOI:

https://doi.org/10.18372/2073-4751.67.16203

Abstract

To build perfect steganographic systems, it is necessary to take into account many paraeters, including their dependence on the characteristics of the hidden information and the communication channel used for secret transmission. In this regard, the article examines the dependence of steganographic systems on characteristics such as volume, format, form of presentation, purpose of hidden information. Approaches are proposed for the correct choice of the container, the implementation algorithm, covert transmission channels, depending on these characteristics. In the course of studies of the relationship between the amount of hidden information and the degree of stegocontainer's resistance to possible steganographic analysis, it was found that an improvement in one of these indicators leads to an absolute deterioration in the other. In addition, the article examines the resistance of the container and the information hidden in it to various noises, lossy compression, filtering, modification, analog-to-digital and digital-to-analog conversions to build perfect steganographic systems. The advantages and disadvantages of using images, TCP, IP, VoIP, SCTP and ICMP protocols, and VoIP packets as a container were outlined.

References

Конахович Г.Ф., Пузыренко А.Ю. Компьютерная стеганография. Теория и практика. – К.: МК-Пресс, 2006. – 288 c.

Bender W., Gruhl D., Morimoto N., Lu A. Techniques for Data Hiding, IBM Systems Journal. – 1996. – Vol. 35. – P. 313-336.

Грибунин В.Г., Оков И.Н., Туринцев И.В. Цифровая стеганография. – М.: Солон-Пресс, 2002. – 272 c.

Аграновский А.В., Балакин А.В., Грибунин В.Г., Сапожников С.А. Стеганография, цифровые водяные знаки и стеганоанализ. – М.: Вузовская книга, 2009. – 220 с.

Qasımov V., Hüseynova G. Internet protokollarında gizli informasiya ötürmə kanallarının yaradılması imkanları. Journal of Qafqaz University Mathematics and Computer Science. – 2015. – Vol. 3. – № 1. – P. 50-56.

Qasımov V.Ə., Mustafayeva E.Ə. İnter-netdə informasiyanın gizli ötürülmə kanallarının yaradılması üsulları // “Milli təhlükəsizlik və hərb elmləri” elmi-praktik jurnalı. Azərbaycan Respublikası Silahlı Qüvvələrinin Hərbi Akademiyası. Bakı. – 2016. – №3. – Səh. 122-128.

Горелкина Д.А., Дорошенко Н.С., Осипов Д.Л. Применение методов цифровой стеганографии для внедрения конфиденциальной информации в растровые изображения. Вестник Ставропольского государственного университета – Технические науки. – 75/2011. – С. 73-77.

Кобозева А.А., Лебедева Е.Ю., Ко-стырка О.В. Стеганопреобразование пространственной области изображения контейнера, устойчивое к атакам против встроенного сообщения // Problemele energeticii regionale. – 2014. – № 1. – С. 57-65.

Shannon C.E. A Mathematical Theory of Communication // Bell System Tech-nical Journal. – 1948. – Т. 27. – С. 379-423, 623-656.

Ahsan K., Kundur D. Practical Data Hiding in TCP/IP // Proc. ACM Wksp. Multimedia Security. – 2002. – 8 р.

Тимонина, Е.Е. Скрытые каналы (обзор) // Jet info. – 2002. – № 11. – 20 с.

Johnson N.F., Jajodia S. "Steganalysis: The investigation of Hidden Infor-mation", IEEE Infonnation Technology Conference, Syracuse, NY, USA, 1-3 September 1998. – 4 р.

Gasimov V., Mustafayeva E., Huseynova G. Implementing covert channels to transfer hidden information over whatsapp on mobile phones. International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661. – February 2019. – Vol. 6. – Iss. 2. – Р. 32-35.

Moscowitz I.S., Kang M.H. Covert Channels Here to Stay?// Information Technology Division Naval Research Laboratory, Washington, DC 20375, 1995. – 21 р.

Published

2021-10-12

Issue

Section

Статті