Intersymbol interval method for hiding secret information based on pseudo-random number sequences

Authors

DOI:

https://doi.org/10.18372/2073-4751.69.16808

Keywords:

steganography, container, inter-symbol interval method, sequence of pseudo-random numbers, linear congruent method, Feigenbaum's quadratic function

Abstract

In the article, an efficient method of hiding secret information in text-type containers based on changing inter-symbol intervals is suggested. Here, the hiding process is performed by selecting the symbols of the container in a pseudo-random sequence to increase reliability. To obtain a pseudo-random sequence the linear congruent method and Feigenbaum's quadratic function were used.

References

Gasimov V.A. Fundamentals of information security. – Baku: Publishing-polygraphy center of the MNS, 2009. – 340 p.

Bender W., Gruhl D., Morimoto N., Lu A. "Techniques for data hiding". IBM Systems Journal. – Vol. 35. – Issues 3&4. – 1996. – P. 313-336.

Konakhovich G.F., Puzyrenko A.Yu. Computer steganography. Theory and practice // MK-Press, 2006. – 288 p.

Tekin V. Text steganography // World of PC – 2004. – № 11. – 63 p.

Gasimov V.A., Mammadov J.I., Javadov A.F. “About one method of steganographic information hiding in text-type containers”, Integration of Education, Science and Business in Modern Environment: Winter Debates: abstracts of the 2nd International Scientific and Practical Internet Conference, February 4-5, 2021. – Dnipro, Ukraine.

Gasimov V.A., Mustafayeva E.A. Intercharacter intervals method of hiding information in Word documents // Baku: News of ANAS, 2014. – № 6. – P. 124-129.

Knut D. The Art of Computer Programming. – M. 1977. – V. 2. – 724 p.

Sidorenko A.V., Shakinko I.V., Sidorenko Yu.V. Image Encryption Algorithm Using Two-Dimensional Chaotic Mappings / System Analysis and Applied Informatics. – 2016. – № 2. – P. 44-49.

Ptitsyn N. Application of the theory of deterministic chaos in cryptography. – M.: MSTU named after N.E. Bauman, 2002. – 81 p.

Schneier B. Practical Cryptography, 2nd Edition. – 610 p.

Mammadov J.I., Namazov F.H. Development of the image encryption algorithm with the use of chaotic sequences and fractals // – Baku: ASOIU, AHTS News, 2018. – № 2. – P. 85-94.

Mammadov J.I., Gasimova N.N., Isganderova G.J. Increasing the efficiency of applying pseudorandom number sequences based on deterministic chaos // Scientific works of AHMA. – 2018. – № 1. – P. 67-71.

Dovgal V.M., Gordienko V.V., Nikitin M.O. A method of hierarchical cryptography based on discrete mappings // El. scientific journal of Kursk State University. – 2014. – №1.

Politansky R.L., Shpatar P.M., Gres A.V., and Veriga A.D. Data transmission system with encryption by chaotic sequences // Technology and design in electronic equipment. – 2014. – No. 2-3. – P. 28-32.

Gasimov V.A., Mammadov J.I. "Method of encryption of text information based on LFSR." Problems of informatization and management. – 2020. – № 64. – P. 35-40.

Gasimov V.A. and Mammadov J.I. “DNA-based image encryption algorithm” / IOP Conf. Series: Materials Science and Engineering 734 012162 IOP Publishing.

Gasimov V.A. and Mammadov J.I. "Image encryption algorithm using DNA pseudo-symbols and chaotic map," 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). – 2021. – P. 1-5.

Downloads

Published

2022-02-17

Issue

Section

Статті