METHODOLOGY OF INDIRECT INFORMATION HIDDENING STEGANOGRAPHIC SYSTEM CREATION ON THE MULTIADIC TRANSFORMATIONS BASIS
DOI:
https://doi.org/10.18372/2310-5461.51.15690Keywords:
steganographic transformations, video container, video image compression, indirect embedding, embedding densityAbstract
It is shown that the current direction of information resources security increasing during transmission through infocommunication systems is using the methods of steganographic embedding information in video images. The effectiveness of such methods is significantly increased when using a set of concealment methods, which are based on the principles of messages direct and indirect embedding. At the same time, the existing steganographic methods use in the information embedding process mainly only patterns generated by the peculiarities of the video images visual perception. Therefore, it is substantiated that the scientific and applied task, which consists in increasing the density of messages embedded in the video container with a given level of their reliability, is relevant. The solution to this problem is based on the elimination the contradiction that the increase in the embedded data density leads to a decrease in the video container bit rate, resistance to steganoanalysis, the special information and the video container reliability. Therefore, the aim of the research is developing a methodology for steganographic information embedding, taking into account the video container features, which are generated by its structural and structural-statistical features. The solution of the formulated problem in the field of steganographic transformations application is offered to be realized with using a bit of the hidden message some condition or functional dependence indirect embedding methods. To construct a steganographic system in terms of compliance with the necessary requirements are encouraged to use multi-stage conversion. In this case, the following is achieved. The possibility of creating steganographic transformations of indirect embedding and retrieval of hidden information in the multiadic basis by modifying the basic system of bases within the allowable set is proved. The existence of an admissible multiadic systems set for one sequence is proved so that mutually unambiguous direct and inverse code transformation is achieved. It is substantiated that the multiadic system, which is created in the DCT transformant spectral space, has the potential to form a set of the base systems permissible modifications. In turn, this characteristic feature creates an opportunity to construct indirect steganographic transformations in the multiadic basis, which based on the structural meta-features modification
References
JPEG Privacy & Security Abstract and Executive Summary [Electronic resource]. – 2015. – Access mode: https://jpeg.org/items/20150910_privacy_ security_summary.html. – 7.04.2021.
Barannik, V. Technology for Protecting Video Information Resources in the Info-Communication Space [Text] / V. Barannik, S. Sidchenko, D. Barannik // IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020). – 2020. – P. 29–33. DOI: 10.1109/ATIT50783.2020.9349324.
Barannik, V. Development of the method for encoding service data in cryptocompression image representation systems [Text] / V. Barannik, S. Sidchenko, N. Barannik, V. Barannik // Eastern-European Journal of Enterprise Technologies. – 2017. Vol. 3 № 9 (111). – P. 112 – 124.
Security key indicators assessment for modern cellular networks [Text] / Roman Odarchenko, Viktor Gnatyuk, Sergiy Gnatyuk, Anastasiia Abakumova // IEEE First International Conference on System Analysis & Intelligent Computing (SAIC). – 2018, P 1-7. DOI: 10.1109/SAIC.2018.8516889
Data Encryption Standard (DES) [Text]. – Federal Information Processing Standards Publication 46-3, 1999. – 26 p.
ДСТУ ГОСТ 28147:2009. Система обробки інформації. Захист криптографічний. Алгоритм криптографічного перетворення (ГОСТ 28147-89) [Текст]. – Введ. 2009-02-01. – Київ : Держспоживстандарт України, 2008. – 20 с.
Rivest, R. L. A method for obtaining digital signatures and public-key cryptosystems [Text] / R. L. Rivest, A. Shamir, L. M. Adleman // Communications of the ACM. – 1978. – Vol. 21, Iss. 2. – P. 120–126. DOI: 10.1145/359340.359342.
Barannik, V. Significant Microsegment Transformants Encoding Method to Increase the Availability of Video Information Resource [Text] / V. Barannik, Yu. Babenko, O. Kulitsa, V. Barannik, A. Khimenko, O. Matviichuk-Yudina // IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020). – 2020. – P. 52–56. DOI: 10.1109/ATIT50783.2020.9349256.
Chen, T.-H. Efficient multi-secret image sharing based on Boolean operation [Text] / T.-H. Chen, Ch.-S. Wu // Signal Processing. – 2011. – Vol. 91, Iss. 1. – P. 90–97. DOI: 10.1016/j.sigpro.2010.06.012.
Barannik, V. Methodological Fundamentals of Deciphering Coding of Aerophotography Segments on Special Equipment of Unmanned Complex [Text] / V. Barannik, S. Shulgin, A. Krasnorutsky, O. Slobodyanyuk, P. Gurzhii, N. Korolyova // IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020). – 2020. – P. 38–43. DOI: 10.1109/ATIT50783.2020.9349257.
Li, F. Two-step providing of desired quality in lossy image compression by SPIHT [Текст] / F. Li, S. Krivenko, V. Lukin // Радіоелектронні і комп’ютерні системи. – 2020. – №. 2(94). – С. 22-32. DOI: 10.32620/reks.2020.2.02.
Еремеев, О. І. Комбінована метрика візуальної якості зображень дистанційного зондування на основі нейронної мережі [Текст] / O. І. Еремеев, В. В. Лукин, K. Окарма // Радіоелектронні і комп’ютерні системи. – 2020. – № 4 (96). – С. 4-15. DOI: 10.32620/reks.2020.4.01.
Barannik, V. A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural Basis [Text] / V. Barannik, D. Jancarczyk, Yu. Babenko, O. Stepanko, J. Nikodem, S. Zawislak // IEEE 5nd International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IEEE IDAACS-SWS 2020). – 2020. – P. 1–5. DOI: 10.1109/IDAACS-SWS50031.2020.9297068.
Barannik, V. Technology of Composite Code Forming in The Spatial-Spectral Description Significant Microsegments [Text] / V. Barannik, V. Himenko, Yu. Babenko, A. Hahanova, V. Fustii // IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (IEEE TCSET 2020). – 2020. – P. 703–706. DOI: 10.1109/TCSET49122.2020.235523.
Wu, Yu. Sudoku Associated Two Dimensional Bijections for Image Scrambling [Text] / Yu. Wu, S. Agaian, J. Noonan // IEEE Transactions on multimedia. – 2012. – 30 p. – Access mode: https://arxiv.org/abs/1207.5856v1. – 7.04.2021.
Barannik, V. A method to control bit rate while compressing predicted frames [Text] / V. Barannik, N. Kharchenko; O. Othman Shadi; A. Musienko // IEEE International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics (IEEE CADSM 2015). – 2015. – P. 36–38. DOI: 10.1109/CADSM.2015.7230789.
Coding tangible component of transforms to provide accessibility and integrity of video data [Text] / Vladimir Barannik, Anna Hahanova, Vladimir Krivonos // International Symposium on East-West Design & Test Symposium (EWDTS). – 2013. – P. 1-5. DOI: 10.1109/EWDTS.2013.6673179.
A fast image encryption algorithm based on chaotic map and lookup table [Text] / P. Cheng, H. Yang, P. Wei, W. Zhang // Nonlinear Dynamics. – 2015. – Vol. 79, Iss. 3. – P. 2121–2131. DOI: 10.1007/s11071-014-1798-y.
A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2 [Text] / R. Guesmi, M.A.B. Farah, A. Kachouri, M. Samet // Nonlinear Dynamics. – 2016. – Vol. 83, Iss. 3. – P. 1123–1136. DOI: 10.1007/s11071-015-2392-7.
Barannik, V. Binomial-Polyadic Binary Data Encoding by Quantity of Series of Ones [Text] / V. Barannik, V. Barannik // 15th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020). – 2020. P. 775–780. DOI: 10.1109/TCSET49122.2020.235540.
Kurihara, K. An encryption-then-compression system for JPEG XR standard [Text] / K. Kurihara, O. Watanabe, H. Kiya // IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB). – 2016. – P. 1–5. DOI: 10.1109/BMSB.2016.7521997.
Barannik, V. Description of the OFDM symbol with the help of mathematical laws. Analysis of technologies that were used in this case [Text] / V. Barannik, M. Lytvinenko, D. Okladnoy, O. Suprun // IEEE 2nd International Conference on Advanced Information and Communication Technologies (IEEE AICT 2017). – 2017. – P. 183–187. DOI: 10.1109/AIACT.2017.8020095.
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation [Text] / J. Zhou, X. Liu, O. C. Au, Y. Y. Tang // IEEE Transactions on Information Forensics and Security. 2014. – Vol. 9, No. 1. – P. 39–50. DOI: 10.1109/TIFS.2013.2291625.
Barannik, V. The method of crypto-semantic presentation of images based on the floating scheme in the basis of the upper boundaries [Text] / V. Barannik, D. Barannik, V. Fustii, M. Parkhomenko // IEEE 3rd International Conference on Advanced Information and Communications Technologies (IEEE AICT 2019). – 2019. – P. 415–418. DOI: 10.1109/AIACT.2019.8847820.
Information technology – JPEG 2000 image coding system: Secure JPEG 2000 [Text]. – International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007. – 108 p.
Barannik, V. V. Structural slotting with uniform redistribution for enhancing trustworthiness of information streams [Text] / V. V. Barannik, Yu. N. Ryabukha, S. A. Podlesnyi // Telecommunications and Radio Engineering. – 2017. – Vol. 76 No. 7. – P. 607-615. DOI: 10.1615/TelecomRadEng.v76.i7.40.
Barannik, V. The method of increasing accessibility of the dynamic video information resource [Text] / V. Barannik, S. Shulgin // IEEE 13th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (IEEE TCSET 2016). – 2016. – P. 621 – 623. DOI: 10.1109/TCSET.2016.7452133.
Wong, K. DCT based scalable scrambling method with reversible data hiding functionality [Text] / K. Wong, K. Tanaka // 4th International Symposium on Communications, Control and Signal Processing (ISCCSP). – 2010. – P. 1–4. DOI: 10.1109/ISCCSP.2010.5463307.
The issue of timely delivery of video traffic with controlled loss of quality [Text] / V. Barannik, N. Kharchenko, V. Tverdokhleb, O. Kulitsa // 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET). 2016, P. 902-904. DOI: 10.1109/TCSET.2016.7452220.
Method coding efficiency segments for information technology processing video [Text] / V. Barannik, D. Tarasenko // 4th International Scientific-Practical Conference on Problems of Infocommunications. Science and Technology (PIC S&T). – 2017. – P. 551-555. DOI: 10.1109/INFOCOMMST.2017.8246460.
JPEG image scrambling without expansion in bitstream size [Text] / K. Minemura, Z. Moayed, K. Wong, X. Qi, K. Tanaka // 19 th IEEE International Conference on Image Processing. – 2012. – P. 261–264. DOI: 10.1109/ICIP.2012.6466845.
The technology of the video stream intensity controlling based on the bit-planes recombination [Text] / V. Barannik, M. Karpinski, V. Tverdokhleb, D. Barannik, V. Himenko, M. Aleksander // IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS`2018). 2018. – P. 25–28. DOI: 10.1109/IDAACS-SWS.2018.8525560.
Ji, Sh. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator [Text] / Sh. Ji, X. Tong, M. Zhan. – 2012. – Access mode: https://arxiv.org/abs/1208.0999. – 7.04.2021.
Barannik Valeriy. Fast Coding of Irregular Binary Binomial Numbers with a Set Number of Units Series [Text] // IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020). – 2020. – P. 72–76. DOI: 10.1109/ATIT50783.2020.9349356.
Barannik, D. Stegano-Compression Coding in a Non-Equalible Positional Base [Text] // IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020). – 2020. – P. 83–86. DOI: 10.1109/ATIT50783.2020.9349328.
Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System [Text] / V. Barannik, N. Barannik, Yu. Ryabukha, D. Barannik // 15 th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020). – 2020. – P. 699–702. DOI: 10.1109/TCSET49122.2020.235522.
Barannik, V. The model of threats to information and psychological security, taking into account the hidden information destructive impact on the subconscious of adolescents [Text] / V. Barannik, T. Belikova, P. Gurzhii // IEEE International Conference on Advanced Trends in Information Theory (ATIT`2019). – 2019. P. 656–661. DOI: 10.1109/ATIT49449.2019.9030432.
Barannik, V. V. The method for improving security of the remote video information resource on the basis of intellectual processing of video frames in the telecommunication systems [Text] / V. V. Barannik, Yu. N. Ryabukha, О. S. Kulitsa // Telecommunications and Radio Engineering. – 2017. Vol. 76 No. 9. – P. 785–797. DOI: 10.1615/TelecomRadEng.v76.i9.40.
Development Second and Third Phase of the Selective Frame Processing Method [Text] / V. Barannik, V. Barannik, D. Havrylov, A. Sorokun // 3rd International Conference on Advanced Information and Communications Technologies (AICT`2019). – 2019. – P. 54–57. DOI: 10.1109/AIACT.2019.8847897.
Methodological basis for determining the energy significance of the structural unit of a video frame based on the estimation of low-frequency components of the matrices of the DCT blocks of the luminance component [Text] / V. Barannik, D. Komolov, A. Musienko, R. Tarnopolov // 13th International Conference on Modern Problems of Radio Engineering on Telecommunications and Computer Science (TCSET). – 2016. – P. 739-741. DOI: 10.1109/TCSET.2016.7452168.
Komolov, D. Selective Method For Hiding Of Video Information Resource In Telecommunication Systems Based On Encryption Of Energy-Significant Blocks Of Reference I-Frame [Text] / D. Komolov, D. Zhurbynskyy, O. Kulitsa // 1st International Conference on Advanced Information and Communication Technologies (AICT'2015). 2015. – Р. 80-83.
Wu, Y. NPCR and UACI Randomness Tests for Image Encryption [Text] / Y. Wu, J. P. Noonan, S. Agaian // Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT). – 2011. – Vol. 2. – P. 31–38. DOI: 10.4236/jss.2015.33005.
Бараннік, В. В., Сідченко, С. О., Бараннік, Н. В., Хіменко, А. М. (2021). Метод маскувального ущільнення службових даних в системах компресії відеозображень, Радіоелектронні і комп’ютерні системи, 2, 51–63. doi: https://doi.org/10.32620/reks.2021.2.05.