LSB METHODS OF COVERT MESSAGES TRANSMITION IN COMMUNICATION SYSTEMS (REVIEW)

Authors

  • Оlexander Slobodianiuk Kamianets-Podilskyi National University named after Ivan Ohienko, Kamianets-Podilskyi, Ukraine
  • Andrii Kostromytskyi Kharkiv National University of Radio Electronics, Kharkov, Ukraine
  • Viktor Chebanenko Іvan Kozhedub Kharkiv National University of Air Force, Kharkiv, Ukraine
  • Mikola Digtiar Іvan Kozhedub Kharkiv National University of Air Force, Kharkiv, Ukraine
  • Pavlo Onypchenko Іvan Kozhedub Kharkiv National University of Air Force, Kharkiv, Ukraine

DOI:

https://doi.org/10.18372/2310-5461.62.18714

Keywords:

video compression, infocommunication systems, information concealment techniques, video image quality

Abstract

In the article are analyzed and classified methods of hiding messages in container data blocks and proposes a scheme for implementing the method of hiding information in an audio stream using the concept of the least significant bit method. Message hiding methods are aimed at ensuring the security of confidential information transmission by making it inaccessible to unauthorized access and detection. One such method is steganography, which uses multimedia data to hide secret messages. Images, text documents, and audio data are the most commonly used containers for steganographic hiding of information. The main advantage of steganography is its ability to complement encryption, making the data less obvious for detection. This makes it possible to hide the existence of the fact that secret information was transmitted, adding an additional layer of protection. Steganography uses multimedia data, such as images, text, or audio data, to embed secret messages. Using special algorithms, steganographic methods allow information to be embedded in media files in such a way that it cannot be detected without the appropriate keys or decoding methods. It complements encryption, increasing the security of information transmission by adding an additional layer of protection. Encryption converts data into an unreadable format that can be understood only by those who have the appropriate decryption key. Steganography, in turn, allows you to hide the very fact of the existence of encoded data, making it invisible to a potential attacker. This greatly complicates the task for those trying to intercept or interfere with the process of information transmission. The effectiveness of steganography is determined by such aspects as the capacity, security, and reliability of the hidden data. Capacity indicates the ability of the method to hold a sufficient amount of secret information without a noticeable increase in the size of the container. This is especially important because a significant increase in file size can raise suspicion and attract attention. Security refers to the ability to provide a high level of data invisibility so that the hidden information remains invisible to outside observers. Robustness refers to the resistance to changes or attacks on hidden information, including attempts to detect and remove hidden data. The application of steganography can be extremely broad and includes not only military or governmental activities, but also personal data protection, commercial and corporate security. Today, when the issues of data privacy and security are extremely acute, steganography is becoming increasingly relevant. In addition to traditional media such as images and audio, steganography can also be used in other areas such as network protocols and Internet communications. Hiding information in data packets or using steganographic methods in network protocols can provide an additional layer of security for the transmission of information on the Internet.

Author Biographies

Andrii Kostromytskyi, Kharkiv National University of Radio Electronics, Kharkov, Ukraine

Candidate of Technical Sciences, Associate Professor

Viktor Chebanenko, Іvan Kozhedub Kharkiv National University of Air Force, Kharkiv, Ukraine

Junior Research Fellow

Pavlo Onypchenko, Іvan Kozhedub Kharkiv National University of Air Force, Kharkiv, Ukraine

Candidate of pedagogical sciences, associate professor

References

Бараннік В. В., Бабенко Ю. М., Бараннік В. В., Колесник В. О. Метод кодування значимих за впливом на семантичну цілісність відеосегментів для забезпечення доступності. Наукоємні технології. 2022. № 2 (54). С. 118 – 126. doi: 10.18372/2310-5461.54.16749.

Odarchenko R., Gnatyuk V., Gnatyuk S., Abakumova A. Security key indicators assessment for modern cellular networks. System Analysis & Intelligent Computing (SAIC): proceedings of the IEEE First International Conference, 2018. P 1-7. doi: 10.1109/SAIC.2018.8516889.

Козловський В., Савченко А., Толстікова О., Клобукова Л. Критерії вибору спектрально-ефективних сигналів у бездротових інформаційних мережах. Наукоємні технології. 2022. № 4 (56). С. 286 – 273. doi: 10.18372/2310-5461.56.17125.

Одарченко Р., Іванова М., Рябенко М., Аль-Мудхафар Акіл Абдулхусейн М. Метод аналізу взаємодії параметрів QOE та QOS на основі алгоритмів керування машинами. Наукоємні технології. 2022. № 4 (56). С. 305 – 316. doi: 10.18372/2310-5461.56.17130.

Huang S.-Y., Lo A.-h., Juan J.S.-T. XOR-Based Meaningful (n, n) Visual Multi-Secrets Sharing Schemes. Applied Sciences, MDPI. 2022. Vol. 12, iss. 20. Id. 10368. P. 1-22. doi: 10.3390/app122010368.

Zia U., McCartney M., Scotney B. et al. Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. International Journal of Information Security. 2022. Vol. 21. P. 917–935. doi: 10.1007/s10207-022-00588-5.

Cao X., Huang Y., Wu H.-T., Cheung Y.-m. Content and Privacy Protection in JPEG Images by Reversible Visual Transformation. Applied Sciences, MDPI. 2020. Vol. 10, iss. 19. Id. 6776. P. 1-12. doi: 10.3390/app10196776.

Latif A., Mehrnahad Z. A Novel Image Encryption Scheme Based on Reversible Cellular Automata. Journal of Electronic & Information Systems. 2019. Vol. 1, iss. 1. P. 18-25. doi: 10.30564/jeisr.v1i1.1078.

Barannik V. Technology of Structural-Binomial Coding to Increase the Efficiency of the Functioning of Computer Systems, 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine. 2022. pp. 96-100, doi: 10.1109/ATIT58178.2022.10024205.

Бараннік В.В., Ігнатьєв А.А., Бабенко Ю.М., Бараннік В.В., Сидченко Е.С. Технологія компоновочного кодування мікросегментів для підвищення безпеки відеоресурсів в інфокомунікаційних системах. Безпека інформації. 2020. №3. С. 181 – 190.

Belikova T. and Sidchenko S. The Method Drawing up the Text with the Set Suggestive Orientation to Create a Hidden Channel, 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine. 2022. pp. 106-110. doi: 10.1109/ATIT58178.2022.10024206.

Babenko Y., Barannik V., Barannik V., Khimenko A., Kulitsa O., Matviichuk-Yudina O. Significant Microsegment Transformants Encoding Method to Increase the Availability of Video Information Resource. IEEE Advanced Trends in Information Theory (ATIT): proceedings of 2nd Intern. Conf. (Kyiv, Ukraine, November 25-27, 2020). Kyiv, 2020. Р. 52-56. doi: 10.1109/ATIT50783.2020.9349256.

Chen T.-H., Wu Ch.-S. Efficient multi-secret image sharing based on Boolean operation. Signal Processing. 2011. Vol. 91, Iss. 1. P. 90–97. doi: 10.1016/j.sigpro.2010.06.012.

Onyshchenko R., Krasnorutsky A., Barannik D. and Barannik V. The Methods of Intellectual Processing of Video Frames in Coding Systems in Progress Aeromonitor to Increase Efficiency and Semantic Integrity. 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, 2022. pp. 53-56, doi: 10.1109/ATIT58178.2022.10024208.

Kolesnyk V., Berchanov A., Krasnorutsky A., Barannik V., Kharchenko N. and Malko O. Method of Structural-Statistical Coding of Video Segments in Spectral-Cluster Space, 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine. 2022. pp. 32-37, doi: 10.1109/ATIT58178.2022.10024240.

Barannik V., Tarasenko D. Method coding efficiency segments for information technology processing video. Problems of Infocommunications. Science and Technology (PIC S&T): proceedings of 4th International Scientific-Practical Conference. (Kharkov, Ukraine, October 10-13, 2017), Kharkov, 2017. Р. 551-555. doi: 10.1109/INFOCOMMST.2017.8246460.

Hsu W.-L., Tsai Ch.-L., Chen Ch.-J., Multi-morphological image data hiding based on the application of Rubik's cubic algorithm. Carnahan Conference on Security Technology (ICCST): proceedings of the IEEE International Conference. 2012. P. 135–139. doi: 10.1109/CCST.2012.6393548.

Onyshchenko R., Slobodyanyuk O., Krasnorutsky A., Bezruk V., Kolesnyk V. and Podlesny S. Approach to Coding with Improved Integrity of Video Information for Transmission in Wireless Infocommunication Networks, 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine. 2022. pp. 38-42. doi: 10.1109/ATIT58178.2022.10024245.

Information technology – JPEG 2000 image coding system: Secure JPEG 2000. International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007. 108 p.

Qi X., Minemura K., Moayed Z., Wong K., Tanaka K. JPEG image scrambling without expansion in bitstream size. Image Processing: proceedings of the 19 th IEEE International Conference, 2012. P. 261–264. doi:10.1109/ICIP.2012.6466845.

Barannik V., Babenko Y., Barannik V., Kolesnyk V., Zhuikov D. Method Taking into Account Level of Structural and Statistical Saturation of Video Segments in the Coding Process, 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine. 2022. pp. 66-71, doi: 10.1109/ATIT58178.2022.10024193.

Barannik V., Khimenko V., Barannik N., Method of indirect information hiding in the process of video compression. Radioelectronic and Computer Systems. 2021. No 4. PP. 119–131. doi: 10.32620/reks.2021.4.

Barannik V., Sidchenko S., Barannik D. and Ignatyev O. The Concept Of Creating A Complex Cryptocompression Image Protection System In Infocommunications, 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine. 2022. pp. 101-105, doi: 10.1109/ATIT58178.2022.10024210.

Barannik V., Krasnorutsky А., Kolesnik V., Barannik V., Pchelnikov S., Zeleny P. Compression method in terms of ensuring the fidelity of video images in infocommunication networks. Radioelectronic and Computer Systems. 2022. no 4(100). pp.10 – 24. doi: 10.32620/reks.2022.5/09.

Barannik, V. et al. A Method of Scrambling for the System of Cryptocompression of Codograms Service Components. In: Klymash, M., Luntovskyy, A., Beshley, M., Melnyk, I., Schill, A. (eds) Emerging Networking in the Digital Transformation Age. TCSET 2022. Lecture Notes in Electrical Engineering. 2023. Vol 965. Springer, Switzerland, Cham. doi: 10.1007/978-3-031-24963-1_26.

Barannik V., Karpenko S. Method of the 3-D image processing. Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET): proceedings of Intern. Conf. (Lviv-Slavsko, Ukraine, February 19-23, 2008), Lviv-Slavsko, 2008. Р. 378-380.

Barannik, V. et al. (2023). Processing Marker Arrays of Clustered Transformants for Image Segments. In: Klymash, M., Luntovskyy, A., Beshley, M., Melnyk, I., Schill, A. (eds) Emerging Networking in the Digital Transformation Age. TCSET 2022. Lecture Notes in Electrical Engineering, vol 965. Springer, Switzerland, Cham. doi: 10.1007/978-3-031-24963-1_25.

Barannik V. and Shiryaev A. Quadrature compression of images in polyadic space, Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science. 2012. pp. 422-422. INSPEC Accession Number: 12713484

Онищенко Р., Бараннік В., Шульгін С., Ушань В., Ігнатьєв О. Модель інформативного опису спектрального простору відеосегментів діагонально нерівномірною текстурою. Наукоємні технології. 2022. № 4 (56). С. 259 – 267. doi: 10.18372/2310-5461.56.17124.

Barannik V., Hahanova I., Kulbakova N. Dynamic coding of transforms of the images in two - level polyadic space, 2008 International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET). 2008. pp. 320–325.

Published

2024-07-29

Issue

Section

Electronics, telecommunications and radio engineering