ACTIVE ATTACK ON STEGANOGRAPHY CONTAINER

Authors

  • A. Shmatok National Aviation University
  • А. Petrenko National Aviation University
  • V. Tytov
  • E. Borysenko

DOI:

https://doi.org/10.18372/2310-5461.18.4934

Keywords:

steganography, steganalysis, wavelet transform

Abstract

It was carried out passive and active attack on steganography container and hidden information was removed from the container. To determine the fact of addition of hidden information in container, rather for realization of passive attack, we used the method of statistic steganalysis, which is based on famous mathematical model of container. We concluded the decision about presence of hidden information in terms of visual comparison of empty container spectrum with the spectrum of container which can contain hidden information. The spectrum of filled container has high-frequency hits. Active attack realizes using wavelet transforms. Actual algorithm of lossy compression removes information, which was added to spatial domain image. Besides, at the cost of substitution of DCT-coefficients for wavelet transform coefficients, we achieved the coding of container. The compression of container is accounted for compression of the wavelet coefficient matrix, which is transmitted in the communication channel.

References

Computer steganography — the protection of information or a tool of the crime? [Electronic resource] //http://www.securitylab.ru/analytics/216270.php

Gribunin V. G. Digital steganography / V. G. Gribunin, I. N. Okov, I. V. Turintsev. — M. : Solon Press, 2002. — 272 p.

Konahovich G.F. Computer steganography. Theory and Practice / G. F. Konahovich, A. Y. Puzyrenko. — K. : MC Press, 2006.

Dyakonov V. P. Wavelets. From theory to practice. Second edition, revised and supplemented /

V. P. Dyakonov. — M. : SOLON-Press, 2004. — Р. 81–85.

Published

2013-06-26

Issue

Section

Information Security