STEGANALYSIS OF GRAPHIC CONTAINER

Authors

  • A. S. Shmatok
  • A. B. Petrenko
  • A. B. Yelizarov
  • V. A. Tytov
  • E. A. Borysenko

DOI:

https://doi.org/10.18372/2310-5461.20.5689

Keywords:

information security, steganography, steganalysis, statistical pattern recognition theory, testing the assumption of normality, algorithm

Abstract

The author was motivated and on task elaboration algorithm of the software will perform a passive attack on the container of the amended by GSZ (Least Significant Bit) hidden information. The aim of the task was to automate the process of passive stegoanalysis graphics container with the help of statistical pattern recognition theory. This is achieved by aligning the statistical characteristics of the subject container and comparing it to the original container. The result of this comparison is the value which will include a container into two classes using this algorithm allows stegoanalitik check only suspicious containers, which significantly reduces the time spent compared to screen all containers and due to the continuing increase in the productivity of automated systems, time processing blocks automation algorithm stegoanalysis will decrease.

References

Ivanov V. To show all that is hidden: stegoanalysis – steganography detection, principles and methods [electronic resource] / V. Ivanov // Steganography & travelling. — 2012. http://nestego.-blogspot.com/2012/05/blog-post_21.html.

Ivanov V. Types of attack on steganography system:[ electronic resource] / V. Ivanov // Steganogra-phy & travelling. — 2012. http:// nestego.-blogspot.-com/2012/05/blog-post_18.html.

Fomin Y. A. Statistical theory of pattern recog-nition / Y. A. Fomin, G. P. Tarlovskiy. — M. : Radio and communication, 1986. — 264 с.

Levin B. R. Theoretical foundations of statisti-cal radio engineering / B. R. Levin. — M. : Sov. radio, 1974–1976. — B. 1–3. – book 1 — 552 p., book 2 — 392 p., book 3 — 288 p.

Published

2013-12-05

Issue

Section

Information Security