SIMULATION OF GEOMETRIC ATTACKS AGAINST TRANSMISSION SYSTEMS OF THE HIDDEN INFORMATION

Authors

  • А. С. Шматок
  • А. Б. Петренко
  • А. Б. Єлізаров
  • В. С. Панадій

DOI:

https://doi.org/10.18372/2310-5461.28.9675

Keywords:

information security, steganography, steganalysis, geometric attack, affine transformations

Abstract

An actual objective is justified, and tasked by to development algorithm of the software, which will performgeometric attack on the container, as amended by LSB him hidden information. The aim of the task was to developan automatic mechanism to destruct hidden information in a graphical container through geometric to allposted users resources of the channels. As a result, to protect the system from malicious code and protectagainst leaks of confidential information hidden by methods of steganography, steganalyst no longer have tocheck every container. Through affinity attacks, the system will provide protection by itself, thereby significantlyreducing the amount of time, and due to continuing increase in productivity of automated systems, processingperformance of the mechanism will increase.

References

Some problems of warfare in modern information systems / [U. V. Korotkov, R. M. Kovalev, I. N. Okov, I. V. Turintsev]. – S.Pb.: Collection of scientific works of the Military University of Communications, 2001. — 312 p.

Gribunin V. G. Digital steganography / V. G. Gribunin, I. N. Okov, I. V. Turintsev. — M. : Solon-Press, 2009. — 265 p.

Konahovich G.F. Computer steganography. Theory and practice / G.F. Konahovich, A.U. Puzyrenko. – K.: "MK-Press", 2006. — 288 p.

Yaglom I. M. Ideas and methods of affine and projective geometry. Part 1: Affine Geometry / I. M. Yaglom, V. G. Ashkinuze. — M. : Uchpedgiz, 1962. — 245 p.

Muskhelishvili N. I. Course of analytical geometry/ N.I . Muskhelishvili. — M..: MGU, 1967. — 655 p.

Aleksandrov P. S. Lectures of analytical geometry/ P. S. Aleksandrov. — M. : Nauka, 1968. — 912 p.

Shmatok A. S. Active attack on steganography container / A. S. Shmatok, A. B. Petrenko, V. A. Tytov, E. A. Borysenko // Science-based technologies. — 2013. — № 2 (18). — P. 189–192.

Shmatok A. S. Steganalysis of graphic container / A. S. Shmatok, A. B. Petrenko, A. B. Yelizarov, V. A. Tytov, E.A. Borysenko // Science-based technologies. — 2013. — № 4 (20). — P. 426–429.

Published

2015-11-27

Issue

Section

Information Security