Steganographic method for protection the objects of intellectual properties and intellectual rights
DOI:
https://doi.org/10.18372/2410-7840.19.12207Keywords:
information security system, intellectual property, intellectual rights law, decomposition on the bitplane, dynamic graphic objects, computing environment MATLABAbstract
The protection of information, marked as intellectual property or copyrights, is a very special technical task, because often it is difficult to define, if this information is legally protected or the protection of information is not of-fered as an option. This task can be partly solved by using the “Copyright Demonstration” script, or by script named as “No Copy” script. In the most cases this method of pro-tection is known as information hiding. As a result, the modification of cryptographic embedded type of LSB–algorithm with keys was developed. The strength of algo-rithm has been improved in comparison with classical ste-gano – LSB–algorithms. The main point of proposed ste-ganographic method is the embedding of full-colored im-ages into dynamic full-colored information objects. This way, if the image pixel intensity level changes from 0 to 255, it means that this image can be represented in eight bit-planes. Accordingly, this method is based on LSB–methodology of information hiding. The article deals with the methodology of system development for protecting and transferring graphic, text data to dynamic graphic objects.The modeling was made in the MATLAB application environment and thus the time depending results were ob-tained. On the basis of the developed LSB–method modi-fication one can improve the protection of intellectual property rights in animated and video graphic objects by embedding the various full-colored digital watermarks. Also, the proposed method may have also a versatile usage.References
M. Khosrow-Pour, "Encyclopedia of E-Commerce, E-Government and Mobile Commerce", Resources Management Association. Idea Group Reference, pp. 480-487, 2006.
M. Barni, F. Bartolini, Watermarking Systems Engineering, NewYork: Marcel Dekker, inc., 2004, 485 p.
Цивільний кодекс України. Стаття 505. Поняття комерційної таємниці: [Електронний ресурс]. Режим доступу: http:// radnuk. info / komentar / chky / chky-knuga4/140-kn4-glava46/2214--505-.html.
F. Shih, Watermarking, Steganography, and Forensics, New York: CRC Press, 2012, 424 p.
К. Защелкин, А. Ищенко, Е. Иванова, "Решение проблемы классификации блоков контейнера при JPEG-атаке на стеганографический метод Бенгана-Мемона-Эо-Юнг", Радіоелектронні і комп’ютерні системи, №6(70), С. 164-168, 2014.
J. Fridrich, Steganography in Digital Media, New York: Cambridge University. Press, 2010, 448 p.
I. Cox, M. Miller, J. Bloom, J. Fridrich, Digital Watermarking and Steganography, Burlington: Morgan Kaufmann Publishers, 2008, 592 p.
В. Федосеев, Цифровые водяные знаки и стеганография, Самара. Издательство СГАУ, 2015, 128 с.
F. Hartung, B. Girod, "Watermarking of Uncom-pressed and Compressed Video", Signal Processing, vol. 66, no. 3, pp. 283–301, 1998.
T. Kalker, A.J.E.M. Janssen, "Analysis of Watermark Detection using SPOMF", Proceedings of ICIP, vol. 1, pp. 316-319, 1999.
H.J. Wang, P.C. Su, C.C.J. Kuo, "Wavelet-based digital image watermarking", Optics Express, vol. 3, no. 12, pp. 491–496, 1998.
R. Wang, Introduction to Orthogonal Transforms: with Applications in Data Processing and Analysis, Cambridge University Press, 2011.
Н. Глумов, В. Митекин, "Алгоритм встраивания полухрупких цифровых водяных знаков для задач аутентификации изображений и скрытой передачи информации", Компьютерная оптика, Т. 35, С. 262–267, 2011.
Цивільний кодекс України. ч. 2 ст. 433. [Електронний ресурс]. Режим доступу: Закон України "Про авторське право і суміжні права". Ст. 11. [Електронний ресурс]. Режим доступу: http://zakon2. rada.gov.ua/laws/show/3792-12/page.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).