An experimental study of the stability of the bitwise data hiding method, relative to attacks, based on affine transformations
DOI:
https://doi.org/10.18372/2410-7840.16.7615Keywords:
information security, digital steganography, bitwise method of data hiding, vector images, Bezier curves, affine transformationsAbstract
In this work an experimental study was conducted toverify the stability of the bitwise data hiding method inthe structure of vector image, relative to attacks, based onaffine transformations. The arbitrarily SVG image, in thestructural composition of which were the commands ofconstructing Bezier curves, was chosen for theexperiment. In one of these curves, by its gradual separationinto a visually identical aggregate of segments, werehiding data of different sizes. The various affine transformationssuch as permutation, rotation, offset along theabscissa and ordinate, proportional and non-proportionalscaling were gradually performed over received steganocontainer.The received results for the transformationof the steganocontainer showed that the consideredmethod of hiding data in vector images providesresistance to attacks based on affine transformations.References
. Кінзерявий О.М. Стеганографічний метод приховування даних у векторних зображеннях /О.М. Кінзерявий, В.Ю. Ковтун, С.О. Гнатюк, В.М. Кінзерявий // теоретичний і науково-практичний журнал "Вісник Інженерної академії України". – 2013. – №3-4. – С. 66-68.
. Маценко В.Г. Комп’ютерна графіка: [навч. посібник] / В.Г. Маценко. – Ч.: Рута, – 2009. – 343 с.
. Голованов Н.Н. Геометрическое моделирование/ Н.Н. Голованов. – М. : издательство Физико-математической литературы, – 2002. – 472 с.
. Бахрушина Г.И. Моделирование геометрических атак на основе аффинных преобразований / Г.И. Бахрушина // электронное научное издание "Ученые заметки ТОГУ". – 2013. – Т.4, №4. – С. 1291-1297.
. Яглом И.М. Идеи и методы аффинной и проективной геометрии : [часть I] // И.М. Яглом, В.Г. Ашкинузе. – М. : Учпедгиз, – 1962. – 248 с.
. Роджерс Д. Математические основы машиннойграфики : [пер. с англ.] / Д. Роджерс, Дж. Адамс. – М. : Мир, – 2001. – 604 с.
. Кунву Ли Основы САПР (САО/САМ/САЕ) / Ли Кунву. – СПб. : Питер, – 2004. – 560 с.
. Кінзерявий О.М. Експериментальне дослідження методу побітового приховування даних у векторні зображення / О.М. Кінзерявий, В.Ю. Ковтун // науковий журнал "Безпека інформації". –
– Т.20, №1. – С. 66-70.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).