An adaptive algorithm for the steganographic embedding information into the discrete Fourier transform phase spectrum
Evsyutin O., Kokurina A., Мещеряков Р. В., Шумская О. О.
On the example of digital images there are investigated properties of the discrete Fourier transform (DFT) used to embed information into the phase spectrum. The investigation helped to form a new steganografic algorithm that can be used in case of non- compressed images. Peculiarity of the algorithm is changeable size of information put into the blocks of stego-image. Characteristics of the suggested algorithm are comparable with the analog ones, they allow to get the correct information without mistakes.
Vol. 451: Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’16). , Springer, 2016
, , Signal Processing: Image Communication 2022 Vol. 100 Article 116523
Digital watermarking is an important scientific direction located at the intersection of cybersecurity and multimedia processing. Digital watermarking is used for digital objects copyright protection and protection against forgery. The importance of those tasks is highlighted by the ongoing COVID-19 pandemic that lasts for more than a year and forced multiple industries to transit to ...
Added: September 26, 2021
Алгоритм встраивания информации в сжатые цифровые изображения на основе операции замены с применением оптимизации
, , et al., Компьютерная оптика 2017 Т. 41 № 3 С. 412-421
In the paper, we consider a particular direction of digital steganography — information embedding into the compressed JPEG images. A scheme of information embedding based on procedures of DCT-coefficients replacement is introduced. Variants of the scheme algorithmic implementation are offered and investigated. A genetic algorithm is used for the improvement of the embedding quality. The ...
Added: September 4, 2019
Approach to increase in efficiency of information embedding into a phase spectrum of the discrete Fourier transformation due to minimization of quantity of changeable frequency coefficients
, , et al., , in : CEUR Workshop Proceedings. Vol. 2081: Selected Papers of the VIII All-Russian Scientific and Technical Conference on Secure Information Technologies (BIT 2017).: CEUR-WS.org, 2017. P. 54-58.
The steganography point is in that, the fact of confidential data existence in some container was a secret for the third parties. Methods of the digital steganography allow to hide an information in different digital objects: images, audio-and video files. In particular, information hiding in digital images can be used successfully for its subsequent imperceptible ...
Added: September 6, 2019
, , , Вестник компьютерных и информационных технологий 2018 № 10 С. 11-21
Steganalysis of digital images includes creation of feature space, formation of learning selection and qualifier training. Some known steganalysis systems offered for practical use work in space with dimension in tens of thousands of features. Therefore researches directed to identification of the most informative features including indicating use when embedding concrete steganographic primitives are relevant. ...
Added: September 4, 2019
Стеганографическое встраивание дополнительных данных в снимки дистанционного зондирования земли с помощью метода QIM с переменным шагом квантования в частотной области
, , , Известия Томского политехнического университета. Инжиниринг георесурсов 2019 Т. 330 № 8 С. 155-162
The relevance. One of the areas of digital image processing, including images of Earth remote sensing, is associated with the embedding of additional information into such images for various purposes. Embedding of additional information into a digital image leads to distortion of the digital image natural model, as well as to the possible occurrence of visual ...
Added: September 3, 2019
Approach to the selection of the best cover image for information embedding in JPEG images based on the principles of the optimality
, , , Journal of Decision Systems 2018 Vol. 27 No. sup1 P. 256-264
In the presented research, the decision support in order to increase the efficiency of providing confidentiality of information with the use of methods of digital steganography is considered. These methods allow one to secretly transmit confidential information using various digital objects. When hiding information with the use of steganography, digital images are often used, among ...
Added: September 3, 2019
A New Approach to Reducing the Distortion of the Digital Image Natural Model in the DCT Domain When Embedding Information According to the QIM Method
, , et al., , in : CEUR Workshop Proceedings. Vol. 2485: Proceedings of the 29th International Conference on Computer Graphics and Vision (GraphiCon 2019).: CEUR-WS.org, 2019. P. 268-272.
One of the areas of digital image processing is the steganographic embedding of additional information into them. Digital steganography methods are used to ensure the information confidentiality, as well as to track the distribution of digital content on the Internet. Main indicators of the steganographic embedding effectiveness are invisibility to the human eye, characterized by ...
Added: November 1, 2019
Обзор методов встраивания информации в цифровые объекты для обеспечения безопасности в «интернете вещей»
, , , Компьютерная оптика 2019 Т. 43 № 1 С. 137-154
Transmission, processing and storage of information in the infrastructure of the Internet of Things are related to the necessity for solving a number of problems in information security. The main difficulty lies in the fact that the infrastructure of the Internet of Things is not homogeneous and contains many different devices, including those with limited ...
Added: September 3, 2019
, , , , in : Proceedings of VII International Conference «Engineering & Telecommunication — En&T-2021. : IEEE, 2021.
The widespread use of remote communication technologies in various fields leads to new tasks of information security. Steganographic embedding is an effective method of protecting information transmitted over an open communication channel. Steganography techniques hide information in digital objects by embedding, making it invisible to an attacker. The most common covers for hiding additional information ...
Added: December 1, 2021
Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domain
, , Applied Soft Computing Journal 2023 Vol. 132 Article 109847
Image steganography and watermarking have demonstrated their efficiency in creating a covert communication channel and in digital image authentication respectively. The importance of cybersecurity tasks sets high efficiency requirements for information embedding methods. Many studies in this area focus on finding new ways to improve the embedding quality. One of them is to use metaheuristic ...
Added: November 29, 2021
, , et al., Информатика и автоматизация (Труды СПИИРАН) 2018 Т. 5 № 60 С. 128-155
This paper presents an approach to a robust watermark extraction from images containing text. Data extraction based on developed approach to robust watermark embedding into text data, characterizing by conversion invariance of text data into an image format. The comparative analysis of existing approaches of steganographic data embedding into text data is carried out, their ...
Added: September 3, 2019
Algorithm for Embedding Digital Watermarks in Wireless Sensor Networks Data with Control of Embedding Distortions
, , et al., , in : Distributed Computer and Communication Networks: 22nd International Conference, DCCN 2019. Vol. 1141.: Springer, 2019. P. 574-585.
The article presents a new algorithm for embedding digital watermarks in the data of wireless sensor networks. The algorithm is designed to protect against the substitution of the data source in such networks. An important distinguishing feature of the proposed algorithm is the ability to control the level of distortions introduced as a result of ...
Added: December 23, 2019
, , et al., , in : Journal of Physics: Conference Series. Vol. 803. Issue 1: International Conference on Information Technologies in Business and Industry 2016.: Institute of Physics Publishing, 2017. P. 1-6.
The aim of the study is to create a wide area information system that allows one to control processes of generation, embedding, extraction, and detection of steganographic information. In this paper, the following problems are considered: the definition of the system scope and the development of its architecture. For creation of algorithmic maintenance of the ...
Added: September 7, 2019
, , , Technologies 2020 Vol. 8 No. 4 Article 79
In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology. One of the urgent tasks is the protection of electronic documents during their transfer in information systems, including smart systems. This paper proposes a technology for protecting electronic documents containing digital images. ...
Added: December 24, 2020
The algorithm of the high-capacity information embedding into the digital images DCT domain using differential evolution
, , , in : CEUR Workshop Proceedings. Vol. 1901: Proceedings of the International conference Information Technology and Nanotechnology. Session Image Processing, Geoinformation Technology and Information Security.: CEUR-WS, 2017. P. 55-64.
Methods of the steganography are characterized by such efficiency rates as invisibility, robustness and capacity. There is considered the maximum capacity support of the information embedding into the DCT-domain. It is investigated the known algorithm that realizes the adaptive information embedding into the digital images frequency domain. The adaptivity is reached due to the image ...
Added: September 6, 2019
, Качество. Инновации. Образование 2014 № 10 С. 27-34
The task of the data protecting by its steganographic hiding in a graphic container is considered. The analysis of method of Kutter-Jordan-Bossen for steganographic embedding of data into a spatial domain of the bitmap image is made. A method for improving some characteristics of Kutter-Jordan-Bossen method is under consideration. The comparison analysis is made. The ...
Added: November 26, 2014
, , et al., , in : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11118 LNCS. Vol. 11118 .: Springer, 2018. P. 318-327.
Statement of Research. A need to reduce the increasing number of system vulnerabilities caused by unauthorized software installed on computer aids necessitates development of an approach to automate the data-storage media audit. The article describes an approach to identification of informative assembly instructions. Also, the influence of a chosen feature that is used to create ...
Added: April 24, 2019
, , et al., Прикладная информатика 2020 Т. 15 № 3 (87) С. 75-90
The rapid development of information technologies, the introduction of new cloud services, and the transfer of employees to remote work necessitate the adequate development of data leak Prevention (DLP) systems. The purpose of this article is to determine factors that affect this process and identify main trends in the development of DLP systems in the ...
Added: July 21, 2020
, , Промышленные АСУ и контроллеры 2021 № 9 С. 30-40
Information security risk event can be interpreted as bank losses associated with imperfect security systems: vulnerability to DDoS attacks, virus infections, imperfection of fraud monitoring systems. The draft regulation of the Central Bank of the Russian Federation on the operational risk management system in a credit institution and a banking group involves taking into account the component of this ...
Added: September 20, 2021
, , , Moscow University Computational Mathematics and Cybernetics 2016 Vol. 36 No. 2 P. 83-88
We study a formal model of cloud computing systems with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic public key cryptosystem we show how to build a cloud computing system secure in this model. ...
Added: October 13, 2016
, , Business Informatics 2015 No. 4 P. 71-78
This paperwork overviews core technologies implemented by comparably new products at information security market - web application firewalls. Web applications are a very wide-used and convenient way of presenting remote users with access to corporate information resources. It can however become single point of failure rendering all the information infrastructure unreachable for legitimate clients. To ...
Added: December 5, 2015
, , et al., , in : 17TH IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES, EUROCON 2017. : Institute of Electrical and Electronics Engineers Inc., 2017. P. 22-25.
In this paper, non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC) technique for downlink channel of next generation wireless network and its security issues are discussed. In NOMA, signals for all user equipment (UEs) are superimposed before transmission and then decoded at each UE implementing SIC. SIC relies on decoding and subtracting the signals ...
Added: April 26, 2019
Модель оценки рисков информационной безопасности информационных систем на основе облачных вычислений
, , Национальная безопасность / nota bene 2013 № 6 С. 46-54
Widespread acceptance and adoption of cloud computing calls for adaptation and development of existing risk assessment models of information systems. The approach suggested in this article can be used for risk assessment of information systems functioning on the basis of cloud computing technology, and assess the effectiveness of security measures. ...
Added: March 17, 2014
, , Проблемы информационной безопасности. Компьютерные системы 2018 № 4 С. 62-67
The paper examines probability-theoretic models of information distortion at message level. We research control sum distribution segments that are typical for network protocols like TCP. As an addition operation we use both bitwise coordinate addition and addition of numbers in binary code with carry. Control sum error probability for asymptotic assessments provided distortion probability is low ...
Added: July 31, 2019