DOI: https://doi.org/10.33099/2311-7249/2019-34-1-115-120

Steganographic method based on the direct and indirect data embedding for image areas with different consistency

Ali Bekirov, Volodymyr Yaschenok, Oleksandr Kreidun

Abstract


In today's conditions of the situation and during the stabilization operation of the combined forces, the Air Forces of Ukraine is one of the main carriers of the combat capabilities of the Armed Forces of Ukraine. An analysis of the tendencies of the introduction of digital technologies of secret management and data transmission in the Armed Forces of the Air Forces of Ukraine during the construction of a modern military control system has been carried out. Today, in addition to the development of new models of aviation technology, the modernization of existing on-board electronic equipment is actively being carried out.

The purpose of this article is to develop a steganographic method based on the co-use of direct and indirect data embedding.In this article, the features of using steganographic methods for hiding information are considered. Requirements to the developed method are formed, which consists in minimizing and distributing the distortions of the original container image as a result of embedding information. The main requirements for the design of the indirect embedding method are determined. An estimation of the number of elements that can be embedded in an image block of a certain size is made. A rule for the selection of image regions with different saturation is formulated. A rule for determining the position of the reference and operating points while embedding is formulated. A method of indirect steganographic embedding is developed on the basis of the modification of the working elements of the block relative to the reference point in three levels. It is proposed to use the embedding method based on the modification of the least significant bit. A system of direct and reverse steganographic transformation based on the developed method of indirect embedding is created.


Keywords


steganographic system; the least significant bit; indirect steganographic embedding

References


1. Verba, V., Sydorenko O. (2001). Metodychne napovnennia kursu «Proektnyi analiz» [Methodical content of the course "Project Analysis"]. Sytuatsiina metodyka navchannia: ukrainskyi dosvid. Tsentr innovatsii ta rozvytku, 165-170.

2. Dolgorukov A. Case-study method as modern technology of vocational training.

3. Zhyhylei, Y. M. (2012). Formyrovanye professyonalnykh kompetentsyi s pomoshchiu keismetoda v vysshem obrazovanyy [Formation of professional competencies using the case-method in higher education]. Prepodavatel KhKhI vek, 29-36.

4. Malysheva M.A. (2011). Sovremennye tekhnolohyy obuchenyia y ykh rol v obrazovatelnom protsesse [Modern technologies of teaching and their role in the educational process]. Sovremennnye tekhnolohyy obuchenyia v vuze (opyt NYU VShЭ v Sankt-Peterburhe). – SPb, 6-25.

5. Basics of the case-method.

6. Pohrebelnaia N. Y. (2008). Keis-metod kak uslovye formyrovanyia yssledovatelskykh sposobnostei studentov vuza [Case-method as a condition for the formation of research abilities of university students]. Nauka y shkola, 73.

7. Surmin Yu. P. (2005). Metod analizu sytuatsii (Case study) ta yoho navchalni mozhlyvosti. Hlobalizatsiia i Bolonskyi protses: problemy i tekhnolohii [Case-study method and its educational capabilities. Globalization and the Bologna process: problems and technologies], 71-82.

8. Surmyn Yu.P.(2002). Sytuatsyonnyi analyz, yly Anatomyia Keis-metoda [Situational Analysis, or Case Method Anatomy]. Tsentr ynnovatsyi y razvytyia, 41-56.


GOST Style Citations


1. Аграновски А.В. Стеганография, цифровые водяные знаки и стегоанализ [Тест]: учеб. пособие для вузов / Аграновски А.В. , Балакин А.В. , Грибунин В.Г . – М.:Вузовская книга, 2009. – 220 с.

2. Бекіров А.Е. Метод захисту інформації на основі стеганографічних систем // Озброєння та військова техніка. – 2015. ‑ №1 ‑ С. 29 – 36.

3.  Бекиров А.Э. Пути повышения информационной безопасности ресурсов в системах специального назначения / Баранник В.В. , Рябуха Ю.Н. , Бекиров А.Е. , Комолов Д.И.  // Четверта міжнародна науково-практична конференція [«Інформаційні технології та комп’ютерна інженерія»], (Вінниця, 28 - 30 травня 2014 р.) / Вінницький національний технічний університет, Вінниця, 2014. – С. 151.

4.  Баранник В.В. Основы теории структурного стеганографического кодирования / В.В. Баранник, Д.В. Баранник, А.Е. Бекиров – Х.: Издательство «Лидер», 2017. ‑ 256 с.

5. Хорошко В.А. Методы и средства защиты ифнормации. / Хорошко В.А., Чекатов А.А. –К.: Юниор, 2003. – 501с.

6.  Юдін О.К. Захист інформації в мережах передачі даних: підручник / Г.Ф. Конахович, О.Г. Корченко, О.К. Юдін. – К.: Видавництво ТОВ НВП «ІНТЕРСЕРВІС», 2009. – 714с.

7. Bekirov A. A steganographic method based on the modification of regions of the image with different saturation / Barannik V., Bekirov A., Lekakh A., Barannik D // 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018

8. Bekirov A. Detections of sustainable areas for steganographic embedding / Vladimir Barannik; Andriy Alimpiev; Ali Bekirov; Dmitriy Barannik // 2017 IEEE East-West Design & Test Symposium. 9. Cox I.J. Bloom, J.A. Fridrick, amd T. Kalkert. (2008), Digital watermarking and steganography, Morgan Kaufman Publishers, USA, pp. 1-591.





ISSN 2410-7336 (Online)

ISSN 2311-7249 (Print)