DOI: https://doi.org/10.33099/2311-7249/2020-37-1-55-60

Technology of selection of aerial photo area with various saturation for a stenographic transformation

Алі Енверович Бекіров, Володимир Жоржевич Ященок, Олександр Станіславович Крейдун

Abstract


Modern systems for collecting and processing information are widely represented by optical monitoring systems that are used for aerial reconnaissance, monitoring of critical infrastructure and transport communications. The problematic limitations in developing new and improving existing systems are increasing the end-user requirements regarding the quality of digital images in the conditions of limited bandwidth of data transmission channels. To reduce the volume of aerial photographs, it is proposed to use steganographic transformations with the selection of areas with different semantic saturations.

The article analyzes the possibility of selecting objects of interest using methods of machine recognition of contour information based on a moving mask. To eliminate the systemic limitations of this approach, which is the inability to identify elements of description of the interest’s object, it is proposed to use the convolution operation based on a set of filters. A technology is being developed for selecting insignificant areas that are used as containers for embedding information and areas with objects of interest, as a useful steganographic message. The first stage involves the selection of non-significant areas based on the coefficient of difference between the elements. At the second stage, the image is filtered based on the convolution operation with a set of filters that correspond to the expected image response after filtering.


Keywords


steganographic transformation; convolution operation; monitoring systems; object identification

References


1. Al-Shatnawi A.M. A new method in image steganography with improved image quality / Atallah M. Al-Shatnawi // Applied Mathematical Science, Vol. 6, 2012, no. 79, p. 3907-3915.

2. Bekіrov A.E. Metod zahistu іnformacії na osnovі steganografіchnih sistem // Ozbroєnnja ta vіjs'kova tehnіka. – 2015. №1 S. 29 – 36.

3. Bekirov A.E. Puti povyshenija informacionnoj bezopasnosti resursov v sistemah special'nogo naznachenija / Barannik V.V., Rjabuha Ju.N., Bekirov A.E. , Komolov D.I. // Chetverta mіzhnarodna naukovo-praktichna konferencіja [«Іnformacіjnі tehnologії ta komp’juterna іnzhenerіja»], (Vіnnicja, 28 - 30 travnja 2014 r.) / Vіnnic'kij nacіonal'nij tehnіchnij unіversitet, Vіnnicja, 2014. – S. 151.

4. Avinash K. Gulve A high capacity secured image steganography method with five pixel pair differencing and LSB substitution / Avinash K. Gulve, Madhuri S. Joshi // I.J. Image. Graphics and Signal Procesing, 2015, 5, p 66-74. 5. Basics of the case-method..

6. Pohrebelnaia N. Y. (2008). Keis-metod kak uslovye formyrovanyia yssledovatelskykh sposobnostei studentov vuza [Case-method as a condition for the formation of research abilities of university students]. Nauka y shkola, 73

7. Bekirov A. A steganographic method based on the modification of regions of the image with different saturation / Barannik V., Bekirov A., Lekakh A., Barannik D // 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018

8. Bekirov A. Detections of sustainable areas for steganographic embedding / Vladimir Barannik; Andriy Alimpiev; Ali Bekirov; Dmitriy Barannik // 2017 IEEE East-West Design & Test Symposium.

9. Jassim F.A. Five modulus method for Image compression / Firas A. Jasim // Signal and Image Processing: An international Journal (SIPIJ), vol. 3, no 5, pp. 26-34. 2012.


GOST Style Citations


1Al-Shatnawi A.M. A new method in image steganography with improved image quality / Atallah M. Al-Shatnawi // Applied Mathematical Science, Vol. 6, 2012, no. 79, p. 3907-3915.

2. Бекіров А.Е. Метод захисту інформації на основі стеганографічних систем // Озброєння та військова техніка. – 2015. ‑ №1 ‑ С. 29 – 36.

3. Бекиров А.Э. Пути повышения информационной безопасности ресурсов в системах специального назначения / Баранник В.В. , Рябуха Ю.Н. , Бекиров А.Е. , Комолов Д.И.  // Четверта міжнародна науково-практична конференція [«Інформаційні технології та комп’ютерна інженерія»], (Вінниця, 28 - 30 травня 2014 р.) / Вінницький національний технічний університет, Вінниця, 2014. – С. 151.

4. Avinash K. Gulve A high capacity secured image steganography method with five pixel pair differencing and LSB substitution / Avinash K. Gulve, Madhuri S. Joshi // I.J. Image. Graphics and Signal Procesing, 2015, 5, p 66-74.

5. Horoshko V.A. Metody i sredstva zashhity ifnormacii. / Horoshko V.A., Chekatov A.A. –K.: Junior, 2003. – 501s.

6. Judіn O.K. Zahist іnformacії v merezhah peredachі danih: pіdruchnik / G.F. Konahovich, O.G. Korchenko, O.K. Judіn. – K.: Vidavnictvo TOV NVP «ІNTERSERVІS», 2009. – 714s.

7. Bekirov A. A steganographic method based on the modification of regions of the image with different saturation / Barannik V., Bekirov A., Lekakh A., Barannik D // 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018

8. Bekirov A. Detections of sustainable areas for steganographic embedding / Vladimir Barannik; Andriy Alimpiev; Ali Bekirov; Dmitriy Barannik // 2017 IEEE East-West Design & Test Symposium.

9. Jassim F.A. Five modulus method for Image compression / Firas A. Jasim // Signal and Image Processing: An international Journal (SIPIJ), vol. 3, no 5, pp. 26-34. 2012.





ISSN 2410-7336 (Online)

ISSN 2311-7249 (Print)