Abstract.
The paper proposes a new method of steganographic information hiding based on the LSB method. A dynamic algorithm for embedding information into a color image is proposed, taking into account the peculiarities of the transient characteristics of individual blocks. Numerical modeling was used to evaluate the capabilities of this algorithm to resist attacks by various methods of steganalysis. The results of experimental studies have shown the advantage of this algorithm. This algorithm can be used to embed information in image formats without information compression.
Keywords:
steganography, stego-carrier, stegoanalysis, determinant, LSB, RS-steganalysis, Chi-square stegoanalysis, bit-slice analysis.
PP. 24-34.
DOI 10.14357/20718632220303 References
1. Kokhanovich, GF, Puzyrenko, A.Y. 2006. Komp'juternaja steganografija. Teorija i praktika [Computer steganography. Theory and practice.]. К.: MK-Press,. 288 p. 2. Abazina, E.S. 2016. Cifrovaya steganografiya: sostoyanie i perspektivy [Digital steganography: state of the art and prospects]. Sistemy upravleniya, svyazi i bezopasnosti [Control Systems, Communications and Security]. № 2: 182-201. 3. Gribunin, V.G., Okov, I.N. 2002. Cifrovaja steganografija [Digital steganography] Moskow: Solon-press. 272 p. 4. Krivosheev, I.A., Linnik, M.A. 2020. Staticheskij sposob steganograficheskogo vstraivanija informacii na osnove LSB [Static way of steganographic information embedding based on LSB]. Sistemy i sredstva informatiki [Systems and Means of Informatics]. 30(3): 56-66. 5. Westfield A., Pfitzmann A. Attacks on Steganographic Systems Breaking the Steganography Utilities EzStego, Jsteg, Steganosand S-Tools and Some Lessons Learned // Dresden University of Technology, Department of Computer Science, Information Hiding, Third International Workshop, IH'99 Dresden Germany, September. 1999. pp. 61-76. 6. Urbanovich N. Plaskovitsky V. The use of steganographic techniques for protection of intellectual property rights // New Electrical and Electronic Technologies and Their Industrial Implementation: 7th Conference (International). 2011. pp. 147-148. 7. Pevny T. Filler T., Bas P. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography / T. Pevný, T. Filler, P. Bas // Information Hiding. 2010. pp. 161-177. 8. Holub V. Designing Steganographic Distortion Using Directional Filters // Proc. 4th IEEE Intern. Workshop on Inform. Forensics and Security (WIFS). 2012. pp. 234-239. 9. Pevny T. Bas P., Fridrich J. Steganalysis by subtractive pixel adjacency matrix // IEEE Transactions on Information Forensics and Security. 2010. 5(2). pp. 215-224. 10. Wang P., Wei Z., Xiao L. Pure spatial rich model features for digital image steganalysis // Multimedia Tools and Application. 2015. 75(5). pp. 2897–2912. 11. Krivosheev, I.A., Linnik, M.A.., Kozhevnikova T.V. 2020. Sposob vstraivanija informacii v cvetnoe izobrazhenie [Method of embedding information into a color image]. Patent RF No. 2738250. 12. Dryuchenko M.A., Sirota A. A. 2014. Algoritm steganograficheskogogo skrytiya informacii na osnove pros-transtvennoj deformacii fragmentov polnocvetnyh izobrazhenij [Steganographic information hiding algorithm based on spatial deformation of full-color image fragments]. Komp'yuternaya optika [Computer optics]. 38(4): 833-842. 13. Krivosheev I.A., Linnik M.A. 2021. Sposob vstraivaniya konfidencial'noj informacii v cvetnoe izobrazhenie [Method for embedding confidential information in a color image]. Patent RF No. 2749880. 14. Krivosheev, I.A., Linnik, M.A. 2017. K voprosu ob otsenke ustoychivosti steganograficheskoy sistemy [On the issue of assessing the stability of a steganographic system]. Uchenye zametki TOGU [TOGU Science Notes]. 8(2): 433-437. 15. Anisimov, B.V. 1983. Raspoznavanie i cifrovaja obrabotka izobrazhenij [Recognition and digital processing of images]. Moskow.: High School. 295 p. 16. Gonzalez R., Woods R. Tsifrovaya obrabotka izobrazheniy [Digital image processing]. Moskow: Tekhnosfera. 1072 p. 17. Pfitzmann, A., Westfeld, A. Attacks on Steganographic Systems. Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned. IH 1999. LNCS, 1768: pp. 61-76 18. Fridrich J., Goljan M., Du R. Reliable Detection of LSB Steganography in Color and Grayscale Images // State Univ. of New York, Binghamton, NY, USA. 2001. pp. 27-30. 19. Fridrich J., Du R., Meng L. Steganalysis of LSB Encoding in Color Images // IEEE International Conference on Multimedia and Expo: IEEE Computer Society Press. 2000. Vol.3. pp. 1279-1282. 20. Evsyutin O.O. 2014. Modifikaciya steganograficheskogo metoda LSB, osnovannaya na ispol'zovanii blochnyh kletochnyh avtomatov [Modification of the LSB steganographic method based on the use of block cellular automata]. Inofrmatika i sistemy upravleniya [Inofrmatika and control systems]. 39(1): 15-22.
|