COMPUTING SYSTEMS AND NETWORKS
INTELLIGENCE SYSTEMS AND TECHNOLOGIES
APPLIED ASPECTS OF COMPUTER SCIENCE
SOFTWARE ENGINEERING
DATA PROCESSING AND ANALYSIS
I. A. Krivosheev, M. A. Linnik A practical Comparison of the Capabilities of Some Steganographic Methods
MATHEMATICAL MODELING
MATHEMATICAL FOUNDATIONS OF INFORMATION TECHNOLOGY
I. A. Krivosheev, M. A. Linnik A practical Comparison of the Capabilities of Some Steganographic Methods
Abstract. 

The article discusses the results of the most common methods of steganography. With the help of numerical simulation, the ability to resist steganalysis attacks at various stages related to the amount of information embedding was demonstrated. It was shown that adaptive methods of steganography can be considered the most acceptable.

Keywords: 

steganography, adaptive steganography, stegoanalysis, RS-steganalysis, Chi-square stegoanalysis, bit-slice analysis.

PP. 109-120.

DOI 10.14357/20718632230410 

EDN TUNEPY
 
References

1. Shelukhin, О. I., Kanaev, I.D. 2017. Steganografija. Algoritmy I programmnaja realizacija [Steganography. Algorithms and software implementation] Moskow: Hot line. 592 p.
2. Kokhanovich, GF, Puzyrenko, A.Y. 2006. Komp'juternaja steganografija. Teorija i praktika [Computer steganography. Theory and practice.]. К.: MK-Press. 288 p.
3. Gribunin, V.G., Okov, I.N. 2002. Cifrovaja steganografija [Digital steganography] Moskow: Solon-press. 272 p.
4. Fridrich, J., Long, M. Steganalysis of LSB encoding in color images / J. Fridrich, M. Long // Multimedia and Expo. 2000 IEEE International Conference. 2000. Vol. 3. pp. 1279-1282.
5. Kutter M., Jordan F., Bossen F. Digital Signature Of Color Images Using Amplitude Modulation / M. Kutter, F. Jordan, F. Bossen // Proc. of the SPIE Storage and Retrieval for Image and Video Databases V. 1997. Vol. 3022. pp. 518-526.
6. Pevny T., Filler T., Bas P. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography / T. Pevný, T. Filler, P. Bas // Information Hiding. 2010. pp. 161-177.
7. Holub V., Fridrich J. Designing Steganographic Distortion Using Directional Filters // Proc. 4th IEEE Intern. Workshop on Inform. Forensics and Security (WIFS). 2012. pp. 234-239.
8. Krivosheev I.A., Linnik M.A. 2022. Dinamicheskij sposob steganograficheskogo vstraivaniya informacii na osnove LSB [Dynamic algorithm of steganographic information embedding based on LSB]. Informacionnye tekhnologii i vychislitel'nye sistemy [Journal of Information Technologies and Computing Systems]. 2: 24-34.
9. Krivosheev I.A., Linnik M.A. 2021. Sposob vstraivaniya konfidencial'noj informacii v cvetnoe izobrazhenie [Method for embedding confidential information in a color image]. Patent RF No. 2749880.
10. Pfitzmann A., Westfeld A. Attacks on Steganographic Systems. Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned. IH 1999. LNCS, 1768: pp. 61-76.
11. Westfield A., Pfitzmann A. Attacks on Steganographic Systems Breaking the Steganography Utilities EzStego, Jsteg, Steganosand S-Tools and Some Lessons Learned // Dresden University of Technology, Department of Computer Science, Information Hiding, Third International Workshop, IH'99 Dresden Germany, September. 1999. pp. 61-76.
12. Fridrich J., Goljan M., Du R. Reliable Detection of LSB Steganography in Color and Grayscale Images // State Univ. of New York, Binghamton, NY, USA. 2001. pp. 27-30.
 
2024 / 01
2023 / 04
2023 / 03
2023 / 02

© ФИЦ ИУ РАН 2008-2018. Создание сайта "РосИнтернет технологии".