Steganographic Methods for Embedding and Detecting Hidden Messages Using GIF Images as Container Files

УДК 535.317.1

  • I.V. Ponomarev Altai State University (Barnaul, Russia) Email: igorpon@mail.ru
  • D.I. Strokin Altai State University (Barnaul, Russia) Email: mega.strokin@mail.ru
Keywords: container, message, palette, color index, least significant bit, histogram

Abstract

Over the past few decades, the development of new methods of storing, transferring, analyzing, and reproducing data has become increasingly important, considering the widespread development of information technologies and multimedia means. These methods also include means of ensuring the reliability, security, safety, and confidentiality of information when it is transmitted through various communication channels. Today, the fulfillment of the necessary data confidentiality requirements is developing in the direction of cryptography and steganography.

The article discusses a method of ensuring data confidentiality by means of Digital Steganography, using GIF images as container files. The features of this method are considered, the main steps of the algorithm are described, and the resulting file is analyzed. The second part of the article studies a method that estimates the probability of hiding information in the blocks of a container file. This method utilizes Pearson’s goodness-of-fit test. A number of test tests of the algorithm have been carried out to check the efficiency of this method. As a result, a computer program has been created using the Microsoft Visual Studio 2019 Community programming environment and the C# programming language (.NET Framework).

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Author Biographies

I.V. Ponomarev, Altai State University (Barnaul, Russia)

кандидат физико-математических наук, доцент кафедры математического анализа

D.I. Strokin, Altai State University (Barnaul, Russia)

студент Института математики и информационных технологий 

References

Грибунин В.Г., Оков И.Н., Туринцев И.В. Цифровая стеганография. М., 2009.

Хорошко В.А., Чекатков А.А. Методы и средства защиты информации. т., 2003.

Аргановский А.В., Балакин А.В., Грибунин В.Г., Сапожников С.А. Стеганография, цифровые водяные знаки и стеганоанализ. М., 2009.

Барсуков В.С., Романцов А.П. Компьютерная стеганография вчера, сегодня, завтра // Специальная техника. 1998. № 4, 5.

ИзычеваА.В., Сидоренко В.Г. Стеганографические методы защиты информации. М., 2017.

Shannon C.E. The communication theory of secrecy systems // Bell Sys. Tech. J. 1949. Vol. 28. № 4.

Конахович Г.Ф., Пузыренко А Ю. Компьютерная стеганография. Теория и практика / гл. ред. Ю.А. Шпак. Т., 2006.

Урбанович П.П. Защита информации методами криптографии, стеганографии и обфускации. Минск, 2016

Куркина М.В., Пономарев И.В., Строкин Д.И. Стеганографические методы, устойчивые к JPEG сжатию // Известия Алт. гос. ун-та 2021, № 1 (117), DOI: 10.14258/izvasu(2021)1-17.

Сэломон Д. Сжатие данных, изображений и звука. М., 2004.

Westfeld A., Pfitzmann A. Attacks on Steganographic Systems //Lecture Notes in Computer Science. 2000, Vol. 1768. DOI: 10.1007/10719724_5.

Published
2022-03-18
How to Cite
Ponomarev I., Strokin D. Steganographic Methods for Embedding and Detecting Hidden Messages Using GIF Images as Container Files // Izvestiya of Altai State University, 2022, № 1(123). P. 112-115 DOI: 10.14258/izvasu(2022)1-18. URL: http://izvestiya.asu.ru/article/view/%282022%291-18.