Steganographic Methods Resistant to JPEG Compression

УДК 519.7

  • M.V. Kurkina Ugra State University (Khanty-Mansiysk, Russia) Email: m_kurkina@ugrasu.ru
  • I.V. Ponomarev Altai State University (Barnaul, Russia) Email: igorpon@mail.ru
  • D.I. Strokin Altai State University (Barnaul, Russia) Email: mega.strokin@mail.ru
Keywords: stegosystem, Koha — Zhao method, color space, file container

Abstract

The active development of computer systems and information technologies implies an increase in the importance of ensuring the protection and security of information during its transfer or storage. Today, the fulfillment of the necessary data confidentiality requirements tends to the direction of cryptography and steganography. The choice of the applied method of encoding information directly depends on the goals of the user, as well as the available software. The main requirement for the message encoding process is the availability of acceptable computational complexity of the implementation.

The article discusses methods of ensuring data confidentiality employing digital steganography, using BMP images as container files, and carrying out their subsequent compression to the JPEG format without losing hidden information. Mathematical methods of constructing a stegosystem for encoding ASCII are studied — a message, each character of which is encoded with exactly one byte. As a result, a computer program was created based on the Microsoft Visual Studio 2017 programming environment and the C# programming language (.NET Framework). The stereotype, in this case, is a sequence of steps between image pixels, into which information is embedded. In this case, the algorithm allows you to memorize not the entire sequence of steps (that is, not the entire keystroke), but only the first five characters of the key or half of the key.

Downloads

Download data is not yet available.

Author Biographies

M.V. Kurkina, Ugra State University (Khanty-Mansiysk, Russia)

кандидат физико-математических наук, доцент кафедры высшей математики

I.V. Ponomarev, Altai State University (Barnaul, Russia)

кандидат физико-математических наук, доцент кафедры математического анализа

D.I. Strokin, Altai State University (Barnaul, Russia)

студент кафедры математического анализа

References

Баричев С. Криптография без секретов. СПб., 2003.

Хорошко В.А., Чекатков А.А. Методы и средства защиты информации. Киев, 2003.

Конахович Г.Ф., Пузыренко А.Ю. Компьютерная стеганография. Киев, 2006.

Грибунин В.Г., Осков И.Н., Турницев И.В. Цифровая стеганография. М., 2009.

Сэломон Д. Сжатие данных, изображений и звука. М., 2004.

Филиппов М.В., Балашова С.А. Метод сокрытия информации в квантованных коэффициентах дискретного косинус преобразования // Инженерный вестник. 2016. № 8.

Koch E., Zhao J. Towards Robust and Hidden Image Copyright Labeling // IEEE Workshop on Nonlinear Signal and Image Processing. Neos Marmaras, 1995.

Аргановский А.В., Балакин А.В., Грибунин В.Г., Сапожников С.А. Стеганография, цифровые водяные знаки и стеганоанализ. М., 2009.

Shannon C.E. The communication theory of secrecy systems // Bell Sys. Tech. J. 1949. Vol. 28. № 4.

Урбанович П.П. Защита информации методами криптографии, стеганографии и обфускации. Минск, 2016.

Published
2021-03-17
How to Cite
Kurkina M., Ponomarev I., Strokin D. Steganographic Methods Resistant to JPEG Compression // Izvestiya of Altai State University, 2021, № 1(117). P. 102-105 DOI: 10.14258/izvasu(2021)1-17. URL: https://izvestiya.asu.ru/article/view/%282021%291-17.
Section
Математика и механика