Steganographic Methods Resistant to JPEG Compression
УДК 519.7
Abstract
The active development of computer systems and information technologies implies an increase in the importance of ensuring the protection and security of information during its transfer or storage. Today, the fulfillment of the necessary data confidentiality requirements tends to the direction of cryptography and steganography. The choice of the applied method of encoding information directly depends on the goals of the user, as well as the available software. The main requirement for the message encoding process is the availability of acceptable computational complexity of the implementation.
The article discusses methods of ensuring data confidentiality employing digital steganography, using BMP images as container files, and carrying out their subsequent compression to the JPEG format without losing hidden information. Mathematical methods of constructing a stegosystem for encoding ASCII are studied — a message, each character of which is encoded with exactly one byte. As a result, a computer program was created based on the Microsoft Visual Studio 2017 programming environment and the C# programming language (.NET Framework). The stereotype, in this case, is a sequence of steps between image pixels, into which information is embedded. In this case, the algorithm allows you to memorize not the entire sequence of steps (that is, not the entire keystroke), but only the first five characters of the key or half of the key.
Downloads
References
Баричев С. Криптография без секретов. СПб., 2003.
Хорошко В.А., Чекатков А.А. Методы и средства защиты информации. Киев, 2003.
Конахович Г.Ф., Пузыренко А.Ю. Компьютерная стеганография. Киев, 2006.
Грибунин В.Г., Осков И.Н., Турницев И.В. Цифровая стеганография. М., 2009.
Сэломон Д. Сжатие данных, изображений и звука. М., 2004.
Филиппов М.В., Балашова С.А. Метод сокрытия информации в квантованных коэффициентах дискретного косинус преобразования // Инженерный вестник. 2016. № 8.
Koch E., Zhao J. Towards Robust and Hidden Image Copyright Labeling // IEEE Workshop on Nonlinear Signal and Image Processing. Neos Marmaras, 1995.
Аргановский А.В., Балакин А.В., Грибунин В.Г., Сапожников С.А. Стеганография, цифровые водяные знаки и стеганоанализ. М., 2009.
Shannon C.E. The communication theory of secrecy systems // Bell Sys. Tech. J. 1949. Vol. 28. № 4.
Урбанович П.П. Защита информации методами криптографии, стеганографии и обфускации. Минск, 2016.
Izvestiya of Altai State University is a golden publisher, as we allow self-archiving, but most importantly we are fully transparent about your rights.
Authors may present and discuss their findings ahead of publication: at biological or scientific conferences, on preprint servers, in public databases, and in blogs, wikis, tweets, and other informal communication channels.
Izvestiya of Altai State University allows authors to deposit manuscripts (currently under review or those for intended submission to Izvestiya of Altai State University) in non-commercial, pre-print servers such as ArXiv.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).



