SYNTHESIS OF OPTIMAL STEGANOGRAPHIC METHOD MEETING GIVEN CRITERIA

Olesia Vovk

olesia.vovk@gmail.com
Kharkiv National University of Radio Electronics, Communication Networks Department (Ukraine)

Andrii Astrahantsev


Kharkiv National University of Radio Electronics, Communication Networks Department (Ukraine)

Abstract

One of the steganography areas is digital watermarking. In this paper, the technique of comparative analysis of embedding information methods into an image was proposed. A comprehensive analysis of the most relevant steganographic methods of hiding information was made. Own method of embedding information in still images was synthesized. The possibility of studied methods to adapt to the real channels was evaluated for the first time. The robustness and security of steganographic systems based on the proposed method were also demonstrated.


Keywords:

steganography, watermarking, optimization method, communication channel

Benham D., Memon N., Yeo B. L., Yeung M.: Fast watermarking of DCT-based compressed images, Proc Int Conf Image Science, Systems, and Technology, Las Vegas, NV, 1997, 243–253.
  Google Scholar

Cox I., Miller M., Bloom J., Fridrich J., Kalker T.: Digital Watermarking and Steganography. Second Edition. Elsevier, 2008.
  Google Scholar

Das Gupta M. (ed.): Watermarking - Vol. 1, InTeO, Croatia, 2012.
  Google Scholar

Domarev V. V.: Safety of information technology. Methodology of protection systems. Ltd. TID DS, 2001.
  Google Scholar

Fridrich J., Goljan M.: Comparing robustness of watermarking techniques. Proc. SPIE Vol. 3657, 1999, 214–225.
  Google Scholar

Fridrich J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambride University Press, Cambridge 2009.
  Google Scholar

Jadav Y.: Comparison of LSB and Subband DCT Technique for Image Watermarking. Conference on Advances in Communication and Control Systems, 2013, 398–401.
  Google Scholar

Kashyap N., Sinha G. R.: Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT). I. J. Modern Education and Computer Science, vol. 3, 2012, 50–56.
  Google Scholar

Koch E., Zhao J.: Toward robust and hidden image copyright labeling. IEE Workshop Nonlinear Signal and Image Processing, Neos Marmaras, Greece, 1995, 456–459.
  Google Scholar

Konakhovich G., Puzyrenko A.: Computer steganography. Theory and Practice. MK-Press 2006.
  Google Scholar

Kutter M., Petitcolas F.: A fair benchmark for image watermarking systems. Proc. Of Security and Watermarking of Multimedia Contents, 1999, 226–239.
  Google Scholar

Li Z., Xilan Y., Hongsong L., Minrong C.: A Dynamic Multiple Watermarking Algorithm Based on DWT and HVS. Int. J. Communications, Network and System Sciences, 5, 2012, 490–495.
  Google Scholar

Lukichov V. V., Luzhetskyi V. A., Vasiura A. S.: Methods and tools of stenographic information security based on wavelet transformations: monograph. VNTU, Vinnytsia 2014.
  Google Scholar

Mei Jiansheng, Li Sukang, Tan Xiaomei: A Digital Watermarking Algorithm Based On DCT and DWT. Proc. of the 2009 International Symposium on Web Information Systems and Applications, 2009, 104–107.
  Google Scholar

Ó Ruanaidh J., Pun T.: Rotation, scale and translation invariant digital image watermarking. Proc. of the ICIP'97, vol. 1, 1997, 536–539.
  Google Scholar

Piva A., Barni M., Bartolini F.: Threshold Selection for Correlation-Based Watermark Detection. Proceedings of COST 254 Workshop on Intelligent Communications, Italy, L'Aquila, 1998, 67–72.
  Google Scholar

Singh P., Chadha R. S.: A Survey of Digital Watermarking Techniques, Applications and Attacks. International Journal of Engineering and Innovative Technology, Vol. 2, Issue 9, 2013, 165–175.
  Google Scholar

Sridevi T., Kumar V.: A Robust Watermarking Algorithm Based on Image Normalization and DC Coefficients. International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, 2011, 226–232.
  Google Scholar

Surekha B., Swamy G. N.: A Spatial Domain Public Image Watermarking. International Journal of Security and Its Applications, Vol. 5, No. 1, 2011, 1–12.
  Google Scholar

Vovk O. O., Astrahantsev A. A.: Development of the technique for determining the importance of steganographic algorithms characteristics. Visnyk of Lviv Polytechnic National University, “Information systems and networks”, Lviv, No 805, 2014, 52–60.
  Google Scholar

Download


Published
2015-09-02

Cited by

Vovk, O., & Astrahantsev, A. (2015). SYNTHESIS OF OPTIMAL STEGANOGRAPHIC METHOD MEETING GIVEN CRITERIA. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 5(3), 27–34. https://doi.org/10.5604/20830157.1166548

Authors

Olesia Vovk 
olesia.vovk@gmail.com
Kharkiv National University of Radio Electronics, Communication Networks Department Ukraine

Authors

Andrii Astrahantsev 

Kharkiv National University of Radio Electronics, Communication Networks Department Ukraine

Statistics

Abstract views: 177
PDF downloads: 69