SYNTHESIS OF OPTIMAL STEGANOGRAPHIC METHOD MEETING GIVEN CRITERIA
Olesia Vovk
olesia.vovk@gmail.comKharkiv National University of Radio Electronics, Communication Networks Department (Ukraine)
Andrii Astrahantsev
Kharkiv National University of Radio Electronics, Communication Networks Department (Ukraine)
Abstract
One of the steganography areas is digital watermarking. In this paper, the technique of comparative analysis of embedding information methods into an image was proposed. A comprehensive analysis of the most relevant steganographic methods of hiding information was made. Own method of embedding information in still images was synthesized. The possibility of studied methods to adapt to the real channels was evaluated for the first time. The robustness and security of steganographic systems based on the proposed method were also demonstrated.
Keywords:
steganography, watermarking, optimization method, communication channelReferences
Benham D., Memon N., Yeo B. L., Yeung M.: Fast watermarking of DCT-based compressed images, Proc Int Conf Image Science, Systems, and Technology, Las Vegas, NV, 1997, 243–253.
Google Scholar
Cox I., Miller M., Bloom J., Fridrich J., Kalker T.: Digital Watermarking and Steganography. Second Edition. Elsevier, 2008.
Google Scholar
Das Gupta M. (ed.): Watermarking - Vol. 1, InTeO, Croatia, 2012.
Google Scholar
Domarev V. V.: Safety of information technology. Methodology of protection systems. Ltd. TID DS, 2001.
Google Scholar
Fridrich J., Goljan M.: Comparing robustness of watermarking techniques. Proc. SPIE Vol. 3657, 1999, 214–225.
Google Scholar
Fridrich J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambride University Press, Cambridge 2009.
Google Scholar
Jadav Y.: Comparison of LSB and Subband DCT Technique for Image Watermarking. Conference on Advances in Communication and Control Systems, 2013, 398–401.
Google Scholar
Kashyap N., Sinha G. R.: Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT). I. J. Modern Education and Computer Science, vol. 3, 2012, 50–56.
Google Scholar
Koch E., Zhao J.: Toward robust and hidden image copyright labeling. IEE Workshop Nonlinear Signal and Image Processing, Neos Marmaras, Greece, 1995, 456–459.
Google Scholar
Konakhovich G., Puzyrenko A.: Computer steganography. Theory and Practice. MK-Press 2006.
Google Scholar
Kutter M., Petitcolas F.: A fair benchmark for image watermarking systems. Proc. Of Security and Watermarking of Multimedia Contents, 1999, 226–239.
Google Scholar
Li Z., Xilan Y., Hongsong L., Minrong C.: A Dynamic Multiple Watermarking Algorithm Based on DWT and HVS. Int. J. Communications, Network and System Sciences, 5, 2012, 490–495.
Google Scholar
Lukichov V. V., Luzhetskyi V. A., Vasiura A. S.: Methods and tools of stenographic information security based on wavelet transformations: monograph. VNTU, Vinnytsia 2014.
Google Scholar
Mei Jiansheng, Li Sukang, Tan Xiaomei: A Digital Watermarking Algorithm Based On DCT and DWT. Proc. of the 2009 International Symposium on Web Information Systems and Applications, 2009, 104–107.
Google Scholar
Ó Ruanaidh J., Pun T.: Rotation, scale and translation invariant digital image watermarking. Proc. of the ICIP'97, vol. 1, 1997, 536–539.
Google Scholar
Piva A., Barni M., Bartolini F.: Threshold Selection for Correlation-Based Watermark Detection. Proceedings of COST 254 Workshop on Intelligent Communications, Italy, L'Aquila, 1998, 67–72.
Google Scholar
Singh P., Chadha R. S.: A Survey of Digital Watermarking Techniques, Applications and Attacks. International Journal of Engineering and Innovative Technology, Vol. 2, Issue 9, 2013, 165–175.
Google Scholar
Sridevi T., Kumar V.: A Robust Watermarking Algorithm Based on Image Normalization and DC Coefficients. International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, 2011, 226–232.
Google Scholar
Surekha B., Swamy G. N.: A Spatial Domain Public Image Watermarking. International Journal of Security and Its Applications, Vol. 5, No. 1, 2011, 1–12.
Google Scholar
Vovk O. O., Astrahantsev A. A.: Development of the technique for determining the importance of steganographic algorithms characteristics. Visnyk of Lviv Polytechnic National University, “Information systems and networks”, Lviv, No 805, 2014, 52–60.
Google Scholar
Authors
Olesia Vovkolesia.vovk@gmail.com
Kharkiv National University of Radio Electronics, Communication Networks Department Ukraine
Authors
Andrii AstrahantsevKharkiv National University of Radio Electronics, Communication Networks Department Ukraine
Statistics
Abstract views: 177PDF downloads: 69
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.