SYNTHESIS OF OPTIMAL STEGANOGRAPHIC METHOD MEETING GIVEN CRITERIA
Article Sidebar
Open full text
Issue Vol. 5 No. 3 (2015)
-
APPLICATION OF AN ELECTROMAGNETIC NUMERICAL MODEL IN ACCURATE MEASUREMENT OF HIGH VELOCITIES
Pavel Fiala, Martin Friedl3-10
-
USING OF PROGRAM COMPLEX “DEFORM 2D/3D” IN SCIENTIFIC WORK IN THE DEVELOPMENT OF NEW INNOVATIVE TECHNOLOGIES
Sergey Lezhnev, Olga Krivtsova, Evgeniy Panin11-13
-
SOLUTIONS OF FORWARD PROBLEMS OBTAINED VIA BOUNDARY ELEMENT METHOD FOR NONHOMOGENEOUS DOMAINS IN REGARD TO ELECTRICAL CONDUCTIVITY
Paweł Tchórzewski14-18
-
THE WEB APPLICATION FOR GEOLOCALISATION AND COMMEMORATION A BURIAL PLACE
Damian Bykowski, Dariusz Bober19-26
-
SYNTHESIS OF OPTIMAL STEGANOGRAPHIC METHOD MEETING GIVEN CRITERIA
Olesia Vovk, Andrii Astrahantsev27-34
-
THE FUNCTIONAL STABILITY OF ON-BOARD INFORMATION-CONTROLLING COMPLEXES OF MANEUVERABLE VEHICLES
Georgiy Baranov , Viktoriia Kosenko35-38
-
ENSURING OF FUNCTIONAL STABILITY OF DIFFICULT DYNAMIC SYSTEMS AS ONE OF URGENT SCIENTIFIC TASKS OF MODERN THEORY OF AUTOMATIC CONTROL
Oleg Mashkov, Viktoriia Kosenko39-42
-
SELECTED METHODS OF TEMPERATURE MEASUREMENTS OF PLASMA IN PLASMA JET REACTORS
Piotr Terebun, Piotr Krupski, Michał Kwiatkowski, Radosław Samoń, Jarosław Diatczyk, Joanna Pawłat, Henryka Stryczewska43-46
-
POWER SYSTEM MODELING BASED ON THE CIM STANDARD IEC61970
Adam Rzepecki47-50
-
HOW STABLE ARE INSTRUMENTAL BIASES P2-C2?
Kamil Krasuski51-52
-
SAFETY OF LEDS USED
Stanisław Marzec53-54
-
PHOTOVOLTAIC POWER PLANT INSPECTION AND DIAGNOSTIC
Michal Vrana, Jan Moravek, Petr Mastny55-58
-
RELIABILITY ANALYSIS OF EMERGENCY DECAY HEAT REMOVAL IN PWR REACTOR
Karol Kowal, Mieczysław Borysiewicz59-64
-
MEASUREMENTS OF ELECTRICAL PROPERTIES OF NANOCOMPOSITE CONTAINING METALLIC ALLOY FeCoZr IN A PbZrTiO3 DIELECTRIC MATRIX
Oleksandr Boiko, Tomasz Kołtunowicz65-70
-
THE INFLUENCE OF SOLAR COLLECTOR APPLICATIONS ON THE ECONOMICS OF DOMESTIC HOT WATER PRODUCTION
Justyna Gołębiowska71-78
-
RESEARCH OF ELECTRICAL PARAMETERS OF START-UP PROCESS OF DIESEL ENGINES
Jacek Caban79-85
-
ENSURING THE STABILITY OF CONTACT MEASUREMENTS IN AUTOMATED CONTROL SYSTEMS FOR PRECISION GRINDING
Pavlo Sholom86-92
Archives
-
Vol. 7 No. 4
2017-12-21 23
-
Vol. 7 No. 3
2017-09-30 24
-
Vol. 7 No. 2
2017-06-30 27
-
Vol. 7 No. 1
2017-03-03 33
-
Vol. 6 No. 4
2016-12-22 16
-
Vol. 6 No. 3
2016-08-08 18
-
Vol. 6 No. 2
2016-05-10 16
-
Vol. 6 No. 1
2016-02-04 16
-
Vol. 5 No. 4
2015-10-28 19
-
Vol. 5 No. 3
2015-09-02 17
-
Vol. 5 No. 2
2015-06-30 15
-
Vol. 5 No. 1
2015-03-31 18
-
Vol. 4 No. 4
2014-12-09 29
-
Vol. 4 No. 3
2014-09-26 22
-
Vol. 4 No. 2
2014-06-18 21
-
Vol. 4 No. 1
2014-03-12 19
-
Vol. 3 No. 4
2013-12-27 20
-
Vol. 3 No. 3
2013-07-24 13
-
Vol. 3 No. 2
2013-05-16 9
-
Vol. 3 No. 1
2013-02-14 11
Main Article Content
DOI
Authors
Abstract
One of the steganography areas is digital watermarking. In this paper, the technique of comparative analysis of embedding information methods into an image was proposed. A comprehensive analysis of the most relevant steganographic methods of hiding information was made. Own method of embedding information in still images was synthesized. The possibility of studied methods to adapt to the real channels was evaluated for the first time. The robustness and security of steganographic systems based on the proposed method were also demonstrated.
Keywords:
References
Benham D., Memon N., Yeo B. L., Yeung M.: Fast watermarking of DCT-based compressed images, Proc Int Conf Image Science, Systems, and Technology, Las Vegas, NV, 1997, 243–253.
Cox I., Miller M., Bloom J., Fridrich J., Kalker T.: Digital Watermarking and Steganography. Second Edition. Elsevier, 2008.
Das Gupta M. (ed.): Watermarking - Vol. 1, InTeO, Croatia, 2012.
Domarev V. V.: Safety of information technology. Methodology of protection systems. Ltd. TID DS, 2001.
Fridrich J., Goljan M.: Comparing robustness of watermarking techniques. Proc. SPIE Vol. 3657, 1999, 214–225.
Fridrich J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambride University Press, Cambridge 2009.
Jadav Y.: Comparison of LSB and Subband DCT Technique for Image Watermarking. Conference on Advances in Communication and Control Systems, 2013, 398–401.
Kashyap N., Sinha G. R.: Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT). I. J. Modern Education and Computer Science, vol. 3, 2012, 50–56.
Koch E., Zhao J.: Toward robust and hidden image copyright labeling. IEE Workshop Nonlinear Signal and Image Processing, Neos Marmaras, Greece, 1995, 456–459.
Konakhovich G., Puzyrenko A.: Computer steganography. Theory and Practice. MK-Press 2006.
Kutter M., Petitcolas F.: A fair benchmark for image watermarking systems. Proc. Of Security and Watermarking of Multimedia Contents, 1999, 226–239.
Li Z., Xilan Y., Hongsong L., Minrong C.: A Dynamic Multiple Watermarking Algorithm Based on DWT and HVS. Int. J. Communications, Network and System Sciences, 5, 2012, 490–495.
Lukichov V. V., Luzhetskyi V. A., Vasiura A. S.: Methods and tools of stenographic information security based on wavelet transformations: monograph. VNTU, Vinnytsia 2014.
Mei Jiansheng, Li Sukang, Tan Xiaomei: A Digital Watermarking Algorithm Based On DCT and DWT. Proc. of the 2009 International Symposium on Web Information Systems and Applications, 2009, 104–107.
Ó Ruanaidh J., Pun T.: Rotation, scale and translation invariant digital image watermarking. Proc. of the ICIP'97, vol. 1, 1997, 536–539.
Piva A., Barni M., Bartolini F.: Threshold Selection for Correlation-Based Watermark Detection. Proceedings of COST 254 Workshop on Intelligent Communications, Italy, L'Aquila, 1998, 67–72.
Singh P., Chadha R. S.: A Survey of Digital Watermarking Techniques, Applications and Attacks. International Journal of Engineering and Innovative Technology, Vol. 2, Issue 9, 2013, 165–175.
Sridevi T., Kumar V.: A Robust Watermarking Algorithm Based on Image Normalization and DC Coefficients. International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, 2011, 226–232.
Surekha B., Swamy G. N.: A Spatial Domain Public Image Watermarking. International Journal of Security and Its Applications, Vol. 5, No. 1, 2011, 1–12.
Vovk O. O., Astrahantsev A. A.: Development of the technique for determining the importance of steganographic algorithms characteristics. Visnyk of Lviv Polytechnic National University, “Information systems and networks”, Lviv, No 805, 2014, 52–60.
Article Details
Abstract views: 256
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
