INDIRECT INFORMATION HIDING TECHNOLOGY ON A MULTIADIC BASIS


Abstract

It is shown that the current direction of increasing the safety of information resources when transmitting information in info-communication systems is the use of methods of steganographic instruction in video imagery. The effectiveness of such methods is significantly increased when used in a complex of methods of concealment, which are based on the principles of inconsistent and cosmic communication. At the same time, existing methods of steganographic are used in the process of insertion of information mainly only laws, empty features of visual perception of video images. So, it is justified that the scientific and applied problem, which is to increase the density of embedded messages in the video container with a given level of their reliability, is relevant. The solution of this problem is based on the solution of the contradiction, which concerns the fact that increasing the density of embedded data leads to a decrease in the bit rate of the video container, steganalysis stability, reliability of special information, and video container. Therefore, the research aims to develop a methodology for the steganographic embedding of information, taking into account the regularities of the video container, which are generated by its structural and structural-statistical features. The solution to the posed problem of applying steganographic transformations is proposed to be realised by methods of indirectly embedding parts of the hidden message in certain conditions or functional relationships. The possibility of creating steganographic transformations regarding the indirect embedding and extraction of hidden information in a multiadic basis by modifying the underlying basis system within an admissible set is demonstrated. It is shown that the multiadic system, which is created in the spectral space of DCT transforms, has the potential to form a set of admissible modifications of basis systems.


Keywords

steganographic transformations; video container; video compression; indirect embedding

Alam, M. A.: Faster Image Compression Technique Based on LZW Algorithm Using GPU Parallel Processing. Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), 2018, 272–275 [http://doi.org/10.1109/ICIEV.2018.8640956]. DOI: https://doi.org/10.1109/ICIEV.2018.8640956

Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, 2001.

Barannik V.: Fast Coding of Irregular Binary Binomial Numbers with a Set Number of Units Series. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, 29–33 [http://doi.org/10.1109/ATIT50783.2020.9349356].

Barannik D.: Stegano-Compression Coding in a Non-Equalible Positional Base. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 83–86 [http://doi.org/10.1109/ATIT50783.2020.9349328].

Barannik N., Ryabukha Yu.: Method of Indirect Steganographic Coding of Information without Visual Distortion of the Video Container series. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 57–61 [http://doi.org/10.1109/ATIT50783.2020.9349262].

Barannik V., Hahanova A., Krivonos V.: Coding tangible component of transforms to provide accessibility and integrity of video data. International Symposium, East-West Design & Test Symposium (EWDTS), 2013, 1–5 [http://doi.org/10.1109/EWDTS.2013.6673179]. DOI: https://doi.org/10.1109/EWDTS.2013.6673179

Barannik V. V., Karpinski M. P., Tverdokhleb V. V., Barannik D. V., Himenko V. V., Aleksander M.: The technology of the video stream intensity controlling based on the bit-planes recombination. 4th IEEE International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018, 25–28 [http://doi.org/10.1109/IDAACS-SWS.2018.8525560]. DOI: https://doi.org/10.1109/IDAACS-SWS.2018.8525560

Barannik V., Barannik D., Fustii V., Parkhomenko M.: Technology for Protecting Video Information Resources in the Info-Communication Space. IEEE 3rd International Conference on Advanced Information and Communications Technologies (IEEE AICT 2019), 2019, 248–250 [http://doi.org/10.1109/AIACT.2019.8847820]. DOI: https://doi.org/10.1109/AIACT.2019.8847820

Barannik, V., Barannik, N., Ryabukha, Yu., Barannik, D. Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. 15 th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science, 2020, 699–702 [http://doi.org/10.1109/TCSET49122.2020.235522]. DOI: https://doi.org/10.1109/TCSET49122.2020.235522

Barannik V., Himenko V., Babenko Yu., Hahanova A., Fustii V.: Technology of Composite Code Forming in The Spatial-Spectral Description Significant Microsegments. IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, 2020, 703–706 [http://doi.org/10.1109/TCSET49122.2020.235523]. DOI: https://doi.org/10.1109/TCSET49122.2020.235523

Barannik V., Jancarczyk D., Babenko Yu., Stepanko O., Nikodem J., Zawislak S.: A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural Basis. IEEE 5nd International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IEEE IDAACS-SWS 2020), 2020, 1–5 [http://doi.org/10.1109/IDAACS-SWS50031.2020.9297068]. DOI: https://doi.org/10.1109/IDAACS-SWS50031.2020.9297068

Barannik V., Kharchenko N., Othman Shadi O., Musienko A.: A method to control bit rate while compressing predicted frames. IEEE International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics (IEEE CADSM 2015), 2015, 36–38 [http://doi.org/10.1109/CADSM.2015.7230789]. DOI: https://doi.org/10.1109/CADSM.2015.7230789

Barannik V., Kharchenko N., Tverdokhleb V., Kulitsa O.: The issue of timely delivery of video traffic with controlled loss of quality. 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2016, 902–904 [http://doi.org/10.1109/TCSET.2016.7452220]. DOI: https://doi.org/10.1109/TCSET.2016.7452220

Barannik V., Shulgin S., Krasnorutsky A., Slobodyanyuk O., Gurzhii P., Korolyova N.: Methodological Fundamentals of Deciphering Coding of Aerophotography Segments on Special Equipment of Unmanned Complex. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 38–43 [http://doi.org/10.1109/ATIT50783.2020.9349257].

Barannik V., Sidchenko S., Barannik N., Khimenko A.: The method of masking overhead compaction in video compression systems. Radioelectronic and Computer Systems 2, 2021, 51–63. [https://doi.org/10.32620/reks.2021.2.05]. DOI: https://doi.org/10.32620/reks.2021.2.05

Belikova T.: Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. Proceedings of the 2nd IEEE International Conference Advanced Trends in Information Theory (ATIT), 2020, 87–91 [https://ieeexplore.ieee.org/document/9349300].

Bui V., Chang L., Li D., Hsu L., Chen M.: Comparison of lossless video and image compression codecs for medical computed tomography datasets. IEEE International Conference on Big Data, 2016 3960–3962 [http://doi.org/10.1109/BigData.2016.7841075]. DOI: https://doi.org/10.1109/BigData.2016.7841075

Chen T.-H., Wu Ch.-S.: Efficient multi-secret image sharing based on Boolean operation. Signal Processing 91(1), 2011, 90–97 [http://doi.org/10.1016/j.sigpro.2010.06.012]. DOI: https://doi.org/10.1016/j.sigpro.2010.06.012

Deshmukh M., Nain N., Ahmed M.: An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic. IEEE 30 th International Conference on Advanced Information Networking and Applications (AINA), 2016, 690–697 [http://doi.org/10.1109/aina.2016.56]. DOI: https://doi.org/10.1109/AINA.2016.56

Djelouah A., Campos J., Schaub-Meyer S., Schroers C.: Neural Inter-Frame Compression for Video Coding. IEEE/CVF International Conference on Computer Vision (ICCV), 2019, 6420–6428 [http://doi.org/10.1109/ICCV.2019.00652]. DOI: https://doi.org/10.1109/ICCV.2019.00652

Dong W., Wang J.: JPEG Compression Forensics against Resizing. IEEE Trustcom/BigDataSE/IвSPA, 2016, 1001–1007 [http://doi.org/10.1109/TrustCom.2016.0168]. DOI: https://doi.org/10.1109/TrustCom.2016.0168

Gonzales R. C., Woods R. E.: Digital image processing. Prentice Inc., Upper Saddle River 2002.

Honda T., Murakami Y., Yanagihara Y., Kumaki T., Fujino T.: Hierarchical image-scrambling method with scramble-level controllability for privacy protection. IEEE 56th International Midwest Symposium on Circuits and Systems, 2013, 1371–1374 [http://doi.org/10.1109/MWSCAS.2013.6674911]. DOI: https://doi.org/10.1109/MWSCAS.2013.6674911

Ieremeiev O., Lukin V., Okarma K.: Combined visual quality metric of remote sensing images based on neural network. Radioelectronic and computer systems 4, 2020, 4–15 [http://doi.org/10.32620/reks.2020.4.01]. DOI: https://doi.org/10.32620/reks.2020.4.01

Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007.

JPEG Privacy & Security Abstract and Executive Summary, 2015 [https://jpeg.org/items/20150910_privacy_security_summary.html].

Komolov D., Zhurbynskyy D., Kulitsa O.: Selective Method For Hiding of Video Information Resource In Telecommunication Systems Based on Encryption of Energy-Significant Blocks of Reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, 80–83.

Li F., Krivenko S., Lukin V.: Two-step providing of desired quality in lossy image compression by SPIHT. Radioelectronic and computer systems 2, 2020, 22–32 [http://doi.org/10.32620/reks.2020.2.02]. DOI: https://doi.org/10.32620/reks.2020.2.02

Naor M., Shamir A.: Visual Cryptography. Proceedings of the Advances in Cryptology – EUROCRYPT'94. Lecture Notes in Computer Science 950, 1995, 1–12 [http://doi.org/10.1007/bfb0053419]. DOI: https://doi.org/10.1007/BFb0053419

Narmatha C., Manimegalai P., Manimurugan S.: A LS-compression scheme for grayscale images using pixel based technique. International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT), 2017, 1–5 [http://doi.org/10.1109/IGEHT.2017.8093980]. DOI: https://doi.org/10.1109/IGEHT.2017.8093980

Richter T.: Error Bounds for HDR Image Coding with JPEG XT. Data Compression Conference, 2017, 122–130 [http://doi.org/10.1109/DCC.2017.7]. DOI: https://doi.org/10.1109/DCC.2017.7

Rippel O.: Learned Video Compression. IEEE/CVF International Conference on Computer Vision (ICCV), 2019, 3453–3462 [http://doi.org/10.1109/ICCV.2019.00355]. DOI: https://doi.org/10.1109/ICCV.2019.00355

Rivest R. L., Shamir A., Adleman L. M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 1978, 120–126 [http://doi.org/10.1145/359340.359342]. DOI: https://doi.org/10.1145/359340.359342

Sharma R., Bollavarapu S.: Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications 117(14), 2015, 15–18 [http://doi.org/10.5120/20621-3342]. DOI: https://doi.org/10.5120/20621-3342

Wang S., Kim S. M., Yin Z., He T.: Encode when necessary: Correlated network coding under unreliable wireless links. ACM Transactions on Sensor Networks 13(1), 2017, article 7, 1–22 [http://doi.org/10.1145/3023953]. DOI: https://doi.org/10.1145/3023953

Wang S., Zhang X., Liu X., Zhang J., Ma S., Gao W.: Utility Driven Adaptive Preprocessing for Screen Content Video Compression. IEEE Transactions on Multimedia 19(3), 2017, 660–667. DOI: https://doi.org/10.1109/TMM.2016.2625276

Wang X., Xiao J., Hu R., Wang Z.: Cruise UAV Video Compression Based on Long-Term Wide-Range Background. Data Compression Conference (DCC), 2017, 466–467 [http://doi.org/10.1109/DCC.2017.71]. DOI: https://doi.org/10.1109/DCC.2017.71

Watanabe O., Uchida A., Fukuhara T., Kiya H.: An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, 1226–1230 [http://doi.org/10.1109/ICASSP.2015.7178165]. DOI: https://doi.org/10.1109/ICASSP.2015.7178165

Wu H., Sun X., Yang J., Zeng W., Wu F.: Lossless Compression of JPEG Coded Photo Collections. IEEE Transactions on Image Processing 25(6), 2016, 2684–2696 [http://doi.org/10.1109/TIP.2016.2551366]. DOI: https://doi.org/10.1109/TIP.2016.2551366

Xiao W., Wan N., Hong A., Chen X.: A Fast JPEG Image Compression Algorithm Based on DCT. IEEE International Conference on Smart Cloud, 2020, 106–110 [http://doi.org/10.1109/SmartCloud49737.2020.00028]. DOI: https://doi.org/10.1109/SmartCloud49737.2020.00028

Yang Ch.-N., Chen Ch.-H., Cai S.-R.: Enhanced Boolean-based multi secret image sharing scheme. Journal of Systems and Software 116, 2016, 22–34 [http://doi.org/10.1016/j.jss.2015.01.031]. DOI: https://doi.org/10.1016/j.jss.2015.01.031

Yuan L., Korshunov P., Ebrahimi T.: Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11 th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, 1–6 [http://doi.org/10.1109/FG.2015.7285022]. DOI: https://doi.org/10.1109/FG.2015.7285022

Zhou J., Liu X., Au O. C., Tang Y. Y.: Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security 9(1), 2014, 39–50 [http://doi.org/10.1109/TIFS.2013.2291625]. DOI: https://doi.org/10.1109/TIFS.2013.2291625

Download

Published : 2021-12-20


Barannik, V., Barannik, N., & Slobodyanyuk, O. (2021). INDIRECT INFORMATION HIDING TECHNOLOGY ON A MULTIADIC BASIS. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 11(4), 14-17. https://doi.org/10.35784/iapgos.2812

Volodymyr Barannik 
V.N. Karazin Kharkiv National University  Ukraine
http://orcid.org/0000-0002-2848-4524
Natalia Barannik 
National University of Civil Defence of Ukraine  Ukraine
http://orcid.org/0000-0001-6420-1838
Oleksandr Slobodyanyuk  slobodyanyuk.olexandr@kpnu.edu.ua
Kamianets-Podilskyi Ivan Ohiienko National University  Ukraine
http://orcid.org/0000-0001-5195-3053