INDIRECT INFORMATION HIDING TECHNOLOGY ON A MULTIADIC BASIS
Article Sidebar
Open full text
Issue Vol. 11 No. 4 (2021)
-
SINGULAR INTEGRATION IN BOUNDARY ELEMENT METHOD FOR HELMHOLTZ EQUATION FORMULATED IN FREQUENCY DOMAIN
Tomasz Rymarczyk, Jan Sikora4-8
-
APPLICATION OF THE THREAT INTELLIGENCE PLATFORM TO INCREASE THE SECURITY OF GOVERNMENT INFORMATION RESOURCES
Bohdan Nikolaienko, Serhii Vasylenko9-13
-
INDIRECT INFORMATION HIDING TECHNOLOGY ON A MULTIADIC BASIS
Volodymyr Barannik, Natalia Barannik, Oleksandr Slobodyanyuk14-17
-
SELECTED APPLICATIONS OF DEEP NEURAL NETWORKS IN SKIN LESION DIAGNOSTIC
Magdalena Michalska18-21
-
EFFICIENT LINE DETECTION METHOD BASED ON 2D CONVOLUTION FILTER
Paweł Kowalski, Piotr Tojza22-27
-
FACTOR ANALYSIS METHOD APPLICATION FOR CONSTRUCTING OBJECTIVE FUNCTIONS OF OPTIMIZATION IN MULTIMODAL TRANSPORT PROBLEMS
Serhii Zabolotnii, Artem Honcharov, Sergii Mogilei28-31
-
QUALITY OF SATELLITE COMMUNICATION IN SELECTED MOBILE ANDROID SMARTPHONES
Przemysław Falkowski-Gilski32-37
-
CHROMATIC DISPERSION COMPENSATION IN EXISTING FIBER OPTIC TELECOMMUNICATION LINES WITH THE GROWING BIT RATES NEEDS OF DWDM SYSTEM
Tomasz Bobruk38-41
-
FIBRE OPTIC BRAGG STRUCTURES WITH MONOTONIC APODISATION CHARACTERISTICS
Jacek Klimek42-46
-
ON THE CAPACITY OF SOLAR CELLS UNDER PARTIAL SHADING CONDITIONS
Mateusz Bartczak47-50
-
CONTROLLING A FOUR-WIRE THREE-LEVEL AC/DC CONVERTER WITH INDEPENDENT POWER CONTROL IN EVERY PHASE
Bartłomiej Stefańczak51-54
-
METHOD OF MEASUREMENT AND REDUCTION OF THE ELECTROMAGNETIC DISTURBANCES INDUCTED BY SWITCHING SURGES IN LV CIRCUITS
Patryk Wąsik55-61
-
INCREASING THE COST-EFFECTIVENESS OF IN VITRO RESEARCH THROUGH THE USE OF TITANIUM IN THE DEVICE FOR MEASURING THE ELECTRICAL PARAMETERS OF CELLS
Dawid Zarzeczny62-66
-
ELLIPSOMETRY BASED SPECTROSCOPIC COMPLEX FOR RAPID ASSESSMENT OF THE Bi2Te3-xSex THIN FILMS COMPOSITION
Vladimir Kovalev, Saygid Uvaysov, Marcin Bogucki67-74
-
APPLICATION OF LOW-COST PARTICULATE MATTER SENSORS FOR MEASUREMENT OF POLLUTANTS GENERATED DURING 3D PRINTING
Jarosław Tatarczak75-77
Archives
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
-
Vol. 9 No. 4
2019-12-16 20
-
Vol. 9 No. 3
2019-09-26 20
-
Vol. 9 No. 2
2019-06-21 16
-
Vol. 9 No. 1
2019-03-03 13
Main Article Content
DOI
Authors
slobodyanyuk.olexandr@kpnu.edu.ua
Abstract
It is shown that the current direction of increasing the safety of information resources when transmitting information in info-communication systems is the use of methods of steganographic instruction in video imagery. The effectiveness of such methods is significantly increased when used in a complex of methods of concealment, which are based on the principles of inconsistent and cosmic communication. At the same time, existing methods of steganographic are used in the process of insertion of information mainly only laws, empty features of visual perception of video images. So, it is justified that the scientific and applied problem, which is to increase the density of embedded messages in the video container with a given level of their reliability, is relevant. The solution of this problem is based on the solution of the contradiction, which concerns the fact that increasing the density of embedded data leads to a decrease in the bit rate of the video container, steganalysis stability, reliability of special information, and video container. Therefore, the research aims to develop a methodology for the steganographic embedding of information, taking into account the regularities of the video container, which are generated by its structural and structural-statistical features. The solution to the posed problem of applying steganographic transformations is proposed to be realised by methods of indirectly embedding parts of the hidden message in certain conditions or functional relationships. The possibility of creating steganographic transformations regarding the indirect embedding and extraction of hidden information in a multiadic basis by modifying the underlying basis system within an admissible set is demonstrated. It is shown that the multiadic system, which is created in the spectral space of DCT transforms, has the potential to form a set of admissible modifications of basis systems.
Keywords:
References
Alam, M. A.: Faster Image Compression Technique Based on LZW Algorithm Using GPU Parallel Processing. Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), 2018, 272–275 [http://doi.org/10.1109/ICIEV.2018.8640956]. DOI: https://doi.org/10.1109/ICIEV.2018.8640956
Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, 2001.
Barannik V.: Fast Coding of Irregular Binary Binomial Numbers with a Set Number of Units Series. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, 29–33 [http://doi.org/10.1109/ATIT50783.2020.9349356].
Barannik D.: Stegano-Compression Coding in a Non-Equalible Positional Base. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 83–86 [http://doi.org/10.1109/ATIT50783.2020.9349328].
Barannik N., Ryabukha Yu.: Method of Indirect Steganographic Coding of Information without Visual Distortion of the Video Container series. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 57–61 [http://doi.org/10.1109/ATIT50783.2020.9349262].
Barannik V., Hahanova A., Krivonos V.: Coding tangible component of transforms to provide accessibility and integrity of video data. International Symposium, East-West Design & Test Symposium (EWDTS), 2013, 1–5 [http://doi.org/10.1109/EWDTS.2013.6673179]. DOI: https://doi.org/10.1109/EWDTS.2013.6673179
Barannik V. V., Karpinski M. P., Tverdokhleb V. V., Barannik D. V., Himenko V. V., Aleksander M.: The technology of the video stream intensity controlling based on the bit-planes recombination. 4th IEEE International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018, 25–28 [http://doi.org/10.1109/IDAACS-SWS.2018.8525560]. DOI: https://doi.org/10.1109/IDAACS-SWS.2018.8525560
Barannik V., Barannik D., Fustii V., Parkhomenko M.: Technology for Protecting Video Information Resources in the Info-Communication Space. IEEE 3rd International Conference on Advanced Information and Communications Technologies (IEEE AICT 2019), 2019, 248–250 [http://doi.org/10.1109/AIACT.2019.8847820]. DOI: https://doi.org/10.1109/AIACT.2019.8847820
Barannik, V., Barannik, N., Ryabukha, Yu., Barannik, D. Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. 15 th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science, 2020, 699–702 [http://doi.org/10.1109/TCSET49122.2020.235522]. DOI: https://doi.org/10.1109/TCSET49122.2020.235522
Barannik V., Himenko V., Babenko Yu., Hahanova A., Fustii V.: Technology of Composite Code Forming in The Spatial-Spectral Description Significant Microsegments. IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, 2020, 703–706 [http://doi.org/10.1109/TCSET49122.2020.235523]. DOI: https://doi.org/10.1109/TCSET49122.2020.235523
Barannik V., Jancarczyk D., Babenko Yu., Stepanko O., Nikodem J., Zawislak S.: A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural Basis. IEEE 5nd International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IEEE IDAACS-SWS 2020), 2020, 1–5 [http://doi.org/10.1109/IDAACS-SWS50031.2020.9297068]. DOI: https://doi.org/10.1109/IDAACS-SWS50031.2020.9297068
Barannik V., Kharchenko N., Othman Shadi O., Musienko A.: A method to control bit rate while compressing predicted frames. IEEE International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics (IEEE CADSM 2015), 2015, 36–38 [http://doi.org/10.1109/CADSM.2015.7230789]. DOI: https://doi.org/10.1109/CADSM.2015.7230789
Barannik V., Kharchenko N., Tverdokhleb V., Kulitsa O.: The issue of timely delivery of video traffic with controlled loss of quality. 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2016, 902–904 [http://doi.org/10.1109/TCSET.2016.7452220]. DOI: https://doi.org/10.1109/TCSET.2016.7452220
Barannik V., Shulgin S., Krasnorutsky A., Slobodyanyuk O., Gurzhii P., Korolyova N.: Methodological Fundamentals of Deciphering Coding of Aerophotography Segments on Special Equipment of Unmanned Complex. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 38–43 [http://doi.org/10.1109/ATIT50783.2020.9349257].
Barannik V., Sidchenko S., Barannik N., Khimenko A.: The method of masking overhead compaction in video compression systems. Radioelectronic and Computer Systems 2, 2021, 51–63. [https://doi.org/10.32620/reks.2021.2.05]. DOI: https://doi.org/10.32620/reks.2021.2.05
Belikova T.: Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. Proceedings of the 2nd IEEE International Conference Advanced Trends in Information Theory (ATIT), 2020, 87–91 [https://ieeexplore.ieee.org/document/9349300].
Bui V., Chang L., Li D., Hsu L., Chen M.: Comparison of lossless video and image compression codecs for medical computed tomography datasets. IEEE International Conference on Big Data, 2016 3960–3962 [http://doi.org/10.1109/BigData.2016.7841075]. DOI: https://doi.org/10.1109/BigData.2016.7841075
Chen T.-H., Wu Ch.-S.: Efficient multi-secret image sharing based on Boolean operation. Signal Processing 91(1), 2011, 90–97 [http://doi.org/10.1016/j.sigpro.2010.06.012]. DOI: https://doi.org/10.1016/j.sigpro.2010.06.012
Deshmukh M., Nain N., Ahmed M.: An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic. IEEE 30 th International Conference on Advanced Information Networking and Applications (AINA), 2016, 690–697 [http://doi.org/10.1109/aina.2016.56]. DOI: https://doi.org/10.1109/AINA.2016.56
Djelouah A., Campos J., Schaub-Meyer S., Schroers C.: Neural Inter-Frame Compression for Video Coding. IEEE/CVF International Conference on Computer Vision (ICCV), 2019, 6420–6428 [http://doi.org/10.1109/ICCV.2019.00652]. DOI: https://doi.org/10.1109/ICCV.2019.00652
Dong W., Wang J.: JPEG Compression Forensics against Resizing. IEEE Trustcom/BigDataSE/IвSPA, 2016, 1001–1007 [http://doi.org/10.1109/TrustCom.2016.0168]. DOI: https://doi.org/10.1109/TrustCom.2016.0168
Gonzales R. C., Woods R. E.: Digital image processing. Prentice Inc., Upper Saddle River 2002.
Honda T., Murakami Y., Yanagihara Y., Kumaki T., Fujino T.: Hierarchical image-scrambling method with scramble-level controllability for privacy protection. IEEE 56th International Midwest Symposium on Circuits and Systems, 2013, 1371–1374 [http://doi.org/10.1109/MWSCAS.2013.6674911]. DOI: https://doi.org/10.1109/MWSCAS.2013.6674911
Ieremeiev O., Lukin V., Okarma K.: Combined visual quality metric of remote sensing images based on neural network. Radioelectronic and computer systems 4, 2020, 4–15 [http://doi.org/10.32620/reks.2020.4.01]. DOI: https://doi.org/10.32620/reks.2020.4.01
Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007.
JPEG Privacy & Security Abstract and Executive Summary, 2015 [https://jpeg.org/items/20150910_privacy_security_summary.html].
Komolov D., Zhurbynskyy D., Kulitsa O.: Selective Method For Hiding of Video Information Resource In Telecommunication Systems Based on Encryption of Energy-Significant Blocks of Reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, 80–83.
Li F., Krivenko S., Lukin V.: Two-step providing of desired quality in lossy image compression by SPIHT. Radioelectronic and computer systems 2, 2020, 22–32 [http://doi.org/10.32620/reks.2020.2.02]. DOI: https://doi.org/10.32620/reks.2020.2.02
Naor M., Shamir A.: Visual Cryptography. Proceedings of the Advances in Cryptology – EUROCRYPT'94. Lecture Notes in Computer Science 950, 1995, 1–12 [http://doi.org/10.1007/bfb0053419]. DOI: https://doi.org/10.1007/BFb0053419
Narmatha C., Manimegalai P., Manimurugan S.: A LS-compression scheme for grayscale images using pixel based technique. International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT), 2017, 1–5 [http://doi.org/10.1109/IGEHT.2017.8093980]. DOI: https://doi.org/10.1109/IGEHT.2017.8093980
Richter T.: Error Bounds for HDR Image Coding with JPEG XT. Data Compression Conference, 2017, 122–130 [http://doi.org/10.1109/DCC.2017.7]. DOI: https://doi.org/10.1109/DCC.2017.7
Rippel O.: Learned Video Compression. IEEE/CVF International Conference on Computer Vision (ICCV), 2019, 3453–3462 [http://doi.org/10.1109/ICCV.2019.00355]. DOI: https://doi.org/10.1109/ICCV.2019.00355
Rivest R. L., Shamir A., Adleman L. M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 1978, 120–126 [http://doi.org/10.1145/359340.359342]. DOI: https://doi.org/10.1145/359340.359342
Sharma R., Bollavarapu S.: Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications 117(14), 2015, 15–18 [http://doi.org/10.5120/20621-3342]. DOI: https://doi.org/10.5120/20621-3342
Wang S., Kim S. M., Yin Z., He T.: Encode when necessary: Correlated network coding under unreliable wireless links. ACM Transactions on Sensor Networks 13(1), 2017, article 7, 1–22 [http://doi.org/10.1145/3023953]. DOI: https://doi.org/10.1145/3023953
Wang S., Zhang X., Liu X., Zhang J., Ma S., Gao W.: Utility Driven Adaptive Preprocessing for Screen Content Video Compression. IEEE Transactions on Multimedia 19(3), 2017, 660–667. DOI: https://doi.org/10.1109/TMM.2016.2625276
Wang X., Xiao J., Hu R., Wang Z.: Cruise UAV Video Compression Based on Long-Term Wide-Range Background. Data Compression Conference (DCC), 2017, 466–467 [http://doi.org/10.1109/DCC.2017.71]. DOI: https://doi.org/10.1109/DCC.2017.71
Watanabe O., Uchida A., Fukuhara T., Kiya H.: An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, 1226–1230 [http://doi.org/10.1109/ICASSP.2015.7178165]. DOI: https://doi.org/10.1109/ICASSP.2015.7178165
Wu H., Sun X., Yang J., Zeng W., Wu F.: Lossless Compression of JPEG Coded Photo Collections. IEEE Transactions on Image Processing 25(6), 2016, 2684–2696 [http://doi.org/10.1109/TIP.2016.2551366]. DOI: https://doi.org/10.1109/TIP.2016.2551366
Xiao W., Wan N., Hong A., Chen X.: A Fast JPEG Image Compression Algorithm Based on DCT. IEEE International Conference on Smart Cloud, 2020, 106–110 [http://doi.org/10.1109/SmartCloud49737.2020.00028]. DOI: https://doi.org/10.1109/SmartCloud49737.2020.00028
Yang Ch.-N., Chen Ch.-H., Cai S.-R.: Enhanced Boolean-based multi secret image sharing scheme. Journal of Systems and Software 116, 2016, 22–34 [http://doi.org/10.1016/j.jss.2015.01.031]. DOI: https://doi.org/10.1016/j.jss.2015.01.031
Yuan L., Korshunov P., Ebrahimi T.: Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11 th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, 1–6 [http://doi.org/10.1109/FG.2015.7285022]. DOI: https://doi.org/10.1109/FG.2015.7285022
Zhou J., Liu X., Au O. C., Tang Y. Y.: Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security 9(1), 2014, 39–50 [http://doi.org/10.1109/TIFS.2013.2291625]. DOI: https://doi.org/10.1109/TIFS.2013.2291625
Article Details
Abstract views: 462
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
