INDIRECT INFORMATION HIDING TECHNOLOGY ON A MULTIADIC BASIS
Volodymyr Barannik
V.N. Karazin Kharkiv National University (Ukraine)
http://orcid.org/0000-0002-2848-4524
Natalia Barannik
National University of Civil Defence of Ukraine (Ukraine)
http://orcid.org/0000-0001-6420-1838
Oleksandr Slobodyanyuk
slobodyanyuk.olexandr@kpnu.edu.uaKamianets-Podilskyi Ivan Ohiienko National University (Ukraine)
http://orcid.org/0000-0001-5195-3053
Abstract
It is shown that the current direction of increasing the safety of information resources when transmitting information in info-communication systems is the use of methods of steganographic instruction in video imagery. The effectiveness of such methods is significantly increased when used in a complex of methods of concealment, which are based on the principles of inconsistent and cosmic communication. At the same time, existing methods of steganographic are used in the process of insertion of information mainly only laws, empty features of visual perception of video images. So, it is justified that the scientific and applied problem, which is to increase the density of embedded messages in the video container with a given level of their reliability, is relevant. The solution of this problem is based on the solution of the contradiction, which concerns the fact that increasing the density of embedded data leads to a decrease in the bit rate of the video container, steganalysis stability, reliability of special information, and video container. Therefore, the research aims to develop a methodology for the steganographic embedding of information, taking into account the regularities of the video container, which are generated by its structural and structural-statistical features. The solution to the posed problem of applying steganographic transformations is proposed to be realised by methods of indirectly embedding parts of the hidden message in certain conditions or functional relationships. The possibility of creating steganographic transformations regarding the indirect embedding and extraction of hidden information in a multiadic basis by modifying the underlying basis system within an admissible set is demonstrated. It is shown that the multiadic system, which is created in the spectral space of DCT transforms, has the potential to form a set of admissible modifications of basis systems.
Keywords:
steganographic transformations, video container, video compression, indirect embeddingReferences
Alam, M. A.: Faster Image Compression Technique Based on LZW Algorithm Using GPU Parallel Processing. Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), 2018, 272–275 [http://doi.org/10.1109/ICIEV.2018.8640956].
DOI: https://doi.org/10.1109/ICIEV.2018.8640956
Google Scholar
Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, 2001.
Google Scholar
Barannik V.: Fast Coding of Irregular Binary Binomial Numbers with a Set Number of Units Series. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, 29–33 [http://doi.org/10.1109/ATIT50783.2020.9349356].
Google Scholar
Barannik D.: Stegano-Compression Coding in a Non-Equalible Positional Base. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 83–86 [http://doi.org/10.1109/ATIT50783.2020.9349328].
Google Scholar
Barannik N., Ryabukha Yu.: Method of Indirect Steganographic Coding of Information without Visual Distortion of the Video Container series. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 57–61 [http://doi.org/10.1109/ATIT50783.2020.9349262].
Google Scholar
Barannik V., Hahanova A., Krivonos V.: Coding tangible component of transforms to provide accessibility and integrity of video data. International Symposium, East-West Design & Test Symposium (EWDTS), 2013, 1–5 [http://doi.org/10.1109/EWDTS.2013.6673179].
DOI: https://doi.org/10.1109/EWDTS.2013.6673179
Google Scholar
Barannik V. V., Karpinski M. P., Tverdokhleb V. V., Barannik D. V., Himenko V. V., Aleksander M.: The technology of the video stream intensity controlling based on the bit-planes recombination. 4th IEEE International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018, 25–28 [http://doi.org/10.1109/IDAACS-SWS.2018.8525560].
DOI: https://doi.org/10.1109/IDAACS-SWS.2018.8525560
Google Scholar
Barannik V., Barannik D., Fustii V., Parkhomenko M.: Technology for Protecting Video Information Resources in the Info-Communication Space. IEEE 3rd International Conference on Advanced Information and Communications Technologies (IEEE AICT 2019), 2019, 248–250 [http://doi.org/10.1109/AIACT.2019.8847820].
DOI: https://doi.org/10.1109/AIACT.2019.8847820
Google Scholar
Barannik, V., Barannik, N., Ryabukha, Yu., Barannik, D. Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. 15 th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science, 2020, 699–702 [http://doi.org/10.1109/TCSET49122.2020.235522].
DOI: https://doi.org/10.1109/TCSET49122.2020.235522
Google Scholar
Barannik V., Himenko V., Babenko Yu., Hahanova A., Fustii V.: Technology of Composite Code Forming in The Spatial-Spectral Description Significant Microsegments. IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, 2020, 703–706 [http://doi.org/10.1109/TCSET49122.2020.235523].
DOI: https://doi.org/10.1109/TCSET49122.2020.235523
Google Scholar
Barannik V., Jancarczyk D., Babenko Yu., Stepanko O., Nikodem J., Zawislak S.: A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural Basis. IEEE 5nd International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IEEE IDAACS-SWS 2020), 2020, 1–5 [http://doi.org/10.1109/IDAACS-SWS50031.2020.9297068].
DOI: https://doi.org/10.1109/IDAACS-SWS50031.2020.9297068
Google Scholar
Barannik V., Kharchenko N., Othman Shadi O., Musienko A.: A method to control bit rate while compressing predicted frames. IEEE International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics (IEEE CADSM 2015), 2015, 36–38 [http://doi.org/10.1109/CADSM.2015.7230789].
DOI: https://doi.org/10.1109/CADSM.2015.7230789
Google Scholar
Barannik V., Kharchenko N., Tverdokhleb V., Kulitsa O.: The issue of timely delivery of video traffic with controlled loss of quality. 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2016, 902–904 [http://doi.org/10.1109/TCSET.2016.7452220].
DOI: https://doi.org/10.1109/TCSET.2016.7452220
Google Scholar
Barannik V., Shulgin S., Krasnorutsky A., Slobodyanyuk O., Gurzhii P., Korolyova N.: Methodological Fundamentals of Deciphering Coding of Aerophotography Segments on Special Equipment of Unmanned Complex. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 38–43 [http://doi.org/10.1109/ATIT50783.2020.9349257].
Google Scholar
Barannik V., Sidchenko S., Barannik N., Khimenko A.: The method of masking overhead compaction in video compression systems. Radioelectronic and Computer Systems 2, 2021, 51–63. [https://doi.org/10.32620/reks.2021.2.05].
DOI: https://doi.org/10.32620/reks.2021.2.05
Google Scholar
Belikova T.: Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. Proceedings of the 2nd IEEE International Conference Advanced Trends in Information Theory (ATIT), 2020, 87–91 [https://ieeexplore.ieee.org/document/9349300].
Google Scholar
Bui V., Chang L., Li D., Hsu L., Chen M.: Comparison of lossless video and image compression codecs for medical computed tomography datasets. IEEE International Conference on Big Data, 2016 3960–3962 [http://doi.org/10.1109/BigData.2016.7841075].
DOI: https://doi.org/10.1109/BigData.2016.7841075
Google Scholar
Chen T.-H., Wu Ch.-S.: Efficient multi-secret image sharing based on Boolean operation. Signal Processing 91(1), 2011, 90–97 [http://doi.org/10.1016/j.sigpro.2010.06.012].
DOI: https://doi.org/10.1016/j.sigpro.2010.06.012
Google Scholar
Deshmukh M., Nain N., Ahmed M.: An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic. IEEE 30 th International Conference on Advanced Information Networking and Applications (AINA), 2016, 690–697 [http://doi.org/10.1109/aina.2016.56].
DOI: https://doi.org/10.1109/AINA.2016.56
Google Scholar
Djelouah A., Campos J., Schaub-Meyer S., Schroers C.: Neural Inter-Frame Compression for Video Coding. IEEE/CVF International Conference on Computer Vision (ICCV), 2019, 6420–6428 [http://doi.org/10.1109/ICCV.2019.00652].
DOI: https://doi.org/10.1109/ICCV.2019.00652
Google Scholar
Dong W., Wang J.: JPEG Compression Forensics against Resizing. IEEE Trustcom/BigDataSE/IвSPA, 2016, 1001–1007 [http://doi.org/10.1109/TrustCom.2016.0168].
DOI: https://doi.org/10.1109/TrustCom.2016.0168
Google Scholar
Gonzales R. C., Woods R. E.: Digital image processing. Prentice Inc., Upper Saddle River 2002.
Google Scholar
Honda T., Murakami Y., Yanagihara Y., Kumaki T., Fujino T.: Hierarchical image-scrambling method with scramble-level controllability for privacy protection. IEEE 56th International Midwest Symposium on Circuits and Systems, 2013, 1371–1374 [http://doi.org/10.1109/MWSCAS.2013.6674911].
DOI: https://doi.org/10.1109/MWSCAS.2013.6674911
Google Scholar
Ieremeiev O., Lukin V., Okarma K.: Combined visual quality metric of remote sensing images based on neural network. Radioelectronic and computer systems 4, 2020, 4–15 [http://doi.org/10.32620/reks.2020.4.01].
DOI: https://doi.org/10.32620/reks.2020.4.01
Google Scholar
Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007.
Google Scholar
JPEG Privacy & Security Abstract and Executive Summary, 2015 [https://jpeg.org/items/20150910_privacy_security_summary.html].
Google Scholar
Komolov D., Zhurbynskyy D., Kulitsa O.: Selective Method For Hiding of Video Information Resource In Telecommunication Systems Based on Encryption of Energy-Significant Blocks of Reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, 80–83.
Google Scholar
Li F., Krivenko S., Lukin V.: Two-step providing of desired quality in lossy image compression by SPIHT. Radioelectronic and computer systems 2, 2020, 22–32 [http://doi.org/10.32620/reks.2020.2.02].
DOI: https://doi.org/10.32620/reks.2020.2.02
Google Scholar
Naor M., Shamir A.: Visual Cryptography. Proceedings of the Advances in Cryptology – EUROCRYPT'94. Lecture Notes in Computer Science 950, 1995, 1–12 [http://doi.org/10.1007/bfb0053419].
DOI: https://doi.org/10.1007/BFb0053419
Google Scholar
Narmatha C., Manimegalai P., Manimurugan S.: A LS-compression scheme for grayscale images using pixel based technique. International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT), 2017, 1–5 [http://doi.org/10.1109/IGEHT.2017.8093980].
DOI: https://doi.org/10.1109/IGEHT.2017.8093980
Google Scholar
Richter T.: Error Bounds for HDR Image Coding with JPEG XT. Data Compression Conference, 2017, 122–130 [http://doi.org/10.1109/DCC.2017.7].
DOI: https://doi.org/10.1109/DCC.2017.7
Google Scholar
Rippel O.: Learned Video Compression. IEEE/CVF International Conference on Computer Vision (ICCV), 2019, 3453–3462 [http://doi.org/10.1109/ICCV.2019.00355].
DOI: https://doi.org/10.1109/ICCV.2019.00355
Google Scholar
Rivest R. L., Shamir A., Adleman L. M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 1978, 120–126 [http://doi.org/10.1145/359340.359342].
DOI: https://doi.org/10.1145/359340.359342
Google Scholar
Sharma R., Bollavarapu S.: Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications 117(14), 2015, 15–18 [http://doi.org/10.5120/20621-3342].
DOI: https://doi.org/10.5120/20621-3342
Google Scholar
Wang S., Kim S. M., Yin Z., He T.: Encode when necessary: Correlated network coding under unreliable wireless links. ACM Transactions on Sensor Networks 13(1), 2017, article 7, 1–22 [http://doi.org/10.1145/3023953].
DOI: https://doi.org/10.1145/3023953
Google Scholar
Wang S., Zhang X., Liu X., Zhang J., Ma S., Gao W.: Utility Driven Adaptive Preprocessing for Screen Content Video Compression. IEEE Transactions on Multimedia 19(3), 2017, 660–667.
DOI: https://doi.org/10.1109/TMM.2016.2625276
Google Scholar
Wang X., Xiao J., Hu R., Wang Z.: Cruise UAV Video Compression Based on Long-Term Wide-Range Background. Data Compression Conference (DCC), 2017, 466–467 [http://doi.org/10.1109/DCC.2017.71].
DOI: https://doi.org/10.1109/DCC.2017.71
Google Scholar
Watanabe O., Uchida A., Fukuhara T., Kiya H.: An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, 1226–1230 [http://doi.org/10.1109/ICASSP.2015.7178165].
DOI: https://doi.org/10.1109/ICASSP.2015.7178165
Google Scholar
Wu H., Sun X., Yang J., Zeng W., Wu F.: Lossless Compression of JPEG Coded Photo Collections. IEEE Transactions on Image Processing 25(6), 2016, 2684–2696 [http://doi.org/10.1109/TIP.2016.2551366].
DOI: https://doi.org/10.1109/TIP.2016.2551366
Google Scholar
Xiao W., Wan N., Hong A., Chen X.: A Fast JPEG Image Compression Algorithm Based on DCT. IEEE International Conference on Smart Cloud, 2020, 106–110 [http://doi.org/10.1109/SmartCloud49737.2020.00028].
DOI: https://doi.org/10.1109/SmartCloud49737.2020.00028
Google Scholar
Yang Ch.-N., Chen Ch.-H., Cai S.-R.: Enhanced Boolean-based multi secret image sharing scheme. Journal of Systems and Software 116, 2016, 22–34 [http://doi.org/10.1016/j.jss.2015.01.031].
DOI: https://doi.org/10.1016/j.jss.2015.01.031
Google Scholar
Yuan L., Korshunov P., Ebrahimi T.: Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11 th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, 1–6 [http://doi.org/10.1109/FG.2015.7285022].
DOI: https://doi.org/10.1109/FG.2015.7285022
Google Scholar
Zhou J., Liu X., Au O. C., Tang Y. Y.: Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security 9(1), 2014, 39–50 [http://doi.org/10.1109/TIFS.2013.2291625].
DOI: https://doi.org/10.1109/TIFS.2013.2291625
Google Scholar
Authors
Volodymyr BarannikV.N. Karazin Kharkiv National University Ukraine
http://orcid.org/0000-0002-2848-4524
Authors
Natalia BarannikNational University of Civil Defence of Ukraine Ukraine
http://orcid.org/0000-0001-6420-1838
Authors
Oleksandr Slobodyanyukslobodyanyuk.olexandr@kpnu.edu.ua
Kamianets-Podilskyi Ivan Ohiienko National University Ukraine
http://orcid.org/0000-0001-5195-3053
Statistics
Abstract views: 348PDF downloads: 186
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Most read articles by the same author(s)
- Vladimir Barannik, Bogdan Gorodetsky, Natalia Barannik, STEGANOGRAPHY – THEORY AND PRACTICE , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 9 No. 1 (2019)
- Volodymyr Barannik, Mykola Dvorsky, Valeriy Barannik, Viktoria Himenko, Anton Sorokun, IMPROVEMENT OF METHODS OF MOTION COMPENSATION OF DYNAMIC OBJECTS MOVING IN VIDEO STREAM OF THE VIDEOCONFERENCING SYSTEM , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 8 No. 4 (2018)
- Volodymyr Barannik, Oleg Shatun, Dmitriy Barannik, Veronika Kobtseva, DEVELOPMENT OF THE METHOD OF INDIRECT STEGANOGRAPHIC DATA HIDING IN THE CONTAINER IMAGE CONTOUR , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 8 No. 4 (2018)
- Volodymyr Barannik, Roman Onyshchenko, Gennady Pris, Mykhailo Babenko, Valeriy Barannik, Vitalii Shmakov, Ivan Pantas, A METHOD FOR FORMING A TRUNCATED POSITIONAL CODE SYSTEM FOR TRANSFORMED VIDEO IMAGES , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 14 No. 3 (2024)
- Volodymyr Barannik, Dmytro Havrylov, Serhii Pantas, Yurii Tsimura, Tatayna Belikova, Rimma Viedienieva, Vasyl Kryshtal, THE METHOD OF ADAPTIVE STATISTICAL CODING TAKING INTO ACCOUNT THE STRUCTURAL FEATURES OF VIDEO IMAGES , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 14 No. 4 (2024)