STEGANOGRAPHY – THEORY AND PRACTICE

Vladimir Barannik

vvbar.off@gmail.com
University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS (Ukraine)
http://orcid.org/0000-0002-2848-4524

Bogdan Gorodetsky


University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS (Ukraine)
http://orcid.org/0000-0003-2183-3557

Natalia Barannik


University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS (Ukraine)
http://orcid.org/0000-0001-6420-1838

Abstract

Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part of hybrid wars are information operations used for the destructive impact on society, commercial activities, politics and economics using information and communication space and technologies. The article expresses the need to create a theoretical basis for combating cyber attacks in special telecommunication systems as an integral part of the national security of the state. The development of methods for hiding information as well as providing information during video streaming and images in networks is underway. The basic calculations are given at the initial stages of information hiding and methods for ensuring the latent transfer of data in telecommunication systems.


Keywords:

cyber attacks, telecommunications equipment, cyber security, information hiding

Ablamejko S., Lagunovskij D.: Obrabotka izobrazhenij: tehnologija, metody, primenenie. Amalfeja, Minsk 2000.
  Google Scholar

Barannik V. V., Alimpiev A. M., Bekirov A., Barannik D. V., Barannik N. D.: Detections of sustainable areas for steganographic embedding. Proc. East-West Design & Test Symposium (EWDTS) 2017, 555–558 [DOI: 10.1109/EWDTS.2017.8110028].
  Google Scholar

Barannik V., Barannik D., Bekirov A., Lekakh A.: Steganographic method based on the modification of regions of the image with different saturation. Proc of. 14th International Conference: Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering 2018, 542–545 [DOI: 10.1109/TCSET.2018.8336260].
  Google Scholar

Christophe E., Lager D., Mailhes C.: Quality criteria benchmark for hiperspectral imagery. IEEE Transactions on Geoscience and Remote Sensing 43(9)/2005, 2103–2114.
  Google Scholar

Computer viruses, Moscow, 2011.
  Google Scholar

Gonzalez R., Woods R.: Tsyfrova obrobka zobrazhen. Tekhnosfera, Kiev 2018.
  Google Scholar

Gribunin V., Okov I., Turincev I.: Tsifrovaya steganografiya. Solon-Press, Moscow 2018.
  Google Scholar

Grundmann M., Kwatra V., Han M., Essa I.: Efficient hierarchical graph based video segmentation. IEEE CVPR, 2010.
  Google Scholar

Konakhovich G. M, Puzyrenko A.: Computernaya steganographiya. Teoriya i praktika. To Press, Kiev 2016.
  Google Scholar

Melnik A. M.: Informatsiyni systemy ta merezhi. Bulletin “Lviv Polytechnic” 673, 2010, 365–374.
  Google Scholar

Miano J.: Compressed image file formats: JPEG, PNG, GIF, XBM, BMP. Addison-Wesley Professional, New York 1999.
  Google Scholar

Miano J.: Formats and image compression algorithms in action. Triumph, Kiev 2013.
  Google Scholar

Pratt W., Chen W., Welch L.: Slant transform image coding. Proc. Computer Processing in Communications. Polytechnic Press, New York 1969.
  Google Scholar

Savyn L.V. Setetsentrychnaya y setevaya voyna. Vvedenye v kontseptsyyu. Evrazyyskoe dvyzhenye, Moscov 2011.
  Google Scholar

Sindeev M., Konushin A., Rother C.: Alpha-flow for video matting. Technical Report, 2012.
  Google Scholar

Stankiewicz O., Wegner K., Karwowski D., Stankowski J., Klimaszewski K., Grajek T.: Encoding mode selection in HEVC with the use of noise reduction. Proc. International Conference on Systems, Signals and Image Processing (IWSSIP), Poznan, 2017, 1–6.
  Google Scholar

Wallace G.: Overview of the JPEG (ISO/CCITT) – Still image compression: image processing algorithms and techniques. Processing of the SPIE 1244, 1990, 220–233.
  Google Scholar

Wallace G.: The JPEG Still Picture Compression Standard. Communication in ACM 34(4)/1991, 31–34.
  Google Scholar

Wang S., Zhang X., Liu X., Zhang J., Ma S., Gao W.: Utility-Driven Adaptive Preprocessing for Screen Content Video Compression. IEEE Transactions on Multimedia 19(3)/2017, 660–667.
  Google Scholar

Download


Published
2019-03-03

Cited by

Barannik, V., Gorodetsky, B., & Barannik, N. (2019). STEGANOGRAPHY – THEORY AND PRACTICE. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 9(1), 45–48. https://doi.org/10.5604/01.3001.0013.0910

Authors

Vladimir Barannik 
vvbar.off@gmail.com
University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS Ukraine
http://orcid.org/0000-0002-2848-4524

Authors

Bogdan Gorodetsky 

University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS Ukraine
http://orcid.org/0000-0003-2183-3557

Authors

Natalia Barannik 

University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS Ukraine
http://orcid.org/0000-0001-6420-1838

Statistics

Abstract views: 274
PDF downloads: 221


Most read articles by the same author(s)