STEGANOGRAPHY – THEORY AND PRACTICE
Vladimir Barannik
vvbar.off@gmail.comUniversity of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS (Ukraine)
http://orcid.org/0000-0002-2848-4524
Bogdan Gorodetsky
University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS (Ukraine)
http://orcid.org/0000-0003-2183-3557
Natalia Barannik
University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS (Ukraine)
http://orcid.org/0000-0001-6420-1838
Abstract
Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part of hybrid wars are information operations used for the destructive impact on society, commercial activities, politics and economics using information and communication space and technologies. The article expresses the need to create a theoretical basis for combating cyber attacks in special telecommunication systems as an integral part of the national security of the state. The development of methods for hiding information as well as providing information during video streaming and images in networks is underway. The basic calculations are given at the initial stages of information hiding and methods for ensuring the latent transfer of data in telecommunication systems.
Keywords:
cyber attacks, telecommunications equipment, cyber security, information hidingReferences
Ablamejko S., Lagunovskij D.: Obrabotka izobrazhenij: tehnologija, metody, primenenie. Amalfeja, Minsk 2000.
Google Scholar
Barannik V. V., Alimpiev A. M., Bekirov A., Barannik D. V., Barannik N. D.: Detections of sustainable areas for steganographic embedding. Proc. East-West Design & Test Symposium (EWDTS) 2017, 555–558 [DOI: 10.1109/EWDTS.2017.8110028].
Google Scholar
Barannik V., Barannik D., Bekirov A., Lekakh A.: Steganographic method based on the modification of regions of the image with different saturation. Proc of. 14th International Conference: Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering 2018, 542–545 [DOI: 10.1109/TCSET.2018.8336260].
Google Scholar
Christophe E., Lager D., Mailhes C.: Quality criteria benchmark for hiperspectral imagery. IEEE Transactions on Geoscience and Remote Sensing 43(9)/2005, 2103–2114.
Google Scholar
Computer viruses, Moscow, 2011.
Google Scholar
Gonzalez R., Woods R.: Tsyfrova obrobka zobrazhen. Tekhnosfera, Kiev 2018.
Google Scholar
Gribunin V., Okov I., Turincev I.: Tsifrovaya steganografiya. Solon-Press, Moscow 2018.
Google Scholar
Grundmann M., Kwatra V., Han M., Essa I.: Efficient hierarchical graph based video segmentation. IEEE CVPR, 2010.
Google Scholar
Konakhovich G. M, Puzyrenko A.: Computernaya steganographiya. Teoriya i praktika. To Press, Kiev 2016.
Google Scholar
Melnik A. M.: Informatsiyni systemy ta merezhi. Bulletin “Lviv Polytechnic” 673, 2010, 365–374.
Google Scholar
Miano J.: Compressed image file formats: JPEG, PNG, GIF, XBM, BMP. Addison-Wesley Professional, New York 1999.
Google Scholar
Miano J.: Formats and image compression algorithms in action. Triumph, Kiev 2013.
Google Scholar
Pratt W., Chen W., Welch L.: Slant transform image coding. Proc. Computer Processing in Communications. Polytechnic Press, New York 1969.
Google Scholar
Savyn L.V. Setetsentrychnaya y setevaya voyna. Vvedenye v kontseptsyyu. Evrazyyskoe dvyzhenye, Moscov 2011.
Google Scholar
Sindeev M., Konushin A., Rother C.: Alpha-flow for video matting. Technical Report, 2012.
Google Scholar
Stankiewicz O., Wegner K., Karwowski D., Stankowski J., Klimaszewski K., Grajek T.: Encoding mode selection in HEVC with the use of noise reduction. Proc. International Conference on Systems, Signals and Image Processing (IWSSIP), Poznan, 2017, 1–6.
Google Scholar
Wallace G.: Overview of the JPEG (ISO/CCITT) – Still image compression: image processing algorithms and techniques. Processing of the SPIE 1244, 1990, 220–233.
Google Scholar
Wallace G.: The JPEG Still Picture Compression Standard. Communication in ACM 34(4)/1991, 31–34.
Google Scholar
Wang S., Zhang X., Liu X., Zhang J., Ma S., Gao W.: Utility-Driven Adaptive Preprocessing for Screen Content Video Compression. IEEE Transactions on Multimedia 19(3)/2017, 660–667.
Google Scholar
Authors
Vladimir Barannikvvbar.off@gmail.com
University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS Ukraine
http://orcid.org/0000-0002-2848-4524
Authors
Bogdan GorodetskyUniversity of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS Ukraine
http://orcid.org/0000-0003-2183-3557
Authors
Natalia BarannikUniversity of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS Ukraine
http://orcid.org/0000-0001-6420-1838
Statistics
Abstract views: 279PDF downloads: 223
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Most read articles by the same author(s)
- Volodymyr Barannik, Natalia Barannik, Oleksandr Slobodyanyuk, INDIRECT INFORMATION HIDING TECHNOLOGY ON A MULTIADIC BASIS , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 11 No. 4 (2021)