INDIRECT INFORMATION HIDING TECHNOLOGY ON A MULTIADIC BASIS

Volodymyr Barannik


V.N. Karazin Kharkiv National University (Ukraine)
http://orcid.org/0000-0002-2848-4524

Natalia Barannik


National University of Civil Defence of Ukraine (Ukraine)
http://orcid.org/0000-0001-6420-1838

Oleksandr Slobodyanyuk

slobodyanyuk.olexandr@kpnu.edu.ua
Kamianets-Podilskyi Ivan Ohiienko National University (Ukraine)
http://orcid.org/0000-0001-5195-3053

Abstract

It is shown that the current direction of increasing the safety of information resources when transmitting information in info-communication systems is the use of methods of steganographic instruction in video imagery. The effectiveness of such methods is significantly increased when used in a complex of methods of concealment, which are based on the principles of inconsistent and cosmic communication. At the same time, existing methods of steganographic are used in the process of insertion of information mainly only laws, empty features of visual perception of video images. So, it is justified that the scientific and applied problem, which is to increase the density of embedded messages in the video container with a given level of their reliability, is relevant. The solution of this problem is based on the solution of the contradiction, which concerns the fact that increasing the density of embedded data leads to a decrease in the bit rate of the video container, steganalysis stability, reliability of special information, and video container. Therefore, the research aims to develop a methodology for the steganographic embedding of information, taking into account the regularities of the video container, which are generated by its structural and structural-statistical features. The solution to the posed problem of applying steganographic transformations is proposed to be realised by methods of indirectly embedding parts of the hidden message in certain conditions or functional relationships. The possibility of creating steganographic transformations regarding the indirect embedding and extraction of hidden information in a multiadic basis by modifying the underlying basis system within an admissible set is demonstrated. It is shown that the multiadic system, which is created in the spectral space of DCT transforms, has the potential to form a set of admissible modifications of basis systems.


Keywords:

steganographic transformations, video container, video compression, indirect embedding

Alam, M. A.: Faster Image Compression Technique Based on LZW Algorithm Using GPU Parallel Processing. Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), 2018, 272–275 [http://doi.org/10.1109/ICIEV.2018.8640956].
DOI: https://doi.org/10.1109/ICIEV.2018.8640956   Google Scholar

Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, 2001.
  Google Scholar

Barannik V.: Fast Coding of Irregular Binary Binomial Numbers with a Set Number of Units Series. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, 29–33 [http://doi.org/10.1109/ATIT50783.2020.9349356].
  Google Scholar

Barannik D.: Stegano-Compression Coding in a Non-Equalible Positional Base. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 83–86 [http://doi.org/10.1109/ATIT50783.2020.9349328].
  Google Scholar

Barannik N., Ryabukha Yu.: Method of Indirect Steganographic Coding of Information without Visual Distortion of the Video Container series. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 57–61 [http://doi.org/10.1109/ATIT50783.2020.9349262].
  Google Scholar

Barannik V., Hahanova A., Krivonos V.: Coding tangible component of transforms to provide accessibility and integrity of video data. International Symposium, East-West Design & Test Symposium (EWDTS), 2013, 1–5 [http://doi.org/10.1109/EWDTS.2013.6673179].
DOI: https://doi.org/10.1109/EWDTS.2013.6673179   Google Scholar

Barannik V. V., Karpinski M. P., Tverdokhleb V. V., Barannik D. V., Himenko V. V., Aleksander M.: The technology of the video stream intensity controlling based on the bit-planes recombination. 4th IEEE International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018, 25–28 [http://doi.org/10.1109/IDAACS-SWS.2018.8525560].
DOI: https://doi.org/10.1109/IDAACS-SWS.2018.8525560   Google Scholar

Barannik V., Barannik D., Fustii V., Parkhomenko M.: Technology for Protecting Video Information Resources in the Info-Communication Space. IEEE 3rd International Conference on Advanced Information and Communications Technologies (IEEE AICT 2019), 2019, 248–250 [http://doi.org/10.1109/AIACT.2019.8847820].
DOI: https://doi.org/10.1109/AIACT.2019.8847820   Google Scholar

Barannik, V., Barannik, N., Ryabukha, Yu., Barannik, D. Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. 15 th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science, 2020, 699–702 [http://doi.org/10.1109/TCSET49122.2020.235522].
DOI: https://doi.org/10.1109/TCSET49122.2020.235522   Google Scholar

Barannik V., Himenko V., Babenko Yu., Hahanova A., Fustii V.: Technology of Composite Code Forming in The Spatial-Spectral Description Significant Microsegments. IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, 2020, 703–706 [http://doi.org/10.1109/TCSET49122.2020.235523].
DOI: https://doi.org/10.1109/TCSET49122.2020.235523   Google Scholar

Barannik V., Jancarczyk D., Babenko Yu., Stepanko O., Nikodem J., Zawislak S.: A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural Basis. IEEE 5nd International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IEEE IDAACS-SWS 2020), 2020, 1–5 [http://doi.org/10.1109/IDAACS-SWS50031.2020.9297068].
DOI: https://doi.org/10.1109/IDAACS-SWS50031.2020.9297068   Google Scholar

Barannik V., Kharchenko N., Othman Shadi O., Musienko A.: A method to control bit rate while compressing predicted frames. IEEE International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics (IEEE CADSM 2015), 2015, 36–38 [http://doi.org/10.1109/CADSM.2015.7230789].
DOI: https://doi.org/10.1109/CADSM.2015.7230789   Google Scholar

Barannik V., Kharchenko N., Tverdokhleb V., Kulitsa O.: The issue of timely delivery of video traffic with controlled loss of quality. 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2016, 902–904 [http://doi.org/10.1109/TCSET.2016.7452220].
DOI: https://doi.org/10.1109/TCSET.2016.7452220   Google Scholar

Barannik V., Shulgin S., Krasnorutsky A., Slobodyanyuk O., Gurzhii P., Korolyova N.: Methodological Fundamentals of Deciphering Coding of Aerophotography Segments on Special Equipment of Unmanned Complex. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 38–43 [http://doi.org/10.1109/ATIT50783.2020.9349257].
  Google Scholar

Barannik V., Sidchenko S., Barannik N., Khimenko A.: The method of masking overhead compaction in video compression systems. Radioelectronic and Computer Systems 2, 2021, 51–63. [https://doi.org/10.32620/reks.2021.2.05].
DOI: https://doi.org/10.32620/reks.2021.2.05   Google Scholar

Belikova T.: Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. Proceedings of the 2nd IEEE International Conference Advanced Trends in Information Theory (ATIT), 2020, 87–91 [https://ieeexplore.ieee.org/document/9349300].
  Google Scholar

Bui V., Chang L., Li D., Hsu L., Chen M.: Comparison of lossless video and image compression codecs for medical computed tomography datasets. IEEE International Conference on Big Data, 2016 3960–3962 [http://doi.org/10.1109/BigData.2016.7841075].
DOI: https://doi.org/10.1109/BigData.2016.7841075   Google Scholar

Chen T.-H., Wu Ch.-S.: Efficient multi-secret image sharing based on Boolean operation. Signal Processing 91(1), 2011, 90–97 [http://doi.org/10.1016/j.sigpro.2010.06.012].
DOI: https://doi.org/10.1016/j.sigpro.2010.06.012   Google Scholar

Deshmukh M., Nain N., Ahmed M.: An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic. IEEE 30 th International Conference on Advanced Information Networking and Applications (AINA), 2016, 690–697 [http://doi.org/10.1109/aina.2016.56].
DOI: https://doi.org/10.1109/AINA.2016.56   Google Scholar

Djelouah A., Campos J., Schaub-Meyer S., Schroers C.: Neural Inter-Frame Compression for Video Coding. IEEE/CVF International Conference on Computer Vision (ICCV), 2019, 6420–6428 [http://doi.org/10.1109/ICCV.2019.00652].
DOI: https://doi.org/10.1109/ICCV.2019.00652   Google Scholar

Dong W., Wang J.: JPEG Compression Forensics against Resizing. IEEE Trustcom/BigDataSE/IвSPA, 2016, 1001–1007 [http://doi.org/10.1109/TrustCom.2016.0168].
DOI: https://doi.org/10.1109/TrustCom.2016.0168   Google Scholar

Gonzales R. C., Woods R. E.: Digital image processing. Prentice Inc., Upper Saddle River 2002.
  Google Scholar

Honda T., Murakami Y., Yanagihara Y., Kumaki T., Fujino T.: Hierarchical image-scrambling method with scramble-level controllability for privacy protection. IEEE 56th International Midwest Symposium on Circuits and Systems, 2013, 1371–1374 [http://doi.org/10.1109/MWSCAS.2013.6674911].
DOI: https://doi.org/10.1109/MWSCAS.2013.6674911   Google Scholar

Ieremeiev O., Lukin V., Okarma K.: Combined visual quality metric of remote sensing images based on neural network. Radioelectronic and computer systems 4, 2020, 4–15 [http://doi.org/10.32620/reks.2020.4.01].
DOI: https://doi.org/10.32620/reks.2020.4.01   Google Scholar

Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007.
  Google Scholar

JPEG Privacy & Security Abstract and Executive Summary, 2015 [https://jpeg.org/items/20150910_privacy_security_summary.html].
  Google Scholar

Komolov D., Zhurbynskyy D., Kulitsa O.: Selective Method For Hiding of Video Information Resource In Telecommunication Systems Based on Encryption of Energy-Significant Blocks of Reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, 80–83.
  Google Scholar

Li F., Krivenko S., Lukin V.: Two-step providing of desired quality in lossy image compression by SPIHT. Radioelectronic and computer systems 2, 2020, 22–32 [http://doi.org/10.32620/reks.2020.2.02].
DOI: https://doi.org/10.32620/reks.2020.2.02   Google Scholar

Naor M., Shamir A.: Visual Cryptography. Proceedings of the Advances in Cryptology – EUROCRYPT'94. Lecture Notes in Computer Science 950, 1995, 1–12 [http://doi.org/10.1007/bfb0053419].
DOI: https://doi.org/10.1007/BFb0053419   Google Scholar

Narmatha C., Manimegalai P., Manimurugan S.: A LS-compression scheme for grayscale images using pixel based technique. International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT), 2017, 1–5 [http://doi.org/10.1109/IGEHT.2017.8093980].
DOI: https://doi.org/10.1109/IGEHT.2017.8093980   Google Scholar

Richter T.: Error Bounds for HDR Image Coding with JPEG XT. Data Compression Conference, 2017, 122–130 [http://doi.org/10.1109/DCC.2017.7].
DOI: https://doi.org/10.1109/DCC.2017.7   Google Scholar

Rippel O.: Learned Video Compression. IEEE/CVF International Conference on Computer Vision (ICCV), 2019, 3453–3462 [http://doi.org/10.1109/ICCV.2019.00355].
DOI: https://doi.org/10.1109/ICCV.2019.00355   Google Scholar

Rivest R. L., Shamir A., Adleman L. M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 1978, 120–126 [http://doi.org/10.1145/359340.359342].
DOI: https://doi.org/10.1145/359340.359342   Google Scholar

Sharma R., Bollavarapu S.: Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications 117(14), 2015, 15–18 [http://doi.org/10.5120/20621-3342].
DOI: https://doi.org/10.5120/20621-3342   Google Scholar

Wang S., Kim S. M., Yin Z., He T.: Encode when necessary: Correlated network coding under unreliable wireless links. ACM Transactions on Sensor Networks 13(1), 2017, article 7, 1–22 [http://doi.org/10.1145/3023953].
DOI: https://doi.org/10.1145/3023953   Google Scholar

Wang S., Zhang X., Liu X., Zhang J., Ma S., Gao W.: Utility Driven Adaptive Preprocessing for Screen Content Video Compression. IEEE Transactions on Multimedia 19(3), 2017, 660–667.
DOI: https://doi.org/10.1109/TMM.2016.2625276   Google Scholar

Wang X., Xiao J., Hu R., Wang Z.: Cruise UAV Video Compression Based on Long-Term Wide-Range Background. Data Compression Conference (DCC), 2017, 466–467 [http://doi.org/10.1109/DCC.2017.71].
DOI: https://doi.org/10.1109/DCC.2017.71   Google Scholar

Watanabe O., Uchida A., Fukuhara T., Kiya H.: An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, 1226–1230 [http://doi.org/10.1109/ICASSP.2015.7178165].
DOI: https://doi.org/10.1109/ICASSP.2015.7178165   Google Scholar

Wu H., Sun X., Yang J., Zeng W., Wu F.: Lossless Compression of JPEG Coded Photo Collections. IEEE Transactions on Image Processing 25(6), 2016, 2684–2696 [http://doi.org/10.1109/TIP.2016.2551366].
DOI: https://doi.org/10.1109/TIP.2016.2551366   Google Scholar

Xiao W., Wan N., Hong A., Chen X.: A Fast JPEG Image Compression Algorithm Based on DCT. IEEE International Conference on Smart Cloud, 2020, 106–110 [http://doi.org/10.1109/SmartCloud49737.2020.00028].
DOI: https://doi.org/10.1109/SmartCloud49737.2020.00028   Google Scholar

Yang Ch.-N., Chen Ch.-H., Cai S.-R.: Enhanced Boolean-based multi secret image sharing scheme. Journal of Systems and Software 116, 2016, 22–34 [http://doi.org/10.1016/j.jss.2015.01.031].
DOI: https://doi.org/10.1016/j.jss.2015.01.031   Google Scholar

Yuan L., Korshunov P., Ebrahimi T.: Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11 th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, 1–6 [http://doi.org/10.1109/FG.2015.7285022].
DOI: https://doi.org/10.1109/FG.2015.7285022   Google Scholar

Zhou J., Liu X., Au O. C., Tang Y. Y.: Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security 9(1), 2014, 39–50 [http://doi.org/10.1109/TIFS.2013.2291625].
DOI: https://doi.org/10.1109/TIFS.2013.2291625   Google Scholar

Download


Published
2021-12-20

Cited by

Barannik, V., Barannik, N., & Slobodyanyuk, O. (2021). INDIRECT INFORMATION HIDING TECHNOLOGY ON A MULTIADIC BASIS. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 11(4), 14–17. https://doi.org/10.35784/iapgos.2812

Authors

Volodymyr Barannik 

V.N. Karazin Kharkiv National University Ukraine
http://orcid.org/0000-0002-2848-4524

Authors

Natalia Barannik 

National University of Civil Defence of Ukraine Ukraine
http://orcid.org/0000-0001-6420-1838

Authors

Oleksandr Slobodyanyuk 
slobodyanyuk.olexandr@kpnu.edu.ua
Kamianets-Podilskyi Ivan Ohiienko National University Ukraine
http://orcid.org/0000-0001-5195-3053

Statistics

Abstract views: 350
PDF downloads: 186