TECHNOLOGIA POŚREDNIEGO UKRYWANIA INFORMACJI NA ZASADZIE MULTIADYCZNEJ
Volodymyr Barannik
V.N. Karazin Kharkiv National University (Ukraina)
http://orcid.org/0000-0002-2848-4524
Natalia Barannik
National University of Civil Defence of Ukraine (Ukraina)
http://orcid.org/0000-0001-6420-1838
Oleksandr Slobodyanyuk
slobodyanyuk.olexandr@kpnu.edu.uaKamianets-Podilskyi Ivan Ohiienko National University (Ukraina)
http://orcid.org/0000-0001-5195-3053
Abstrakt
Wykazano, że aktualnym kierunkiem zwiększania bezpieczeństwa zasobów informacyjnych przy przesyłaniu informacji w systemach info-komunikacyjnych jest stosowanie metod instrukcji steganograficznej w obrazach wideo. Skuteczność tych metod znacznie wzrasta, gdy są one stosowane w zespole metod ukrywania, które opierają się na zasadach bezpośredniego i pośredniego osadzania komunikatów. Jednocześnie istniejące metody steganografii wykorzystują w procesie osadzania informacji głównie wzorce generowane przez cechy percepcji wizualnej obrazów wideo. Tak więc, uzasadnione jest, że istotnym jest problem naukowy i praktyczny polegający na zwiększeniu gęstości osadzonych wiadomości w kontenerze wideo z danym poziomem ich wiarygodności. Sednem tego problemu jest rozwiązanie kontrowersji, że wzrost gęstości osadzonych danych prowadzi do spadku przepływności kontenera wideo, odporności na steganoanalizę, wiarygodności informacji specjalnych i kontenera wideo. Dlatego celem pracy jest opracowanie metodyki steganograficznego osadzania informacji uwzględniającej prawa kontenera wideo, które są generowane przez jego cechy strukturalne i konstrukcyjno-statystyczne. Rozwiązanie postawionego problemu w zakresie zastosowania przekształceń steganograficznych proponuje się zrealizować metodami pośredniego osadzania części ukrytego komunikatu w pewnych warunkach lub zależności funkcjonalnych. Wykazano możliwość tworzenia przekształceń steganograficznych odnośnie pośredniego wbudowania i ekstrakcji ukrytych informacji w bazie wieloaddycznej poprzez modyfikację podstawowego układu bazowego w ramach dopuszczalnego zbioru. Udowodniono, że układ wieloadyczny, który powstaje w przestrzeni spektralnej transformat DCT, ma potencjał do tworzenia zbioru dopuszczalnych modyfikacji układów bazowych.
Słowa kluczowe:
transformacje steganograficzne, kontener wideo, kompresja wideo, pośrednie osadzanieBibliografia
Alam, M. A.: Faster Image Compression Technique Based on LZW Algorithm Using GPU Parallel Processing. Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), 2018, 272–275 [http://doi.org/10.1109/ICIEV.2018.8640956].
DOI: https://doi.org/10.1109/ICIEV.2018.8640956
Google Scholar
Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, 2001.
Google Scholar
Barannik V.: Fast Coding of Irregular Binary Binomial Numbers with a Set Number of Units Series. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, 29–33 [http://doi.org/10.1109/ATIT50783.2020.9349356].
Google Scholar
Barannik D.: Stegano-Compression Coding in a Non-Equalible Positional Base. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 83–86 [http://doi.org/10.1109/ATIT50783.2020.9349328].
Google Scholar
Barannik N., Ryabukha Yu.: Method of Indirect Steganographic Coding of Information without Visual Distortion of the Video Container series. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 57–61 [http://doi.org/10.1109/ATIT50783.2020.9349262].
Google Scholar
Barannik V., Hahanova A., Krivonos V.: Coding tangible component of transforms to provide accessibility and integrity of video data. International Symposium, East-West Design & Test Symposium (EWDTS), 2013, 1–5 [http://doi.org/10.1109/EWDTS.2013.6673179].
DOI: https://doi.org/10.1109/EWDTS.2013.6673179
Google Scholar
Barannik V. V., Karpinski M. P., Tverdokhleb V. V., Barannik D. V., Himenko V. V., Aleksander M.: The technology of the video stream intensity controlling based on the bit-planes recombination. 4th IEEE International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018, 25–28 [http://doi.org/10.1109/IDAACS-SWS.2018.8525560].
DOI: https://doi.org/10.1109/IDAACS-SWS.2018.8525560
Google Scholar
Barannik V., Barannik D., Fustii V., Parkhomenko M.: Technology for Protecting Video Information Resources in the Info-Communication Space. IEEE 3rd International Conference on Advanced Information and Communications Technologies (IEEE AICT 2019), 2019, 248–250 [http://doi.org/10.1109/AIACT.2019.8847820].
DOI: https://doi.org/10.1109/AIACT.2019.8847820
Google Scholar
Barannik, V., Barannik, N., Ryabukha, Yu., Barannik, D. Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. 15 th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science, 2020, 699–702 [http://doi.org/10.1109/TCSET49122.2020.235522].
DOI: https://doi.org/10.1109/TCSET49122.2020.235522
Google Scholar
Barannik V., Himenko V., Babenko Yu., Hahanova A., Fustii V.: Technology of Composite Code Forming in The Spatial-Spectral Description Significant Microsegments. IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, 2020, 703–706 [http://doi.org/10.1109/TCSET49122.2020.235523].
DOI: https://doi.org/10.1109/TCSET49122.2020.235523
Google Scholar
Barannik V., Jancarczyk D., Babenko Yu., Stepanko O., Nikodem J., Zawislak S.: A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural Basis. IEEE 5nd International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IEEE IDAACS-SWS 2020), 2020, 1–5 [http://doi.org/10.1109/IDAACS-SWS50031.2020.9297068].
DOI: https://doi.org/10.1109/IDAACS-SWS50031.2020.9297068
Google Scholar
Barannik V., Kharchenko N., Othman Shadi O., Musienko A.: A method to control bit rate while compressing predicted frames. IEEE International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics (IEEE CADSM 2015), 2015, 36–38 [http://doi.org/10.1109/CADSM.2015.7230789].
DOI: https://doi.org/10.1109/CADSM.2015.7230789
Google Scholar
Barannik V., Kharchenko N., Tverdokhleb V., Kulitsa O.: The issue of timely delivery of video traffic with controlled loss of quality. 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2016, 902–904 [http://doi.org/10.1109/TCSET.2016.7452220].
DOI: https://doi.org/10.1109/TCSET.2016.7452220
Google Scholar
Barannik V., Shulgin S., Krasnorutsky A., Slobodyanyuk O., Gurzhii P., Korolyova N.: Methodological Fundamentals of Deciphering Coding of Aerophotography Segments on Special Equipment of Unmanned Complex. IEEE 2 nd International Conference on Advanced Trends in Information Theory, 2020, 38–43 [http://doi.org/10.1109/ATIT50783.2020.9349257].
Google Scholar
Barannik V., Sidchenko S., Barannik N., Khimenko A.: The method of masking overhead compaction in video compression systems. Radioelectronic and Computer Systems 2, 2021, 51–63. [https://doi.org/10.32620/reks.2021.2.05].
DOI: https://doi.org/10.32620/reks.2021.2.05
Google Scholar
Belikova T.: Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. Proceedings of the 2nd IEEE International Conference Advanced Trends in Information Theory (ATIT), 2020, 87–91 [https://ieeexplore.ieee.org/document/9349300].
Google Scholar
Bui V., Chang L., Li D., Hsu L., Chen M.: Comparison of lossless video and image compression codecs for medical computed tomography datasets. IEEE International Conference on Big Data, 2016 3960–3962 [http://doi.org/10.1109/BigData.2016.7841075].
DOI: https://doi.org/10.1109/BigData.2016.7841075
Google Scholar
Chen T.-H., Wu Ch.-S.: Efficient multi-secret image sharing based on Boolean operation. Signal Processing 91(1), 2011, 90–97 [http://doi.org/10.1016/j.sigpro.2010.06.012].
DOI: https://doi.org/10.1016/j.sigpro.2010.06.012
Google Scholar
Deshmukh M., Nain N., Ahmed M.: An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic. IEEE 30 th International Conference on Advanced Information Networking and Applications (AINA), 2016, 690–697 [http://doi.org/10.1109/aina.2016.56].
DOI: https://doi.org/10.1109/AINA.2016.56
Google Scholar
Djelouah A., Campos J., Schaub-Meyer S., Schroers C.: Neural Inter-Frame Compression for Video Coding. IEEE/CVF International Conference on Computer Vision (ICCV), 2019, 6420–6428 [http://doi.org/10.1109/ICCV.2019.00652].
DOI: https://doi.org/10.1109/ICCV.2019.00652
Google Scholar
Dong W., Wang J.: JPEG Compression Forensics against Resizing. IEEE Trustcom/BigDataSE/IвSPA, 2016, 1001–1007 [http://doi.org/10.1109/TrustCom.2016.0168].
DOI: https://doi.org/10.1109/TrustCom.2016.0168
Google Scholar
Gonzales R. C., Woods R. E.: Digital image processing. Prentice Inc., Upper Saddle River 2002.
Google Scholar
Honda T., Murakami Y., Yanagihara Y., Kumaki T., Fujino T.: Hierarchical image-scrambling method with scramble-level controllability for privacy protection. IEEE 56th International Midwest Symposium on Circuits and Systems, 2013, 1371–1374 [http://doi.org/10.1109/MWSCAS.2013.6674911].
DOI: https://doi.org/10.1109/MWSCAS.2013.6674911
Google Scholar
Ieremeiev O., Lukin V., Okarma K.: Combined visual quality metric of remote sensing images based on neural network. Radioelectronic and computer systems 4, 2020, 4–15 [http://doi.org/10.32620/reks.2020.4.01].
DOI: https://doi.org/10.32620/reks.2020.4.01
Google Scholar
Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007.
Google Scholar
JPEG Privacy & Security Abstract and Executive Summary, 2015 [https://jpeg.org/items/20150910_privacy_security_summary.html].
Google Scholar
Komolov D., Zhurbynskyy D., Kulitsa O.: Selective Method For Hiding of Video Information Resource In Telecommunication Systems Based on Encryption of Energy-Significant Blocks of Reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, 80–83.
Google Scholar
Li F., Krivenko S., Lukin V.: Two-step providing of desired quality in lossy image compression by SPIHT. Radioelectronic and computer systems 2, 2020, 22–32 [http://doi.org/10.32620/reks.2020.2.02].
DOI: https://doi.org/10.32620/reks.2020.2.02
Google Scholar
Naor M., Shamir A.: Visual Cryptography. Proceedings of the Advances in Cryptology – EUROCRYPT'94. Lecture Notes in Computer Science 950, 1995, 1–12 [http://doi.org/10.1007/bfb0053419].
DOI: https://doi.org/10.1007/BFb0053419
Google Scholar
Narmatha C., Manimegalai P., Manimurugan S.: A LS-compression scheme for grayscale images using pixel based technique. International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT), 2017, 1–5 [http://doi.org/10.1109/IGEHT.2017.8093980].
DOI: https://doi.org/10.1109/IGEHT.2017.8093980
Google Scholar
Richter T.: Error Bounds for HDR Image Coding with JPEG XT. Data Compression Conference, 2017, 122–130 [http://doi.org/10.1109/DCC.2017.7].
DOI: https://doi.org/10.1109/DCC.2017.7
Google Scholar
Rippel O.: Learned Video Compression. IEEE/CVF International Conference on Computer Vision (ICCV), 2019, 3453–3462 [http://doi.org/10.1109/ICCV.2019.00355].
DOI: https://doi.org/10.1109/ICCV.2019.00355
Google Scholar
Rivest R. L., Shamir A., Adleman L. M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 1978, 120–126 [http://doi.org/10.1145/359340.359342].
DOI: https://doi.org/10.1145/359340.359342
Google Scholar
Sharma R., Bollavarapu S.: Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications 117(14), 2015, 15–18 [http://doi.org/10.5120/20621-3342].
DOI: https://doi.org/10.5120/20621-3342
Google Scholar
Wang S., Kim S. M., Yin Z., He T.: Encode when necessary: Correlated network coding under unreliable wireless links. ACM Transactions on Sensor Networks 13(1), 2017, article 7, 1–22 [http://doi.org/10.1145/3023953].
DOI: https://doi.org/10.1145/3023953
Google Scholar
Wang S., Zhang X., Liu X., Zhang J., Ma S., Gao W.: Utility Driven Adaptive Preprocessing for Screen Content Video Compression. IEEE Transactions on Multimedia 19(3), 2017, 660–667.
DOI: https://doi.org/10.1109/TMM.2016.2625276
Google Scholar
Wang X., Xiao J., Hu R., Wang Z.: Cruise UAV Video Compression Based on Long-Term Wide-Range Background. Data Compression Conference (DCC), 2017, 466–467 [http://doi.org/10.1109/DCC.2017.71].
DOI: https://doi.org/10.1109/DCC.2017.71
Google Scholar
Watanabe O., Uchida A., Fukuhara T., Kiya H.: An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, 1226–1230 [http://doi.org/10.1109/ICASSP.2015.7178165].
DOI: https://doi.org/10.1109/ICASSP.2015.7178165
Google Scholar
Wu H., Sun X., Yang J., Zeng W., Wu F.: Lossless Compression of JPEG Coded Photo Collections. IEEE Transactions on Image Processing 25(6), 2016, 2684–2696 [http://doi.org/10.1109/TIP.2016.2551366].
DOI: https://doi.org/10.1109/TIP.2016.2551366
Google Scholar
Xiao W., Wan N., Hong A., Chen X.: A Fast JPEG Image Compression Algorithm Based on DCT. IEEE International Conference on Smart Cloud, 2020, 106–110 [http://doi.org/10.1109/SmartCloud49737.2020.00028].
DOI: https://doi.org/10.1109/SmartCloud49737.2020.00028
Google Scholar
Yang Ch.-N., Chen Ch.-H., Cai S.-R.: Enhanced Boolean-based multi secret image sharing scheme. Journal of Systems and Software 116, 2016, 22–34 [http://doi.org/10.1016/j.jss.2015.01.031].
DOI: https://doi.org/10.1016/j.jss.2015.01.031
Google Scholar
Yuan L., Korshunov P., Ebrahimi T.: Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11 th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, 1–6 [http://doi.org/10.1109/FG.2015.7285022].
DOI: https://doi.org/10.1109/FG.2015.7285022
Google Scholar
Zhou J., Liu X., Au O. C., Tang Y. Y.: Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security 9(1), 2014, 39–50 [http://doi.org/10.1109/TIFS.2013.2291625].
DOI: https://doi.org/10.1109/TIFS.2013.2291625
Google Scholar
Autorzy
Volodymyr BarannikV.N. Karazin Kharkiv National University Ukraina
http://orcid.org/0000-0002-2848-4524
Autorzy
Natalia BarannikNational University of Civil Defence of Ukraine Ukraina
http://orcid.org/0000-0001-6420-1838
Autorzy
Oleksandr Slobodyanyukslobodyanyuk.olexandr@kpnu.edu.ua
Kamianets-Podilskyi Ivan Ohiienko National University Ukraina
http://orcid.org/0000-0001-5195-3053
Statystyki
Abstract views: 350PDF downloads: 186
Licencja
Utwór dostępny jest na licencji Creative Commons Uznanie autorstwa – Na tych samych warunkach 4.0 Miedzynarodowe.
Inne teksty tego samego autora
- Vladimir Barannik, Bogdan Gorodetsky, Natalia Barannik, STEGANOGRAFIA – TEORIA I PRAKTYKA , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Tom 9 Nr 1 (2019)
- Volodymyr Barannik, Mykola Dvorsky, Valeriy Barannik, Viktoria Himenko, Anton Sorokun, POPRAWA METOD KOMPENSACJI RUCHU PORUSZAJĄCYCH SIĘ OBIEKTÓW DYNAMICZNYCH W STREAMIE WIDEO SYSTEMU WIDEOKONFERENCYJNEGO , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Tom 8 Nr 4 (2018)
- Volodymyr Barannik, Oleg Shatun, Dmitriy Barannik, Veronika Kobtseva, OPRACOWANIE METODY POŚREDNIEGO STEGANOGRAFICZNEGO UKRYWANIA DANYCH W INFORMACJI O KONTURZE , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Tom 8 Nr 4 (2018)
- Volodymyr Barannik, Roman Onyshchenko, Gennady Pris, Mykhailo Babenko, Valeriy Barannik, Vitalii Shmakov, Ivan Pantas, METODA TWORZENIA SYSTEMU SKRÓCONEGO KODU POZYCYJNEGO DLA PRZEKSZTAŁCONYCH OBRAZÓW WIDEO , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Tom 14 Nr 3 (2024)
- Volodymyr Barannik, Dmytro Havrylov, Serhii Pantas, Yurii Tsimura, Tatayna Belikova, Rimma Viedienieva, Vasyl Kryshtal, METODA ADAPTACYJNEGO KODOWANIA STATYSTYCZNEGO Z UWZGLĘDNIENIEM CECHY STRUKTURALNE OBRAZÓW WIDEO , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Tom 14 Nr 4 (2024)