119,604 research outputs found

    ПРИМЕНЕНИЕ МЕТОДА КУТТЕРА – ДЖОРДАНА – БОССЕНА ДЛЯ СОКРЫТИЯ ДАННЫХ В ПРОСТРАНСТВЕННОЙ ОБЛАСТИ ИЗОБРАЖЕНИЯ

    Get PDF
    The article deals with the main methods of digital steganography and presents a classification scheme. Special attention is paid to Cutter–Jordan–Bossen method for hiding data in the spatial area of the image. Aim. The study of digital shorthand methods, as well as the assessment of their applicability for hiding information in images. The main task is to analyze the Cutter–Jordan–Bossen method for hiding data in the spatial area of the image and evaluate its effectiveness under various conditions. Materials and methods. In this work, various methods of digital shorthand were used, including the Cutter–Jordan–Bossen method. Images of various types and quality, as well as various embedding parameters were used for testing. Results. As a result of the study, it was revealed that the Cutter–Jordan–Bossen method is effective for hiding information in the spatial area of the image. The dependence of the data extraction quality on the embedding parameters was tested, which showed that the optimal parameters depend on the type of image and its quality. The resistance of the information hidden by this method to distortion during compression was also tested. The test results showed that JPEG compression, even at low and high energy values, leads to the destruction of information hidden in the container. It was found that the best results are achieved when using the Cutter–Jordan–Bossen method with optimal embedding parameters, which allows you to save hidden information when compressing an image. Conclusion. In conclusion, we can say that the study of digital shorthand methods and their application to conceal information in images is an urgent and important topic. The Cutter–Jordan–Bossen method has shown good results in hiding information in the spatial area of the image, but for each specific case it is necessary to choose the optimal embedding parameters. It was found that JPEG compression can significantly affect the quality of information extraction, so it is necessary to take this factor into account when choosing a method for hiding data in an image. In general, the study of digital shorthand techniques and their application to conceal information in images can be useful for various fields, such as the protection of confidential information and digital watermark.В статье рассмотрены основные методы цифровой стенографии и представлена схема классификации. Особое внимание уделено методу Куттера – Джордана – Боссена для сокрытия данных в пространственной области изображения. Цель исследования: изучение методов цифровой стенографии, а также оценка их применимости для сокрытия информации в изображениях. Основной задачей является анализ метода Куттера – Джордана – Боссена для сокрытия данных в пространственной области изображения и оценка его эффективности при различных условиях. Материал и методы. В данной работе были использованы различные методы цифровой стенографии, включая метод Куттера – Джордана – Боссена. Для тестирования были использованы изображения различного типа и качества, а также различные параметры встраивания. Результаты. В результате исследования было выявлено, что метод Куттера – Джордана – Боссена является эффективным для сокрытия информации в пространственной области изображения. Было проведено тестирование зависимости качества извлечения данных от параметров встраивания, которое показало, что оптимальные параметры зависят от типа изображения и его качества. Также была проверена стойкость информации, скрытой с помощью данного метода, к искажениям при сжатии. Результаты тестирования показали, что сжатие JPEG даже при низком уровне и высоком значении энергии приводит к уничтожению скрытой в контейнере информации. Было выявлено, что наилучшие результаты достигаются при использовании метода Куттера – Джордана – Боссена с оптимальными параметрами встраивания, что позволяет сохранить скрытую информацию при сжатии изображения. Заключение. В заключении можно сказать, что исследование методов цифровой стенографии и их применения для сокрытия информации в изображениях является актуальной и важной темой. Метод Куттера – Джордана – Боссена показал хорошие результаты при сокрытии информации в пространственной области изображения, но для каждого конкретного случая необходимо выбирать оптимальные параметры встраивания. Было выявлено, что сжатие JPEG может значительно повлиять на качество извлечения информации, поэтому необходимо учитывать этот фактор при выборе метода сокрытия данных в изображении. В целом, исследование методов цифровой стенографии и их применения для сокрытия информации в изображениях может быть полезным для различных областей, таких как защита конфиденциальной информации и цифровой водяной знак

    Unified Description for Network Information Hiding Methods

    Full text link
    Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe the embedding of hidden information. We introduce the first unified description of hiding methods in network steganography. Our description method is based on a comprehensive analysis of the existing publications in the domain. When our description method is applied by the research community, future publications will be easier to categorize, compare and extend. Our method can also serve as a basis to evaluate the novelty of hiding methods proposed in the future.Comment: 24 pages, 7 figures, 1 table; currently under revie

    Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

    Full text link
    The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding framework is presented.The proposed framework aim is implementation of framework computation between advance encryption standard (AES) and distortion technique (DT) which embeds information in image page within executable file (EXE file) to find a secure solution to cover file without change the size of cover file. The framework includes two main functions; first is the hiding of the information in the image page of EXE file, through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the stego file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42

    SecMon: End-to-End Quality and Security Monitoring System

    Get PDF
    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by limited number of implementations. As a result, the lack of mandatory and widely applicable QoS and security guaranties makes the contemporary VoIP systems vulnerable to attacks and network disturbances. In this paper we are facing these issues and propose the SecMon system, which simultaneously provides a lightweight security mechanism and improves quality parameters of the call. SecMon is intended specially for VoIP service over P2P networks and its main advantage is that it provides authentication, data integrity services, adaptive QoS and (D)DoS attack detection. Moreover, the SecMon approach represents a low-bandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above-mentioned features are accomplished mainly by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement's results. Furthermore, these metrics are aggregated in a reputation system that enables best route path selection in the P2P network. The reputation system helps also to mitigate (D)DoS attacks, maximize performance and increase transmission efficiency in the network.Comment: Paper was presented at 7th international conference IBIZA 2008: On Computer Science - Research And Applications, Poland, Kazimierz Dolny 31.01-2.02 2008; 14 pages, 5 figure

    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

    Full text link
    Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer. They enrich this transfer with features such as reliability, dynamic overlay routing, or performance optimization --- just to mention a few. We present different design approaches for the embedding of hidden channels with micro protocols in digitized audio signals under consideration of different requirements. On the basis of experimental results, our design approaches are compared, and introduced into a protocol engineering approach for micro protocols.Comment: 20 pages, 7 figures, 4 table

    Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

    Full text link
    Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography. Similarly, other malicious activities can profit from network steganography, such as data leakage or the exchange of pedophile data. This paper provides an introduction to network steganography and highlights its potential application for harmful purposes. We discuss the issues related to countering network steganography in practice and provide an outlook on further research directions and problems.Comment: 11 page
    corecore