119,604 research outputs found
ПРИМЕНЕНИЕ МЕТОДА КУТТЕРА – ДЖОРДАНА – БОССЕНА ДЛЯ СОКРЫТИЯ ДАННЫХ В ПРОСТРАНСТВЕННОЙ ОБЛАСТИ ИЗОБРАЖЕНИЯ
The article deals with the main methods of digital steganography and presents a classification scheme. Special attention is paid to Cutter–Jordan–Bossen method for hiding data in the spatial area of the image. Aim. The study of digital shorthand methods, as well as the assessment of their applicability for hiding information in images. The main task is to analyze the Cutter–Jordan–Bossen method for hiding data in the spatial area of the image and evaluate its effectiveness under various conditions. Materials and methods. In this work, various methods of digital shorthand were used, including the Cutter–Jordan–Bossen method. Images of various types and quality, as well as various embedding parameters were used for testing. Results. As a result of the study, it was revealed that the Cutter–Jordan–Bossen method is effective for hiding information in the spatial area of the image. The dependence of the data extraction quality on the embedding parameters was tested, which showed that the optimal parameters depend on the type of image and its quality. The resistance of the information hidden by this method to distortion during compression was also tested. The test results showed that JPEG compression, even at low and high energy values, leads to the destruction of information hidden in the container. It was found that the best results are achieved when using the Cutter–Jordan–Bossen method with optimal embedding parameters, which allows you to save hidden information when compressing an image. Conclusion. In conclusion, we can say that the study of digital shorthand methods and their application to conceal information in images is an urgent and important topic. The Cutter–Jordan–Bossen method has shown good results in hiding information in the spatial area of the image, but for each specific case it is necessary to choose the optimal embedding parameters. It was found that JPEG compression can significantly affect the quality of information extraction, so it is necessary to take this factor into account when choosing a method for hiding data in an image. In general, the study of digital shorthand techniques and their application to conceal information in images can be useful for various fields, such as the protection of confidential information and digital watermark.В статье рассмотрены основные методы цифровой стенографии и представлена схема классификации. Особое внимание уделено методу Куттера – Джордана – Боссена для сокрытия данных в пространственной области изображения. Цель исследования: изучение методов цифровой стенографии, а также оценка их применимости для сокрытия информации в изображениях. Основной задачей является анализ метода Куттера – Джордана – Боссена для сокрытия данных в пространственной области изображения и оценка его эффективности при различных условиях. Материал и методы. В данной работе были использованы различные методы цифровой стенографии, включая метод Куттера – Джордана – Боссена. Для тестирования были использованы изображения различного типа и качества, а также различные параметры встраивания. Результаты. В результате исследования было выявлено, что метод Куттера – Джордана – Боссена является эффективным для сокрытия информации в пространственной области изображения. Было проведено тестирование зависимости качества извлечения данных от параметров встраивания, которое показало, что оптимальные параметры зависят от типа изображения и его качества. Также была проверена стойкость информации, скрытой с помощью данного метода, к искажениям при сжатии. Результаты тестирования показали, что сжатие JPEG даже при низком уровне и высоком значении энергии приводит к уничтожению скрытой в контейнере информации. Было выявлено, что наилучшие результаты достигаются при использовании метода Куттера – Джордана – Боссена с оптимальными параметрами встраивания, что позволяет сохранить скрытую информацию при сжатии изображения. Заключение. В заключении можно сказать, что исследование методов цифровой стенографии и их применения для сокрытия информации в изображениях является актуальной и важной темой. Метод Куттера – Джордана – Боссена показал хорошие результаты при сокрытии информации в пространственной области изображения, но для каждого конкретного случая необходимо выбирать оптимальные параметры встраивания. Было выявлено, что сжатие JPEG может значительно повлиять на качество извлечения информации, поэтому необходимо учитывать этот фактор при выборе метода сокрытия данных в изображении. В целом, исследование методов цифровой стенографии и их применения для сокрытия информации в изображениях может быть полезным для различных областей, таких как защита конфиденциальной информации и цифровой водяной знак
Unified Description for Network Information Hiding Methods
Until now hiding methods in network steganography have been described in
arbitrary ways, making them difficult to compare. For instance, some
publications describe classical channel characteristics, such as robustness and
bandwidth, while others describe the embedding of hidden information. We
introduce the first unified description of hiding methods in network
steganography. Our description method is based on a comprehensive analysis of
the existing publications in the domain. When our description method is applied
by the research community, future publications will be easier to categorize,
compare and extend. Our method can also serve as a basis to evaluate the
novelty of hiding methods proposed in the future.Comment: 24 pages, 7 figures, 1 table; currently under revie
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
The hurried development of multimedia and internet allows for wide
distribution of digital media data. It becomes much easier to edit, modify and
duplicate digital information. In additional, digital document is also easy to
copy and distribute, therefore it may face many threats. It became necessary to
find an appropriate protection due to the significance, accuracy and
sensitivity of the information. Furthermore, there is no formal method to be
followed to discover a hidden data. In this paper, a new information hiding
framework is presented.The proposed framework aim is implementation of
framework computation between advance encryption standard (AES) and distortion
technique (DT) which embeds information in image page within executable file
(EXE file) to find a secure solution to cover file without change the size of
cover file. The framework includes two main functions; first is the hiding of
the information in the image page of EXE file, through the execution of four
process (specify the cover file, specify the information file, encryption of
the information, and hiding the information) and the second function is the
extraction of the hiding information through three process (specify the stego
file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and
popular way of communicating for Internet users. This also applies to
Peer-to-Peer (P2P) systems and merging these two have already proven to be
successful (e.g. Skype). Even the existing standards of VoIP provide an
assurance of security and Quality of Service (QoS), however, these features are
usually optional and supported by limited number of implementations. As a
result, the lack of mandatory and widely applicable QoS and security guaranties
makes the contemporary VoIP systems vulnerable to attacks and network
disturbances. In this paper we are facing these issues and propose the SecMon
system, which simultaneously provides a lightweight security mechanism and
improves quality parameters of the call. SecMon is intended specially for VoIP
service over P2P networks and its main advantage is that it provides
authentication, data integrity services, adaptive QoS and (D)DoS attack
detection. Moreover, the SecMon approach represents a low-bandwidth consumption
solution that is transparent to the users and possesses a self-organizing
capability. The above-mentioned features are accomplished mainly by utilizing
two information hiding techniques: digital audio watermarking and network
steganography. These techniques are used to create covert channels that serve
as transport channels for lightweight QoS measurement's results. Furthermore,
these metrics are aggregated in a reputation system that enables best route
path selection in the P2P network. The reputation system helps also to mitigate
(D)DoS attacks, maximize performance and increase transmission efficiency in
the network.Comment: Paper was presented at 7th international conference IBIZA 2008: On
Computer Science - Research And Applications, Poland, Kazimierz Dolny
31.01-2.02 2008; 14 pages, 5 figure
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions
Network steganography conceals the transfer of sensitive information within
unobtrusive data in computer networks. So-called micro protocols are
communication protocols placed within the payload of a network steganographic
transfer. They enrich this transfer with features such as reliability, dynamic
overlay routing, or performance optimization --- just to mention a few. We
present different design approaches for the embedding of hidden channels with
micro protocols in digitized audio signals under consideration of different
requirements. On the basis of experimental results, our design approaches are
compared, and introduced into a protocol engineering approach for micro
protocols.Comment: 20 pages, 7 figures, 4 table
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent
network transmissions. Recent findings indicate that novel malware is
increasingly using network steganography. Similarly, other malicious activities
can profit from network steganography, such as data leakage or the exchange of
pedophile data. This paper provides an introduction to network steganography
and highlights its potential application for harmful purposes. We discuss the
issues related to countering network steganography in practice and provide an
outlook on further research directions and problems.Comment: 11 page
- …