{"title":"Steganography Method in Error-Correcting Codes","authors":"E. Medvedeva, I. Trubin, Egor Blinov","doi":"10.1109/dspa53304.2022.9790782","DOIUrl":null,"url":null,"abstract":"This article proposes a method of steganography based on the use of error-correcting codes, in which information is concealed by masking embedded information under bit errors using a secret key. The results of experimental estimates of system characteristics depending on operating modes of the system based on the use of the error control BCH code are presented. It is shown that changing parameters of codes provides flexible system configuration for different tasks. The system is ideal for passive attacks. Active and malicious attackers are able to interrupt the transmission process, but not to prove the presence of hidden information. The method allows organizing a covert information transmission channel regardless of the type of transmitted data.","PeriodicalId":428492,"journal":{"name":"2022 24th International Conference on Digital Signal Processing and its Applications (DSPA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 24th International Conference on Digital Signal Processing and its Applications (DSPA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/dspa53304.2022.9790782","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This article proposes a method of steganography based on the use of error-correcting codes, in which information is concealed by masking embedded information under bit errors using a secret key. The results of experimental estimates of system characteristics depending on operating modes of the system based on the use of the error control BCH code are presented. It is shown that changing parameters of codes provides flexible system configuration for different tasks. The system is ideal for passive attacks. Active and malicious attackers are able to interrupt the transmission process, but not to prove the presence of hidden information. The method allows organizing a covert information transmission channel regardless of the type of transmitted data.