{"title":"Steganalytical Module for Detecting Embeddings in Images with a Low Stego Container Filling","authors":"D. E. Vil’khovskii","doi":"10.3103/S0146411624700792","DOIUrl":null,"url":null,"abstract":"<p>The study describes the business logic and results of the steganalysis software, a steganalytical complex that operates on the basis of the author’s image steganalysis algorithms, which make it possible to detect embeddings even with low filling of the stego container (10–25% of the total volume). This solution is aimed at increasing the information security of an organization by identifying media files (images) containing an embedding and preventing unauthorized forwarding of such files or viewing and extraction of the received hidden message, as well as preventing the installation of malicious programs, whose module is embedded in the image using a steganographic method. The software package works with embeddings performed using the Koch–Zhao and least-significant-bit substitution (LSB-substitution) methods.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1164 - 1168"},"PeriodicalIF":0.6000,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","FirstCategoryId":"1085","ListUrlMain":"https://link.springer.com/article/10.3103/S0146411624700792","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The study describes the business logic and results of the steganalysis software, a steganalytical complex that operates on the basis of the author’s image steganalysis algorithms, which make it possible to detect embeddings even with low filling of the stego container (10–25% of the total volume). This solution is aimed at increasing the information security of an organization by identifying media files (images) containing an embedding and preventing unauthorized forwarding of such files or viewing and extraction of the received hidden message, as well as preventing the installation of malicious programs, whose module is embedded in the image using a steganographic method. The software package works with embeddings performed using the Koch–Zhao and least-significant-bit substitution (LSB-substitution) methods.
期刊介绍:
Automatic Control and Computer Sciences is a peer reviewed journal that publishes articles on• Control systems, cyber-physical system, real-time systems, robotics, smart sensors, embedded intelligence • Network information technologies, information security, statistical methods of data processing, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management • Signal and image processing, machine learning, machine perception, computer vision