The Problem of Choosing a Steganographic Container in Conditions of Attacks against an Embedded Message

IF 0.3 Q4 ENERGY & FUELS Problemele Energeticii Regionale Pub Date : 2022-11-01 DOI:10.52254/1857-0070.2022.4-56.07
I. Bobok, A. Kobozieva, S. Sokalsky
{"title":"The Problem of Choosing a Steganographic Container in Conditions of Attacks against an Embedded Message","authors":"I. Bobok, A. Kobozieva, S. Sokalsky","doi":"10.52254/1857-0070.2022.4-56.07","DOIUrl":null,"url":null,"abstract":"Steganography is the perspective area of information security. The reliability of the stegano- graphic system, its stability is affected by the carrier – a container, which is considered in the paper as a digital image. The aim of the work is to increase the resistance of a steganographic system to attacks against an embedded message by developing a method for choosing a contain-er from a finite set of available digital images that ensures the transmitted message the minimum (close to the minimum) possible sensitivity of the generated steganographic message to disturb-ing influences under consideration with the selected steganographic algorithm. The goal was achieved using a theoretical study of perturbations of the formal parameters of the container ma-trix, as a result of steganographic transformation and active attacks, which made it possible to introduce a new formal representation for information protected from perturbing influence E, as the difference of low-rank approximations of container matrices and steganographic messages. The most important result of the work is the development of a container selection method ready for practical implementation. The efficiency of the developed method exceeds the efficiency of analogs, it remains high, regardless of the used steganographic method, which allows increasing the overall resistance of the steganographic system to attacks against the embedded message. The significance of the obtained result lies in the use of the developed method of increasing the stability of the steganographic system to attacks against the embedded message.","PeriodicalId":41974,"journal":{"name":"Problemele Energeticii Regionale","volume":null,"pages":null},"PeriodicalIF":0.3000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Problemele Energeticii Regionale","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52254/1857-0070.2022.4-56.07","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENERGY & FUELS","Score":null,"Total":0}
引用次数: 0

Abstract

Steganography is the perspective area of information security. The reliability of the stegano- graphic system, its stability is affected by the carrier – a container, which is considered in the paper as a digital image. The aim of the work is to increase the resistance of a steganographic system to attacks against an embedded message by developing a method for choosing a contain-er from a finite set of available digital images that ensures the transmitted message the minimum (close to the minimum) possible sensitivity of the generated steganographic message to disturb-ing influences under consideration with the selected steganographic algorithm. The goal was achieved using a theoretical study of perturbations of the formal parameters of the container ma-trix, as a result of steganographic transformation and active attacks, which made it possible to introduce a new formal representation for information protected from perturbing influence E, as the difference of low-rank approximations of container matrices and steganographic messages. The most important result of the work is the development of a container selection method ready for practical implementation. The efficiency of the developed method exceeds the efficiency of analogs, it remains high, regardless of the used steganographic method, which allows increasing the overall resistance of the steganographic system to attacks against the embedded message. The significance of the obtained result lies in the use of the developed method of increasing the stability of the steganographic system to attacks against the embedded message.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
针对嵌入式消息的攻击条件下隐写容器的选择问题
隐写术是信息安全研究的前沿领域。隐写系统的可靠性和稳定性受到载体——容器的影响,本文将其视为数字图像。这项工作的目的是通过开发一种方法,从有限的可用数字图像集中选择一个容器,以确保传输的信息对所选隐写算法所考虑的干扰影响具有最小(接近最小)可能的隐写信息敏感性,从而增加隐写系统对嵌入式信息攻击的抵抗力。通过对隐写变换和主动攻击导致的容器矩阵形式参数扰动的理论研究,实现了这一目标,这使得可以为不受干扰影响E的信息引入一种新的形式表示,作为容器矩阵和隐写消息的低秩近似的差异。这项工作最重要的结果是开发了一种可供实际实现的容器选择方法。所开发的方法的效率超过了类似物的效率,它仍然很高,不管使用的隐写方法,这允许增加隐写系统对嵌入式信息攻击的整体抵抗力。所得结果的意义在于利用所开发的方法提高隐写系统的稳定性来抵御对嵌入信息的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
0.70
自引率
33.30%
发文量
38
期刊最新文献
Reduction of Voltage Fluctuations in Electrical Networks Supplying Motors with a Rapidly Changing Load by Installing Longitudinal Compensation Batteries Intelligent System of Relay Protection of Electrical Network 6-10 kV with the Implementation of Automatic Correction of the Operation Set Point Energy-Efficient Modes of Dehydration of Pome Fruits during Microwave Treatment in Combination with Convection Congestion Management Using an Optimized Deep Convolution Neural Network in Deregulated Environment Study of the Efficiency of Heat-Supply Systems with Steam Turbine CHP Plants, Taking into Account Changes in the Temperature of the Delivery Water during Transportation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1