{"title":"The Problem of Choosing a Steganographic Container in Conditions of Attacks against an Embedded Message","authors":"I. Bobok, A. Kobozieva, S. Sokalsky","doi":"10.52254/1857-0070.2022.4-56.07","DOIUrl":null,"url":null,"abstract":"Steganography is the perspective area of information security. The reliability of the stegano- graphic system, its stability is affected by the carrier – a container, which is considered in the paper as a digital image. The aim of the work is to increase the resistance of a steganographic system to attacks against an embedded message by developing a method for choosing a contain-er from a finite set of available digital images that ensures the transmitted message the minimum (close to the minimum) possible sensitivity of the generated steganographic message to disturb-ing influences under consideration with the selected steganographic algorithm. The goal was achieved using a theoretical study of perturbations of the formal parameters of the container ma-trix, as a result of steganographic transformation and active attacks, which made it possible to introduce a new formal representation for information protected from perturbing influence E, as the difference of low-rank approximations of container matrices and steganographic messages. The most important result of the work is the development of a container selection method ready for practical implementation. The efficiency of the developed method exceeds the efficiency of analogs, it remains high, regardless of the used steganographic method, which allows increasing the overall resistance of the steganographic system to attacks against the embedded message. The significance of the obtained result lies in the use of the developed method of increasing the stability of the steganographic system to attacks against the embedded message.","PeriodicalId":41974,"journal":{"name":"Problemele Energeticii Regionale","volume":" ","pages":""},"PeriodicalIF":0.3000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Problemele Energeticii Regionale","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52254/1857-0070.2022.4-56.07","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENERGY & FUELS","Score":null,"Total":0}
引用次数: 0
Abstract
Steganography is the perspective area of information security. The reliability of the stegano- graphic system, its stability is affected by the carrier – a container, which is considered in the paper as a digital image. The aim of the work is to increase the resistance of a steganographic system to attacks against an embedded message by developing a method for choosing a contain-er from a finite set of available digital images that ensures the transmitted message the minimum (close to the minimum) possible sensitivity of the generated steganographic message to disturb-ing influences under consideration with the selected steganographic algorithm. The goal was achieved using a theoretical study of perturbations of the formal parameters of the container ma-trix, as a result of steganographic transformation and active attacks, which made it possible to introduce a new formal representation for information protected from perturbing influence E, as the difference of low-rank approximations of container matrices and steganographic messages. The most important result of the work is the development of a container selection method ready for practical implementation. The efficiency of the developed method exceeds the efficiency of analogs, it remains high, regardless of the used steganographic method, which allows increasing the overall resistance of the steganographic system to attacks against the embedded message. The significance of the obtained result lies in the use of the developed method of increasing the stability of the steganographic system to attacks against the embedded message.