V. Pevnev, A. Frolov, Mikhail Tsuranov, Heorhii Zemlianko
{"title":"Ensuring the Data Integrity in Infocommunication Systems","authors":"V. Pevnev, A. Frolov, Mikhail Tsuranov, Heorhii Zemlianko","doi":"10.47839/ijc.21.2.2591","DOIUrl":null,"url":null,"abstract":"The article is devoted to the study of the perspectives of steganography to ensure integrity. The definition of information integrity is presented, which meets the new requirements and the definition of cybersecurity. Integrity is achieved through the control and recovery of information. The article provides a detailed analysis of existing approaches to the construction of modern steganometric systems. The greatest attention in the article was paid to the method of hiding information in graphic containers. The proposed method is a modification of the well-known method of replacing the least significant bits. The main difference from the known method is that not all least significant bits are changed. The selection of the bits to be changed is carried out using a pseudo-random sequence generator, while, thanks to the proposed algorithm, no more than 3.12 percent of the bits are changed, which is the limit of visibility for the steganalyst. There are 6.25 percent of information bits in such a message.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":"45 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47839/ijc.21.2.2591","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 1
Abstract
The article is devoted to the study of the perspectives of steganography to ensure integrity. The definition of information integrity is presented, which meets the new requirements and the definition of cybersecurity. Integrity is achieved through the control and recovery of information. The article provides a detailed analysis of existing approaches to the construction of modern steganometric systems. The greatest attention in the article was paid to the method of hiding information in graphic containers. The proposed method is a modification of the well-known method of replacing the least significant bits. The main difference from the known method is that not all least significant bits are changed. The selection of the bits to be changed is carried out using a pseudo-random sequence generator, while, thanks to the proposed algorithm, no more than 3.12 percent of the bits are changed, which is the limit of visibility for the steganalyst. There are 6.25 percent of information bits in such a message.
期刊介绍:
The International Journal of Computing Journal was established in 2002 on the base of Branch Research Laboratory for Automated Systems and Networks, since 2005 it’s renamed as Research Institute of Intelligent Computer Systems. A goal of the Journal is to publish papers with the novel results in Computing Science and Computer Engineering and Information Technologies and Software Engineering and Information Systems within the Journal topics. The official language of the Journal is English; also papers abstracts in both Ukrainian and Russian languages are published there. The issues of the Journal are published quarterly. The Editorial Board consists of about 30 recognized worldwide scientists.