Scientific and Technical Journal

ELECTROTECHNIC AND COMPUTER SYSTEMS

ISSN Print 2221-3937
ISSN Online 2221-3805
PERSISTENCE INCREASE OF STEGANOGRAPHIC SYSTEM AGAINST JPEG-ATTACKS BY ELIMINATING PHENOMENA OF METAMORPHOSIS OF BLOCKS OF STEGO-CONTAINERS
Abstract:

The problem of steganographical hiding of information was reviewed. Considered methods implementation problems, which performs steganography data hiding in bitmap image frequency domain. Such methods usually are positioned as JPEG-image compression resistant. One of the important stages of the method is image blocks classification as usable and unusable for embedding. It is shown that in some cases JPEG-compression results in the transformation of usable into unusable units and vice versa. This makes data extraction from the image impossible. An approach to solving this problem is proposed in this paper. This approach consists in implementation of a posteriori block image classification by JPEG compression appliance during the embedding of stego-information into container. JPEG-attack on the filled container is actually simulated yet, and results in taking a decision on the block classification. Due to classifications offered, the extracting errors have been eliminated, which were caused by the JPEG- attack on image-container. The software realization and experimental study of the proposed approach was described.

Authors:
Keywords
DOI
10.15276/etks.14.90.2014.14
References

1. Konahovich G.F., and Puzirenko A.U. Kompyuternaya steganografiya [Computer Steganography], (2006), Kiev, Ukraine, МК-Press Publ., 288 p. (In Russian).

2. Fridrich J. Steganography in Digital Media, (2010), New York, Cambridge University Press, 448 p. (In English).

  1. Gribunyn V.G. Tsifrovaya steganografiya [Digital Steganography], (2002), Moscow, Russian Federation, Salon-Press Publ., 344p. (In Russian).
  2. Agranovsky A.V., Balkin A.V., and Gribunyn V.G. Steganografiya, tsifrovye vodyanye znaki i stegoanaliz [Steganography, Digital Watermarks and Stegoanalysis], (2009), Moscow, Russian Federation: University Book Publ., 220p. (In Russian).

5. Mikhaylichenko O.V., Prikhozhev N.N., and Korobeinikov A.G. Rezistivnost tsifrovykh vodyanykh znakov k JPEG-preobrazovaniyu [Digital Watermarks Resistance to JPEG-transformation], (2007), Scientific and Technical Journal of Information Technologies, Mechanics and Optics, St. Petersburg, Russian Federation, No 40, pp. 248 – 251 (In Russian).

6. Gonzalez R., and Woods R. Tsifrovaya obrabotka izobrazheniy. Izdanie 3-e. [Digital Image Processing, 3rd Edition], (2012), Moscow, Russian Federation, Technosphere Publ., 1104p. (In Russian).

7. Zhao J., and Koch E. Embedding Robust Labels into Images for Copyright Protection, (1995), Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Techniques, German, Munich, pp. 242 – 251 (In English).

8. Benham D., Memon N, Yeo B, and Yeung M. Fast Watermarking of DCT-based Compressed Images, (1997), Proceedings of the International Conference on Image Science, Systems and Technology, USA, Las Vegas, pp. 243 – 252. (In English).

9. Shih F. Watermarking, Steganography, and Forensics, (2012), New York, CRC Press Publ., 424 p. (In English).

10. Cox I., Miller M., Bloom J., and Fridrich J. Digital Watermarking and Steganography, (2008), Burlington, Morgan Kaufmann Publishers, 592 p. (In English).

Published:
Last download:
2017-11-23 03:15:53

[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2014. Any use of information from the site is possible only under the condition that the source link! ]
Яндекс.Метрика