Scientific and Technical Journal

ELECTROTECHNIC AND COMPUTER SYSTEMS

ISSN Print 2221-3937
ISSN Online 2221-3805
METHOD OF STEGANOGRAPHICAL HIDING OF INFORMATION IN LUT–ORIENTED HARDWARE CONTAINERS
Abstract:

The problem of steganographical hiding of information was reviewed. Typical approaches to the organization of such hiding were marked. We propose a method of steganographical hiding of information based on the use of hardware stego-containers with LUT-oriented architecture. The features and advantages of these containers are described as compared with conventional stego-containers. Both the possibility of using the proposed method for solving the basic problem of steganography – hiding data and for the establishment of digital watermarks in the space of LUT-oriented stego-container.

Authors:
Keywords
DOI
References

1.  Konakhovich G.F., and Puzyrenko A.U. Komp'yuternaya steganografiya [Computer Steganography], (2006), Kiev, Ukraine, МК-Press Publ., 288 p. (In Russian).

2. Gribunin V.G. Tsifrovaya steganografiya [Digital Steganography], (2002),  Moscow, Russian Federation, Salon-Press Publ., 344p. (In Russian).

3.  Agranovsky A.V., Balkin A.V., and Gribunin V.G. Steganografiya, tsifrovye vodyanye znaki i stegoanaliz [Steganography Digital Watermarks and Stegoanalysis], (2009),   Moscow, Russian Federation, University Book Publ., 220p. (In Russian).

4.  Cox I., Miller M., Bloom J., and Fridrich J. Digital. Watermarking and Steganography, (2008), Burlington, Morgan Kaufmann, 592 p. (In English).

5.  Fridrich J. Steganography in Digital Media, (2010), New York, Cambridge University Press Publ., 448  p. (In English).

6.  Shih F. Watermarking, Steganography, and Forensics, (2012), New York, CRC Press Publ., 424  p. (In English).

7.  Skoudis E., and  Zeltser L. Malware: Fighting Malicious Code, (2004), New Jersey, Prentice Hall Publ., 672  p. (In English).

8.  El-Khalil R. and Keromytis A. Hydan: Hiding Information in Program Binaries, (2004), Proceedings of International Conference on Informaton and Communications Security (ICICS–2004), Malaga, Spain, рр. 187 – 199, (In English), doi: 10.1007/978-3-540-30191-2_15.

9.  Hamilton A., and Danicic S. A Survey of Static Software Watermarking, (2011), Proceedings of Internet Security World Congress (WorldCIS–2011), London, рр. 100 – 107 (In English).

10.  Hakun L., and  Keiichi K. New Approaches for Software Watermarking by Register Allocation, (2008), Proceedings of the ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing, рр. 63 – 68, (In English), doi: 10.1109/SNPD.2008.137.

11.  Xiao Cheng L., and Zhiming C. Software Watermarking Algorithm Based on Register Allocation, (2010), Proceedings ofInternational Symposium Distributed Computing and Applications to Business Engineering and Science (DCABES),Hong Kong, рр. 539 – 543,
(In English), doi: 10.1109/DCABES.2010.114.

12.  Maxfield C. Proektirovanie na PLIS: arkhitektura, sredstva, metody [Design on FPGA: Architecture, Tools, Methods], (2007), Moscow, Russian Federation, Dodeka–XXI Publ., 408  p. (In Russian).

13.  Paul S., and Bhunia S. Reconfigurable Computing Using Content Addressable Memory for Improved Performance and Resource Usage,(2008), Proceedings of Design Automation Conference ACM/IEEE (DAC–2008),Anaheim, рр. 786 – 791, (In English), doi: 10.1145/1391469.1391670.

14.  Grushvitsky R.I., Mursaev A.H., and Ugryumov E.P. Proektirovanie sistem na mikroskhemakh s programmiruemoi strukturoi [Design of Systems on a Chip with Programmable Structure], (2010), St. Petersburg, Russian Federation, BHV Publ., 650 p. (In Russian).

Published:
Last download:
2017-11-16 11:36:40

[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2014. Any use of information from the site is possible only under the condition that the source link! ]
Яндекс.Метрика