Scientific and Technical Journal


ISSN Print 2221-3937
ISSN Online 2221-3805

The approaches to the control of use of information objects by means of technology of digital watermarking were reviewed. The necessity to recovery of original of information object (container for digital watermark) after extracting digital watermark from it was marked. We propose an information technology embedding self-recovery digital watermark in containers with LUT-oriented architecture. The technology is based on composition of approaches to organisation self-recovery digital watermarks in passive multimedia containers and approaches to embedding additional information in the LUT-containers. Embedding of additional information is realized by using the classification of the container and task-oriented involutive transformation within the set of the formed classes. The procedure for the immediate embedding of data at the level of elementary units LUT-container is that current processing LUT-unit value invert conversion and invert distribution for all the LUT-units inputs connected to the current unit outputs. Information about the practical implementation of the proposed technology was presented.


1. Cox I., Miller M., Bloom J., and Fridrich J., (2008), Digital Watermarking and Steganography, Burlington, Morgan Kaufmann Publishers, 592 p. (In English), doi: 10.1016/b978-012372585-1.50015-2.

2. Konahovich G.F., and Puzirenko A.U., (2006), Kompyuternaya steganografiya [Computer Steganography], Kiev, Ukraine, МК-Press Publ., 288 p. (In Russian).

3. Agranovsky A.V., Balkin A.V., and Gribunyn V.G., (2009), Steganografiya, tsifrovye vodyanye znaki i stegoanaliz [Steganography, Digital Watermarks and Stegoanalysis], Moscow, Russian Federation: University Book Publ., 220p. (In Russian).

4. Shih F. (2012), Watermarking, Steganography, and Forensics, New York, CRC Press Publ., 424 p. (In English), doi: 10.1201/b12697-6.

5. Grushvitsky R.I., Mursaev A.H. and Ugryumov E.P. (2010), Proektirovanie sistem na mikroskhemakh s programmiruemoi strukturoi[Design of Systems on a Chip with Programmable Structure], St. Petersburg, Russian Federation, BHV Publ., 650 p. (in Russian).

6. Paul S., and Bhunia S., (2008), Reconfigurable Computing Using Content Addressable Memory for Improved Performance and Resource Usage, Proceedings of Design Automation Conference ACM/IEEE (DAC-2008),Anaheim, рр. 786–791, (in English), doi: 10.1145/1391469.1391670.

7. Zashcholkin K.V. and Inanova E.N., (2013), Metod steganograficheskogo skrytiya dannykh v LUT-orientirovannykh apparatnykh konteinerakh [Method of Steganographical Hiding of Information in LUT-oriented Hardware Containers], Electrotechnic and Computer Systems, Kiev, Ukraine, No. 12 (88), pp. 83 – 90 (In Russian).

8. Zashcholkin K.V. and Inanova E.N., (2014), Razvitie metoda steganograficheskogo skrytiya dannykh v LUT-orientirovannykh apparatnykh konteinerakh [Method Development for Implementing the Steganography Data Hiding in LUT-oriented Hardware Containers], Electrotechnic and Computer Systems, Kiev, Ukraine, No. 13 (89), pp. 231 – 239 (In Russian), doi: 10.15276/etks.13.89.2014.33.

9. Fridrich J., Goljan M. and Du R., (2002), Lossless Data Embedding – New Paradigm in Digital Watermarking, Journal on Applied Signal Processing: Emerging Applications of Multimedia Data Hiding, USA, New York: Hindawi Publishing, pp. 185 – 196 (in English), doi: 10.1155/s1110865702000537.

10. Goljan M., Fridrich J., and Du R., (2001), Distortion-Free Data Embedding for Images, Proceedings of the 4th International Workshop on Information Hiding (IHW-01), USA, Pittsburg, pp. 27 – 41 (in English), doi: 10.1007/3-540-45496-9_3.

Last download:
1 July 2020

[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2014-2018. Any use of information from the site is possible only under the condition that the source link! ]