The double obfuscation of transformants of low-resource steganography algorithm
Abstract
The purpose of the article is to familiarize with the basic procedures of the adaptive low-resource algorithm of steganography processing of images and the peculiarities of creation of its experimental program with support of the graphic interface (mobile application). The version of the program offered in operation provides convenience of its use on mobile platforms under control of the Android® operating system (OS). The adaptive algorithm in the manual and automatic modes is developed allows to define: - a current status of the hardware (a mobile platform); - take into account the features of processed data (types of images to a steganocontainer and to a steganocontent); - to adjust parameters of operation of main software modules of a research steganoalgorithm (the modul of preprocessing of input data (images), and the module of special conversions - the steganographic module). In addition, other parameters were investigated of image processing having direct influence on computing complexity of all algorithm and quality of visualization images of containers and steganocontent. Presented version of the algorithm is the research version and is an instrument for ensuring of the security of personal information (in this case the graphic information) users, first of all, of mobile gadgets. The main properties of the synthesized algorithm, allow classifying it as software of steganography protection, localized for conditions intraframe processed of images. Presented version of the algorithm requires its subsequent enhancement and has the main goal to confirm correctness of the selected methods of data handling and strategies of creation of the user interface for corresponding mobile application.
Downloads
References
Gribunin, V.G. Tsifrovaya steganografiya / Gribunin V. G., Okov I. N., Turintsev I. V. – M.: Solon-Press, 2002. – 272 p.
Konakhovich, G.F. Komp'yuternaya steganografiya. Teoriya i praktika / Konakhovich G. F., Puzyrenko A.Yu. – K.: MK-Press, 2006. – 288 p.
Bykov, S.F. Algoritm szhatiya JPEG s pozitsii komp'yuternoi steganografii / Bykov S. F. // Zashchita informatsii. Konfident. – SPb.: 2000, № 3. p. 26.
Prett, U. Tsifrovaya obrabotka izobrazhenii / U. Prett. – M.: Mir, 1985. – 736 p.
Zubarev, Yu. B. Tsifrovaya obrabotka televizionnykh i komp'yuternykh izobrazhenii / Yu.B. Zubarev, V.P. Dvorkovich. – Moskva: MTsNTI, 1997. – 212 p.
Korolev, A.V. Otsenka informativnosti transformant diskretnogo kosinusnogo preobrazovaniya / A.V. Korolev // Sistemi obrobki іnformatsії. – 2003. – Vip.3. pp. 81–85.
Malakhov, S.V., Bukhantsov, A.D. Zonal'noe kodirovanie izobrazhenii s razlichnym razbieniem prostranstvenno-chastotnoi oblasti / S.V. Malakhov, A.D. Bukhantsov // Sistemi obrobki іnformatsії. – 2001. – Vip. 4(14). pp. 121–125.
Mastryukov, D. Algoritmy szhatiya informatsii. Ch.1. Szhatie po Khaffmenu // Monitor. - 1993. - № 7-8. pp. 14-20.
Mastryukov, D. Algoritmy szhatiya informatsii. Ch.7. Szhatie graficheskoi informatsii // Monitor. - 1994. - № 6. pp. 12-20.