Results of modeling different schemes of the spatial orientation and scanning series of base blocks of images to confront an unauthorized extraction of steganographic data
Abstract
This work presents the results of modeling attempts at unauthorized extraction of steganocontent (halftone test images) under the condition of selective compromise of each of the two active processing parameters of the source array series of base blocks (BB) of content, i.e.: - the scheme scanning of BB series and the spatial processing of BB. The current program version ensures consistent realization of the main stages of content processing with the necessary settings parameters. As part of the modeling, it is suggested that the attacker has correctly identified one of the two current content processing parameters. Several modifications of the main schemes scanning of BB series and the spatial orientation of BB (rotation and horizontal mirroring) as an additional mechanism to counteract attempts of illegitimate content extraction are considered. The modeling was conducted on the examples of three types of images: - portrait, landscape, and mnemonic scheme. Manipulations with the spatial orientation parameter of BB strengthen the opportunities to counteract attempts at unauthorized data extraction. Characteristic quantitative and time histograms for different dimensions BB of content, changes in the peak of value signal-to-noise ratio for different types of schemes scanning BB series are presented, and samples of attacked test images are presented. The analysis and generalization of the main differences in the attack results using different parameters of the spatial processing of BB and ways of scanning series of BB of image-content are performed. Attention is drawn to the fact that the use of two active processing parameters of the source array of BB series is an effective and computationally «simple» means of counteracting attempts at unauthorized data extraction. The relationship between the stage of preprocessing the source content and the parameters of the formed arrays BB is emphasized. It is concluded that the introduction into the structure of the data extractor key, the elements of «The state of scanning» and «The spatial processing of BB», strengthens the overall capabilities to counteract attacks. The used processing parameters of the source array of BB series determine the structure of visual artifacts of attacked images but do not produce a simple solution to identify the attacked image at the level of classifying the type of source images. Prospective directions for further modeling of the main protection mechanisms within the proposed algorithm concept are indicated.
Downloads
References
Hrybunin, V. G. Digital Steganography / Hrybunin, V. G., Okov, I. N., Turintsev, I. V. – M: Solon-Press, 2002. – 272 p. [In Russian]
Lesnaya, Y., Goncharov, N., & Malakhov, S. (2021). Elaboration of the concept of multi-level data multiplexing for a hybrid steganographic algorithm. Collection of scientific papers SCIENTIA. (Vol. 2),48-55. [In Ukrainian]
https://ojs.ukrlogos.in.ua/index.php/scientia/article/view/17666
Goncharov, M., Lesnaya, Y., &Malakhov, S. (2021). Investigation of properties of the prototype hybrid steganographic algorithm. Computer Science and Cybersecurity, (2)., 45-56.[In Ukrainian] https://doi.org/10.26565/2519-2310-2021-2-05
Lesnaya, Y., Goncharov, M., & Malakhov, S. (2023). Results of modeling attempts of unauthorized extraction of stego-content for various combinations of attacks of the experimental stegoalgorithm. Scientific Collection «Inter Conf», (141), 338–345. [In Ukrainian] https://archive.interconf.center/index.php/conference-proceeding/article/view/2319
Pratt, W. (1985). Digital Image Processing (Translated from English by D. S. Lebedeva). Vols. 1, 2. M: Mir. [In Russian]
Goncharov, N., Lesnaya, Y., & Malakhov, S. (2022). Adaptation of the Run-Length Encoding Principle to Counter Unauthorized Extraction Attempts of Steganographic Content. Grail of Science, (17), 241-247. [In Ukrainian]
https://doi.org/10.36074/grail-of-science.22.07.2022.042
Kuznetsov, O.O., Yevseyev, S.P., Korol, O.G. (2011). Steganography: a textbook. Kharkiv: Publishing House of Kharkiv National Economic University. [In Ukrainian] http://repository.hneu.edu.ua/handle/123456789/2289
Lesnaya, Y., Goncharov, M., Azarov, S., & Malakhov, S. (2023). Visualization of unauthorized extraction attempts of
steganographic content with misidentification of active series unfolding methods. Grail of Science, (24), 335–340. [In Ukrainian] https://doi.org/10.36074/grail-of-science.17.02.2023.061
Lesnaya Y., Goncharov M., & Malakhov S. (2023). Results of intrablock multiplexing of the average brightness parameter of reference blocks of steganographic contenton a rearrangement-based basis. Scientific Debates and Prospective Directions of Scientific Development: Collection of Scientific Papers "ΛΌГOΣ" from the Materials of the IV International Scientific and Practical Conference (pp. 78-81). November 11, 2022. Paris, France.«ΛΌГOΣ». https://doi.org/10.36074/logos-11.11.2022.21
Lesnaya, Y., Goncharov, M., & Malakhov, S. (2023). Methods of unfolding serial parameters of reference image blocks as an element of the composite key of the data extractor of a steganographic algorithm. Grail of Science, (23), 254–258. [In Ukrainian] https://doi.org/10.36074/grail-of-science.23.12.2022.37
Lesnaya, Y., Goncharov, M., Semenov, A., & Malakhov, S. (2023). Modeling the unfolding of series of reference image blocks as a tool to counter attempts of unauthorized extraction of steganographic content.
Grundlagendermodernenwissenschaftlichenforschung: Collection of scientific papers "ΛΌГOΣ" based on the materials of the IV International Scientific and Practical Conference (pp. 109–116). March 31, 2023. Zurich, Switzerland: ΛΌГOΣ.
https://archive.logos-science.com/index.php/conference-proceedings/issue/view/9
Goncharov O., Lesnaya Y., Pohorila K., Bohdanova Y., Malakhov S. Study of the parameter "series of reference blocks" as an element of the composite key of the data extractor of the steganographic algorithm.// Problems of science and practice, tasks and ways to solve them. Proceeding softhe ХХ International Scientific and Practical Conference. Warsaw, Poland. 2022. Pp. 779-785. https://doi.org/10.46299/ISG.2022.1.20
Lesnaya, Y., Goncharov, M., & Malakhov, S. (2023b). Methods of unfolding the parameters of series of reference blocks of
images as a component of the composite key of the data extractor of the steganographic algorithm. Grail of Science, (23), 254–258. [In Ukrainian] https://doi.org/10.36074/grail-of-science.23.12.2022.37
Lesnaya, Y., Goncharov, M., Malakhov, S., & Melkozyorova, O. (2023). Results of unauthorized extraction of steganographic content in the implementation of two-pass unfolding of series of output blocks. Ricerche scientific he e metodidellalororealizzazione: esperienzamondiale e realtàdomestiche: Collection of scientific papers "LOGOS" based on the materials of the III International Scientific and Practical Conference (pp. 65-67). March 3, 2023. Bologna, Italy.«ΛΌГOΣ». https://doi.org/10.36074/logos-03.03.2023
Honcharov, M., & Malakhov, S. (2023). Investigation of methods for unfolding output blocks of image steganography as a mechanism to counter unauthorized dataextraction. Scienceand Technology Today, 4(18). [In Ukrainian] https://doi.org/10.52058/2786-6025-2023-4(18)-293-308