The double obfuscation of transformants of low-resource steganography algorithm

  • Dmitriy Morozov V. N. Karazin Kharkiv National University, Kharkov
  • Mykhailo Shaforostov V. N. Karazin Kharkiv National University, Kharkov
  • Serghii Malakhov V. N. Karazin Kharkiv National University, Kharkov https://orcid.org/0000-0001-8826-1616
  • Vadim Serbin Yuzhnoye State Design Office, Dnipro
Keywords: obfuscation;, encoding with conversion;, zonal encoding;, steganography;

Abstract

The purpose of the article is to familiarize with the basic procedures of the adaptive low-resource algorithm of steganography processing of images and the peculiarities of creation of its experimental program with support of the graphic interface (mobile application). The version of the program offered in operation provides convenience of its use on mobile platforms under control of the Android® operating system (OS). The adaptive algorithm in the manual and automatic modes is developed allows to define: - a current status of the hardware (a mobile platform); - take into account the features of processed data (types of images to a steganocontainer and to a steganocontent); - to adjust parameters of operation of  main software modules of a research steganoalgorithm (the modul of preprocessing of  input data (images), and the module of special conversions - the steganographic module). In addition, other parameters were investigated of image processing having direct influence on computing complexity of all algorithm and quality of visualization images of containers and steganocontent. Presented version of the algorithm is the research version and is an instrument for ensuring of the security of personal information (in this case the graphic information) users, first of all, of mobile gadgets.  The main properties of the synthesized algorithm, allow classifying it as software of steganography protection, localized for conditions intraframe processed of images. Presented version of the algorithm requires its subsequent enhancement and has the main goal to confirm correctness of the selected methods of data handling and strategies of creation of the user interface for corresponding mobile application. 

 

Downloads

Download data is not yet available.

Author Biographies

Dmitriy Morozov, V. N. Karazin Kharkiv National University, Kharkov

student of CSD

Mykhailo Shaforostov, V. N. Karazin Kharkiv National University, Kharkov

student of CSD

Serghii Malakhov, V. N. Karazin Kharkiv National University, Kharkov

Ph.D., Senior Researcher

Vadim Serbin, Yuzhnoye State Design Office, Dnipro

Leading Specialist, Yuzhnoye State Design Office, Dnipro

References

Gribunin, V.G. Tsifrovaya steganografiya / Gribunin V. G., Okov I. N., Turintsev I. V. – M.: Solon-Press, 2002. – 272 p.

Konakhovich, G.F. Komp'yuternaya steganografiya. Teoriya i praktika / Konakhovich G. F., Puzyrenko A.Yu. – K.: MK-Press, 2006. – 288 p.

Bykov, S.F. Algoritm szhatiya JPEG s pozitsii komp'yuternoi steganografii / Bykov S. F. // Zashchita informatsii. Konfident. – SPb.: 2000, № 3. p. 26.

Prett, U. Tsifrovaya obrabotka izobrazhenii / U. Prett. – M.: Mir, 1985. – 736 p.

Zubarev, Yu. B. Tsifrovaya obrabotka televizionnykh i komp'yuternykh izobrazhenii / Yu.B. Zubarev, V.P. Dvorkovich. – Moskva: MTsNTI, 1997. – 212 p.

Korolev, A.V. Otsenka informativnosti transformant diskretnogo kosinusnogo preobrazovaniya / A.V. Korolev // Sistemi obrobki іnformatsії. – 2003. – Vip.3. pp. 81–85.

Malakhov, S.V., Bukhantsov, A.D. Zonal'noe kodirovanie izobrazhenii s razlichnym razbieniem prostranstvenno-chastotnoi oblasti / S.V. Malakhov, A.D. Bukhantsov // Sistemi obrobki іnformatsії. – 2001. – Vip. 4(14). pp. 121–125.

Mastryukov, D. Algoritmy szhatiya informatsii. Ch.1. Szhatie po Khaffmenu // Monitor. - 1993. - № 7-8. pp. 14-20.

Mastryukov, D. Algoritmy szhatiya informatsii. Ch.7. Szhatie graficheskoi informatsii // Monitor. - 1994. - № 6. pp. 12-20.

Published
2018-11-26
Cited
How to Cite
Morozov, D., Shaforostov, M., Malakhov, S., & Serbin, V. (2018). The double obfuscation of transformants of low-resource steganography algorithm. Computer Science and Cybersecurity, 9(1), 22-34. Retrieved from https://periodicals.karazin.ua/cscs/article/view/12015
Section
Статті

Most read articles by the same author(s)