FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM

The analysis of the current development and operation of information systems provided sufficient data for definition of sufficient conditions for a formal presentation steganographic transformation as a set of perturbations of singular values of the matrices (corresponding to the container) those en...

Full description

Bibliographic Details
Main Authors: Kobozeva A.A., Melnik M.A.
Format: Article
Language:English
Published: Academy of Sciences of Moldova 2013-04-01
Series:Problems of the Regional Energetics
Subjects:
a
Online Access:http://journal.ie.asm.md/assets/files/m71_2_237.pdf
id doaj-bef378b149994a38bb5790f029dc0d83
record_format Article
spelling doaj-bef378b149994a38bb5790f029dc0d832020-11-24T23:44:04ZengAcademy of Sciences of MoldovaProblems of the Regional Energetics1857-00702013-04-012013-11(21)93102FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHMKobozeva A.A.0Melnik M.A.1Odessa National Polytechnic University Odessa, UkraineOdessa National Polytechnic University Odessa, UkraineThe analysis of the current development and operation of information systems provided sufficient data for definition of sufficient conditions for a formal presentation steganographic transformation as a set of perturbations of singular values of the matrices (corresponding to the container) those ensure insensitivity (or low sensitivity) of formed steganographic message to compression attacks. The obtained sufficient conditions are independent of the confidential information that embedded to container (spatial or frequency) and specificity of stegano algorithm. The main mathematical tool is a matrix analysis. As the container is considered a digital image. New steganographic algorithm is developed and based on sufficient conditions that received in paper. The algorithm is stable to compression, including low compression rate. The results of computational experiments are presented.http://journal.ie.asm.md/assets/files/m71_2_237.pdfsteganographic algorithmacompression attacks
collection DOAJ
language English
format Article
sources DOAJ
author Kobozeva A.A.
Melnik M.A.
spellingShingle Kobozeva A.A.
Melnik M.A.
FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM
Problems of the Regional Energetics
steganographic algorithm
a
compression attacks
author_facet Kobozeva A.A.
Melnik M.A.
author_sort Kobozeva A.A.
title FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM
title_short FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM
title_full FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM
title_fullStr FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM
title_full_unstemmed FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM
title_sort formal conditions of steganographic method’s sustainability to compression attacks and their implementation in new steganographic algorithm
publisher Academy of Sciences of Moldova
series Problems of the Regional Energetics
issn 1857-0070
publishDate 2013-04-01
description The analysis of the current development and operation of information systems provided sufficient data for definition of sufficient conditions for a formal presentation steganographic transformation as a set of perturbations of singular values of the matrices (corresponding to the container) those ensure insensitivity (or low sensitivity) of formed steganographic message to compression attacks. The obtained sufficient conditions are independent of the confidential information that embedded to container (spatial or frequency) and specificity of stegano algorithm. The main mathematical tool is a matrix analysis. As the container is considered a digital image. New steganographic algorithm is developed and based on sufficient conditions that received in paper. The algorithm is stable to compression, including low compression rate. The results of computational experiments are presented.
topic steganographic algorithm
a
compression attacks
url http://journal.ie.asm.md/assets/files/m71_2_237.pdf
work_keys_str_mv AT kobozevaaa formalconditionsofsteganographicmethodssustainabilitytocompressionattacksandtheirimplementationinnewsteganographicalgorithm
AT melnikma formalconditionsofsteganographicmethodssustainabilitytocompressionattacksandtheirimplementationinnewsteganographicalgorithm
_version_ 1725500191999524864