FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM
The analysis of the current development and operation of information systems provided sufficient data for definition of sufficient conditions for a formal presentation steganographic transformation as a set of perturbations of singular values of the matrices (corresponding to the container) those en...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Academy of Sciences of Moldova
2013-04-01
|
Series: | Problems of the Regional Energetics |
Subjects: | |
Online Access: | http://journal.ie.asm.md/assets/files/m71_2_237.pdf |
id |
doaj-bef378b149994a38bb5790f029dc0d83 |
---|---|
record_format |
Article |
spelling |
doaj-bef378b149994a38bb5790f029dc0d832020-11-24T23:44:04ZengAcademy of Sciences of MoldovaProblems of the Regional Energetics1857-00702013-04-012013-11(21)93102FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHMKobozeva A.A.0Melnik M.A.1Odessa National Polytechnic University Odessa, UkraineOdessa National Polytechnic University Odessa, UkraineThe analysis of the current development and operation of information systems provided sufficient data for definition of sufficient conditions for a formal presentation steganographic transformation as a set of perturbations of singular values of the matrices (corresponding to the container) those ensure insensitivity (or low sensitivity) of formed steganographic message to compression attacks. The obtained sufficient conditions are independent of the confidential information that embedded to container (spatial or frequency) and specificity of stegano algorithm. The main mathematical tool is a matrix analysis. As the container is considered a digital image. New steganographic algorithm is developed and based on sufficient conditions that received in paper. The algorithm is stable to compression, including low compression rate. The results of computational experiments are presented.http://journal.ie.asm.md/assets/files/m71_2_237.pdfsteganographic algorithmacompression attacks |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Kobozeva A.A. Melnik M.A. |
spellingShingle |
Kobozeva A.A. Melnik M.A. FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM Problems of the Regional Energetics steganographic algorithm a compression attacks |
author_facet |
Kobozeva A.A. Melnik M.A. |
author_sort |
Kobozeva A.A. |
title |
FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM |
title_short |
FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM |
title_full |
FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM |
title_fullStr |
FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM |
title_full_unstemmed |
FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM |
title_sort |
formal conditions of steganographic method’s sustainability to compression attacks and their implementation in new steganographic algorithm |
publisher |
Academy of Sciences of Moldova |
series |
Problems of the Regional Energetics |
issn |
1857-0070 |
publishDate |
2013-04-01 |
description |
The analysis of the current development and operation of information systems provided sufficient data for definition of sufficient conditions for a formal presentation steganographic transformation as a set of perturbations of singular values of the matrices (corresponding to the container) those ensure insensitivity (or low sensitivity) of formed steganographic message to compression attacks. The obtained sufficient conditions are independent of the confidential information that embedded to container (spatial or frequency) and specificity of stegano algorithm. The main mathematical tool is a matrix analysis. As the container is considered a digital image. New steganographic algorithm is developed and based on sufficient conditions that received in paper. The algorithm is stable to compression, including low compression rate. The results of computational experiments are presented. |
topic |
steganographic algorithm a compression attacks |
url |
http://journal.ie.asm.md/assets/files/m71_2_237.pdf |
work_keys_str_mv |
AT kobozevaaa formalconditionsofsteganographicmethodssustainabilitytocompressionattacksandtheirimplementationinnewsteganographicalgorithm AT melnikma formalconditionsofsteganographicmethodssustainabilitytocompressionattacksandtheirimplementationinnewsteganographicalgorithm |
_version_ |
1725500191999524864 |