Method of verification of authenticity of information that is passed by steganographic communication channel
Keywords:
стеганографічний метод, цифрове зображення, дискретне перетворення Фур’є, автентичністьAbstract
The improvement of steganographic method which was developed earlier by the author, which has no analogues among modern steganomethods, as it solves simultaneously a triple task: secret data (additional information), as a random binary sequence — authentication and check the integrity of additional information. As a container it views digital color images. It shows the results of numerical experiments that confirm the high efficiency improved steganometod in identifying inauthentic of additional information.References
1. Кузнецов О. О. Стеганографія : навч. посіб. / О. О. Кузнецов, С. П. Євсеєв, О. Г. Король. — Х. : Вид. ХНЕУ, 2011.
— 232 с.
2. Грибунин, В. Г. Цифровая стеганография / В. Г. Грибунин, И. Н. Оков, И. В. Туринцев. — М. : СОЛОН-Пресс,
2009. — 272 с.
3. Inderjit Singh. DFT Based Image Enhancement and Steganography / Inderjit Singh, Sunil Khullar, Dr. S. C. Laroiya // International
Journal of Computer Science and Communication Engineering. — 2013. — Vol. 2, Iss. 1. — P. 5—7.
4. Bhattacharyya D. Authentication and Secret Message Transmission / D. Bhattacharyya, J. Dutta, P. Das,
S. K. Bandyopadhyay, T. Kim. // Int. J. Communications, Network and System Sciences. — 2009. — № 5. — P. 363—370.
5. Ritu Pareek Discrete Cosine Transformation based Image Watermarking for Authentication and Copyright Protection /
Ritu Pareek, P. K. Ghosh // International Journal of Engineering and Advanced Technology (IJEAT). — 2012. — Vol. 1, Iss. 3.
— P. 152—156.
6. Кобозева А. А. Стеганографический метод, обеспечивающий проверку целостности и аутентичности передавае-
мых данных / А. А. Кобозева, М. А. Козина. // Проблемы региональной энергетики : электронный журнал Академии
наук Республики Молдова. — 2014. — № 3 (26). — С. 93—106.
7. Nrcs photo gallery: [Електронний ресурс] // United States Department of Agriculture. Washington, USA. — Режим доступу:
http://photogallery.nrcs.usda.gov (дата звернення: 10.09.2014).
8. Kozina M. O. Discrete Fourier transform as a basis for steganography method / M. O. Kozina // Праці Одеського політехнічного
університету. — 2014. — Вип. 2 (44). — С. 147—154.
— 232 с.
2. Грибунин, В. Г. Цифровая стеганография / В. Г. Грибунин, И. Н. Оков, И. В. Туринцев. — М. : СОЛОН-Пресс,
2009. — 272 с.
3. Inderjit Singh. DFT Based Image Enhancement and Steganography / Inderjit Singh, Sunil Khullar, Dr. S. C. Laroiya // International
Journal of Computer Science and Communication Engineering. — 2013. — Vol. 2, Iss. 1. — P. 5—7.
4. Bhattacharyya D. Authentication and Secret Message Transmission / D. Bhattacharyya, J. Dutta, P. Das,
S. K. Bandyopadhyay, T. Kim. // Int. J. Communications, Network and System Sciences. — 2009. — № 5. — P. 363—370.
5. Ritu Pareek Discrete Cosine Transformation based Image Watermarking for Authentication and Copyright Protection /
Ritu Pareek, P. K. Ghosh // International Journal of Engineering and Advanced Technology (IJEAT). — 2012. — Vol. 1, Iss. 3.
— P. 152—156.
6. Кобозева А. А. Стеганографический метод, обеспечивающий проверку целостности и аутентичности передавае-
мых данных / А. А. Кобозева, М. А. Козина. // Проблемы региональной энергетики : электронный журнал Академии
наук Республики Молдова. — 2014. — № 3 (26). — С. 93—106.
7. Nrcs photo gallery: [Електронний ресурс] // United States Department of Agriculture. Washington, USA. — Режим доступу:
http://photogallery.nrcs.usda.gov (дата звернення: 10.09.2014).
8. Kozina M. O. Discrete Fourier transform as a basis for steganography method / M. O. Kozina // Праці Одеського політехнічного
університету. — 2014. — Вип. 2 (44). — С. 147—154.
Downloads
-
PDF (Українська)
Downloads: 299
Abstract views: 120
Published
2015-03-24
How to Cite
[1]
M. O. Kozina, “Method of verification of authenticity of information that is passed by steganographic communication channel”, Вісник ВПІ, no. 1, pp. 117–121, Mar. 2015.
Issue
Section
Information technologies and computer sciences
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).