Development and implementation of the digital steganography method based on the embedding of pseudoinformation
https://doi.org/10.15514/ISPRAS-2023-35(3)-4
Abstract
The article provides an overview of the main methods of steganography, on the basis of which a new method was developed, consisting in embedding additional text (pseudo-information) in parallel with the transmitted message. An algorithm of this method has been developed. In this case, the frequency of the bit sequence was obtained in accordance with the generated pseudo-random numbers. In accordance with the algorithm, an application has been developed that allows the sender to encrypt and place the message in a container that is an image, and the recipient to determine the presence of the message and, if there is one, extract it. A computational experiment was also conducted, which showed that an image with a fairly large embedded text does not visually differ from the original image.
About the Authors
Irina Gennadievna GVOZDEVARussian Federation
Candidate of Technical Sciences, specialist of the Department of Information and Computing Technologies of the Penza State University of Architecture and Construction
Artem Sergeyevich GROMOV
Russian Federation
Student studying in the specialty "Information Systems and Technologies" at the Penza State University of Architecture and Construction
Olga Mikhailovna GVOZDEVA
Russian Federation
Student studying in the specialty "Information Systems and Technologies" at the Penza State University of Architecture and Construction
References
1. Gribunin V.G., Okov. I. N. and Turintsev I. V., “Digital steganography” [Text],. Moscow : SOLON-Press, 263 p., 2003./ Грибунин В. Г., Оков И. Н., Туринцев И. В.. Цифровая стеганография [Текст] – Москва: СОЛОН-Пресс, 2003. – 263 с.
2. Razinkov E. V., Latypov R. H. “Stability of steganographic systems”, Scientific notes of Kazan.state University, Kazan, Vol. 151, No 2, 2009./ Разинков Е. В., Латыпов Р. Х. Стойкость стеганографических систем // Ученые записки Казанского государственного университета. Сер.: Физико-математические науки. 2009. Т. 151, кн. 2. С.126-132.
3. Golubev E. A., Varnovsky N. P. and Logachev O. A., Conference "Mathematics and Security of Information Technologies", Moscow State University, Moscow, Russia, October 2004, 28-29./ Голубев Е. А., Варновский Н. П. и Логачев О. А., Конференция "Математика и безопасность информационных технологий", Московский государственный университет, Москва, Россия, октябрь 2004, 28-29.
4. Fridrich J., Du R., Long M. “Steganalysis of LSB encoding in color images”, ICME, 2000.
5. Replacement of the least significant bit [Electronic resource]. – Access mode: http://www.nestego.ru/2012/07/lsb.html .
6. Provos N., Honeyman P. “Detecting Steganographic Content on the Internet” // Proceeding of the 10 USENIX Security Symposium,. pp. 323–335, 2001.
7. Westfeld A. “Attacks on Steganographic Systems: Breaking the Steganographic Utilities EzStego, Jsteg, Steganos and S-Tools-and Some Lessons Learned “/ A. Westfeld, A. Pfitzmann // 3rd International Workshop on Information Hiding (2000)
8. Zakalkin P. V., Ivanov S. A., Vershennik E. V. and Kiryanov A. V., “Method of masking transmitted information”, Proceedings of ISP RAS, 32:6 (2020), pp 111–126./ Закалкин П.В., Иванов С.А., Вершенник Е.В., Кирьянов А.В. Способ маскирования передаваемой информации. Труды ИСП РАН, том 32, вып. 6, 2020 г., стр. 111-126.
Review
For citations:
GVOZDEVA I.G., GROMOV A.S., GVOZDEVA O.M. Development and implementation of the digital steganography method based on the embedding of pseudoinformation. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2023;35(3):63-70. https://doi.org/10.15514/ISPRAS-2023-35(3)-4