Ensuring the Data Integrity in Infocommunication Systems
Keywords:Integrity of information, steganography, container, adder
The article is devoted to the study of the perspectives of steganography to ensure integrity. The definition of information integrity is presented, which meets the new requirements and the definition of cybersecurity. Integrity is achieved through the control and recovery of information. The article provides a detailed analysis of existing approaches to the construction of modern steganometric systems. The greatest attention in the article was paid to the method of hiding information in graphic containers. The proposed method is a modification of the well-known method of replacing the least significant bits. The main difference from the known method is that not all least significant bits are changed. The selection of the bits to be changed is carried out using a pseudo-random sequence generator, while, thanks to the proposed algorithm, no more than 3.12 percent of the bits are changed, which is the limit of visibility for the steganalyst. There are 6.25 percent of information bits in such a message.
V. Pevnev, M. Tsuranov, H. Zemlianko, O. Amelina, “Conceptual model of information security,” In Integrated Computer Technologies in Mechanical Engineering, ICTM 2020, Lecture Notes in Networks and Systems, Springer, Cham, Switzerland, 2021, vol. 188, pp. 158–168. https://doi.org/10.1007/978-3-030-66717-7_14.
ITU-T Rec. Y.2701, Security requirements for NGN release 1, April 2007, 44 p. [Online]. Available at: https://www.itu.int/rec/T-REC-Y.2701-200704-I/en.
V. Pevnev, V. Torianyk, V. Kharchenko, “Cyber security of wireless smart systems: channels of intrusions and radio frequency vulnerabilities,” Radioelectronic and Computer Systems, no. 4, pp. 79–92, 2020. https://doi.org/10.32620/reks.2020.4.07. (in Ukrainian)
R. Rivest, A. Shamir, L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, issue 2, pp. 120-126, 1978. https://doi.org/10.1145/359340.359342.
J. Reeds, “Solved: The ciphers in book ІІІ of trithemius’s steganographia,” AT&T Labs New Jersey, 1998, 28 p. [Online]. Available at: http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/Trithemius.pdf
F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information hiding – A survey,” Proc. of the IEEE (special issue), vol. 87, issue 7, pp. 1062–1078, 1999. https://doi.org/10.1109/5.771065.
M. D. Swanson, Z. Bin, B. Chau, A. H. Tewfik, “Multiresolution video watermarking using perceptual models and scene segmentation image processing,” Proceedings of the IEEE International Conference on Image Processing, 1997, vol. 2, pp. 558-561, https://doi.org/10.1109/ICIP.1997.638832.
J. Fridrich, M. Goljan, R. Du, “Reliable detection of LSB steganography in color and grayscale images,” Special Sessions on Multimedia Security and Watermarking Applications: Proceedings of the 2001 Workshop on Multimedia Security: New Challenges, Ottawa, Canada, October 5, 2001, pp. 27-30. https://doi.org/10.1145/1232454.1232466.
Z. Li, Y. Xilan, L. Hongsong, C. Minrong, “A dynamic multiple watermarking algorithm based on DWT and HVS,” Int. J. Communications, Network and System Sciences, vol. 5, no. 8, pp. 490–495, 2012. https://doi.org/10.4236/ijcns.2012.58059.
E. A. Brewer, “Pushing the CAP: Strategies for consistency and availability,” IEEE Computer, vol. 45, issue 2, pp. 23–29, 2012. https://doi.org/10.1109/MC.2012.37.
A. Serkov, V. Tkachenko, V. Kharchenko, V. Pevnev, K. Trubchaninova, N. Doukas, “Method of increasing security of spatial intelligence in the industrial internet of things systems,” Proceedings of the 24th International Conference on Circuits, Systems, Communications and Computers, CSCC’2020, 2020, pp. 283–289. https://doi.org/10.1109/CSCC49995.2020.00058.
B. Girod, “The information theoretical significance of spatial and temporal masking in video signals,” Human Vision, Visual Processing, and Digital Display: Proc. of the SPIE, Los Angeles, January 18-20’1989, vol. 1077, pp. 178-187. https://doi.org/10.1117/12.952716.
E. Adelson, Digital Signal Encoding and Decoding Apparatus, U.S. Patent, No. 4,939515, 1990.
D. S. Taubman, M. W. Marcellin, JPEG 2000: Image Compression Fundamentals, Standards and Practice, Kluwer Academic Publishers, 2001, 776 p. https://doi.org/10.1007/978-1-4615-0799-4.
S. J. Gibbons, F. Ringdal, T. Kværna, “Joint seismic-infrasonic processing of recordings from a repeating source of atmospheric explosions,” J. Acoust. Soc. Am., vol. 122, issue 5, pp. 158-164, 2007. https://doi.org/10.1121/1.2784533.
D. Simitopoulos, D. E. Koutsonanos, M. G. Strintzis, “Robust image watermarking based on generalized radon transformations,” Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 732–745, 2003. https://doi.org/10.1109/TCSVT.2003.815947.
Y.-C. Chiu, W.-H. Tsai, “Copyright protection against print-and-scan operations by watermarking for color images using coding and synchronization of peak locations in frequency 95 domain,” Journal of Information Science and Engineering, vol. 22, no. 3, pp. 483–496, 2006.
M. Barni, F. Bartolini, V. Cappellini, A. Lippi, A. Piva, “A DWT-based technique for spatio-frequency masking of digital signatures,” Proceedings of the 11th SPIE Annual Symposium, Electronic Imaging, Security and Watermarking of Multimedia Contents, 1999, vol. 3657, pp. 31-39. https://doi.org/10.1117/12.344689.
T. H. Manjula Devi, H. S. Manjunatha Reddy, K. B. Raja, K. R. Venugopal, L. M. Patnaik, “Detecting original image using histogram, DFT and SVM,” Intern. Journal of Recent Trends in Engineering, vol. 1, no. 1, pp. 367–371, 2009.
M. Sheikhan, M. S. Moin, M. Pezhmanpour, “Blind image steganalysis via joint co-occurrence matrix and statistical moments of contourlet transform,” Proceedings of the 10th Int. Conf. on Intelligent Systems Design and Applications, 2010, pp. 368–372. https://doi.org/10.1109/ISDA.2010.5687236.
M. Topkara, U. Topkara, M. J. Atallah, “Words are not enough: Sentence level natural language watermarking,” Proceedings of the 4th ACM International Workshop on Contents Protection and Security MCPS’06, October 2006, pp. 37–46, https://doi.org/10.1145/1178766.1178777.
B. Pfitzmann, Information Hiding Terminology, Springer Lecture Notes of Computer Sciense, 1996, pp. 347-350. https://doi.org/10.1007/3-540-61996-8_52.
A. Westfeld, A. Pfitzmann, Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools – and Some Lessons Learned, [Online]. Available at: https://users.ece.cmu.edu/~adrian/487-s06/westfeld-pfitzmann-ihw99.pdf.
A. D. Ker, “Steganalysis of LSB matching in grayscale images,” IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441-444, 2005. https://doi.org/10.1109/LSP.2005.847889.
X. Chen, Q. Dai, C. Li, “A fast algorithm for computing multidimensional DCT on certain small sizes,” IEEE Transactions on Signal Processing, volume 51, issue 1, pp. 213–220, 2003. https://doi.org/10.1109/TSP.2002.806558.
C.-H. Chen, B.-D. Liu, J.-F. Yang, “Condensed recursive structures for computing multidimensional DCT/IDCT with arbitrary length,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 52, no. 9, pp. 1819-1831, 2005. https://doi.org/10.1109/TCSI.2005.852935.
S. Zhou, B. Tang, R. Chen, “Comparison between non-stationary signals fast fourier transform. and wavelet analysis,” Proceedings of the International Asia Symposium on Intelligent Interaction and Affective Computing, 8-9 December 2009, Wuhan, pp. 128-129. https://doi.org/10.1109/ASIA.2009.31.
A. Jaber, R. Bicker, “Real-time wavelet analysis of a vibration signal based on Arduino-UNO and LabVIEW,” International Journal of Materials Science and Engineering, vol. 3, no. 1, pp. 66-70, 2015. https://doi.org/10.12720/ijmse.3.1.66-70.
J. Li, “Image compression: The mathematics of JPEG 2000,” Modern Signal Processing, MSRI Publications, vol. 46, pp. 185-221, 2003. [Online]. Available at: https://www.msri.org/people/staff/levy/files/Book46/08li.pdf.
ISO/IEC 15444-1:2019 Information Technology – JPEG 2000 Image Coding System – Part 1: Core Coding System
J. Zhao, E. Koch, “Embedding robust labels into images for copyright protection,” Proceedings of the Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Munich, Vienna, 1995, pp. 242–251.
J. Zhao, E. Koch, “Towards robust and hidden image copyright labeling,” Proceedings of the IEEE Workshop on Nonlinear Signal and Image Processing, Greece, 1995, pp. 123–132.
S. G. Mallat, "A theory for multiresolution signal decomposition: the wavelet representation," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 11, no. 7, pp. 674-693, 1989, https://doi.org/10.1109/34.192463.
Y. Jadav, “Comparison of LSB and subband DCT technique for image watermarking,” Proceedings of the Conference on Advances in Communication and Control Systems, Mumbai, India, 2013, pp. 398-401.
M. J. Shensa, “The discrete wavelet transform: wedding the a trous and Mallat algorithms,” IEEE Trans. on Signal Processing, vol. 40, pp. 2464–2482, 1992. https://doi.org/10.1109/78.157290.
N. Urbanovich, “Development, analysis of efficiency and performance in an electronic textbook methods of text steganography,” Proceedings of the Printing future days: 4th International Scientific Conference on Printing and Media Technology, Chemnitz, Germany, 07–10.11.2011, pp. 189–193.
J. Soto, Statistical Testing of Random Number Generators, National Institute of Standards & Technology, 2009, p. 3.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.