1. Science
  2. Publications
  3. Information Processing Systems
  4. 3(158)'2019
  5. Analysis of the stability of steganographic methods of integrating data in video files to attacks

Analysis of the stability of steganographic methods of integrating data in video files to attacks

N. Shostak, A. Astrakhantsev
Annotations languages:


Description: In the conditions of rapid growth of information and telecommunication technologies, steganographic algorithms and methods of their application in cybernetic space are the most actively developing. Digital video is one of the most popular multi-media data that is distributed over the Internet. Therefore, widespread adoption of algorithms for embedding digital watermark in a video file. In this paper, In this paper, we study the embedding method based on the replacement of the least significant bit, the embedding method based on the Koch-Zhao algorithm, the embedding method based on the discrete wavelet transform (DWT), the method of authenticating video based on the content using the fiberboard, and the method of effectively embedding the watermark in the video using fiberboard. Also it was made a comparative analysis of modern methods of embedding a digital video player into a video file is made in order to identify methods with the best indicators for attack resistance and secrecy of the embedding of the digital watermark, and the study of methods to increase the noise immunity and resilience to the main attacks. After analyzing the results it can be concluded that the use of noise-proof codes greatly increases the stability of the algorithms to the analyzed attacks. In addition, the use of Reed-Solomon's jamming codes, due to better self-adjusting properties, greatly enhances the stability of embedding algorithms for digital watermarks in a video file. It is also possible to conclude that in order for the embedded digital watermark to be in the video file to be resistant to most attacks, it is necessary to use a fiber-based method and encode a digital watermark using self-regulating self-regulating codes with forward error correction. For the most stability it is necessary to use the jam-resistant codes of Reed-Solomon. And due to the fact that the embedding of the DWT by the method based on the fiberboard does not result in significant distortions of the video file, it enables to embed two bits of the DWT into each fiberboard unit.


Keywords: steganography, videofile, algorithm, watermark, authentication, Koch-Zhao, error code, Reed-Solomon.

References

Reference:
 Shostak, N.V. and Astrakhantsev, A.A. (2019), “Analiz stiikosti stehanohrafichnykh metodiv vbudovuvannia danykh v videofaily do atak” [Analysis of the stability of steganographic methods of integrating data in video files to attacks], Information Processing Systems, Vol. 3(158), pp. 110-116. https://doi.org/10.30748/soi.2019.158.13.