1. Science
  2. Publications
  3. Systems of Arms and Military Equipment
  4. 4(60)'2019
  5. Method for increasing hidden channel capacity in infocommunication systems for special purpose

Method for increasing hidden channel capacity in infocommunication systems for special purpose

I. Tupitsya, V. Dymchuk, K. Chuyanov, M. Kodatsky
Annotations languages:


Description: The article discusses issues related to the development of a method for increasing the throughput of a covert channel for information processing and transmission of video information resources. The development of systems that use images and video for data transmission forces the introduction of digital steganography methods to protect data. The purpose of the work is to find new approaches to improve the efficiency of hidden information transmission systems in telecommunication systems based on the steganographic method with high rates of stability and throughput. The task of scientific work is to study the methods of digital steganography. The following methods have been analyzed and investigated: the discrete wavelet - transform method, the Bengh - Memon - Eo - Jung method, the least significant bit method, the Koch - Zhao method. As a result of the analysis, it was found that digital steganography methods have several disadvantages: low resistance to attacks, low bandwidth, a small amount of steganographic capacity and are unstable when transmitting images and active enemy attacks, data loss is possible. In order to steganographically hide data, a method has been developed that is implemented by integrating discrete wavelet transform and Bengam-Memon-Eo-Young methods. The concept of steganographic data hiding to increase throughput is proposed. For comparison, the primary areas of the image were selected. Using the developed method, selected blocks are resistant to compression attacks and introduce slight distortions into the image, which allows using images for steganographic data hiding. The developed method is resistant to known active attacks and steganographic analysis by the enemy.


Keywords: digital steganography, bandwidth, attack, discrete wavelet – conversion

References

1.Gribunin, V.G., Okov, I.N. and Turintsev, I.V. (2018) “Tsifrovaya steganografiya” [Digital steganography], SolonPress, Moscow, 248 p.
2.Grundmann, M., Kwatra, V., Han, M. and Essa, I. (2010), Efficient hierarchical graph-based video segmentation, 2010IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Francisco, California, pp. 2141-2148.
3.Gonzalez, R. and Woods, K. (2018), Digital image processing, Tekhnosfera, Kyiv, 1104 p.
4.Konakhovich, G.F. and Puzyrenko, A.Yu. (2016), Computer steganography. Theory and practice, Press, Kyiv, 288 p.
5.Miano, J. (2013), Formats and image compression algorithms in action, Triumph, Kyiv, 336 p.
6.Ablamejko, S.V. and Lagunovskij, D.M. (2000), “Obrabotka izobrazhenij: tehnologija, metody, primenenie” [Imageprocessing: technology. methods. application], Amalfeja, Minsk, 303 р.
7.Miano, J. (1999), Compressed image file formats: JPEG, PNG, GIF, XBM, BMP, ACM, Moscow, 264 p.
8.Pratt ,W.K., Chen, W.H. and Welch, L.R. (1969), Slant transform image coding, Computer Processing incommunications, New York, 184 p.
9.Stankiewicz, O., Wegner, K., Karwowski, D., Stankowski, J., Klimaszewski, K. and Grajek, T. (2017), Encoding modeselection in HEVC with the use of noise reduction, International Conference on Systems, Signals and Image Processing (IWSSIP), Poznan, pp. 1-6.
10.Wang, S., Zhang, X., Liu, X., Zhang, J., Ma, S.and Gao, W. (2017), Utility-Driven Adaptive Preprocessing for ScreenContent Video Compression, IEEE Transactions on Multimedia, Vol. 19, No. 3, pp. 660-667.
11.Christophe, E.,Lager, D. and Mailhes, C. (2005), Quality criteria benchmark for hiperspectral imagery, IEEETransactions on Geoscience and Remote Sensing, Vol. 43, No 9, pp. 2103-2114.
12.Barannik, V., Bekirov, A., Lekakh, A. and Barannik, D. (2018), A steganographic method based on the modification ofregions of the image with different saturation, 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET). https://doi.org/10.1109/tcset.2018.8336260.
13.Barannik, V., Alimpiev, A., Bekirov, А., Barannik, D. and Barannik, N. (2017), Detections of sustainable areas forsteganographic embedding, 15 th IEEE East-West Design & Test Symposium (EWDTS), Novi Sad, Serbia, рр. 555-558. https://doi.org/ 10.1109/EWDTS.2017.8110028.
14.Barannik, V.V., Ryabukha, Y.N., Tverdokhleb, V.V. and Barannik, D.V. (2017), Methodological basis for constructinga method for compressing of transformants bit representation, based on non-equilibrium positional encoding, 2nd International Conference on Advanced Information and Communication Technologies (AICT). https://doi.org/10.1109/aiact.2017.8020096.
15.Barannik, V.V., Barannik, D.V. and Bekirov, A.E. (2017), “Osnovyi teorii strukturno-kombinatornogosteganograficheskogo kodirovaniya: monografiya” [Fundamentals of the theory of structurally combinatorial steganographic coding: monograph], Leader, Kharkiv, 256 p.
16.Bekirov, A., Barannik, D., Frolov, O. and Suprun, O. (2016), The new method of secure data transmission on theindirect steganography basis, IEEE East-West Design & Test Symposium (EWDTS). https://doi.org/10.1109/ewdts.2016.7807754.

Reference:
 Tupytsia, I.M., Dymchuk, V.V., Chuianov, K.V. and Kodatskyi, M.M. (2019), “Metod pidvyshchennia propusknoi spromozhnosti skrytoho kanalu v infokomunikatsiinykh systemakh spetsialnoho pryznachennia” [Method for increasing hidden channel capacity in infocommunication systems for special purpose], Systems of Arms and Military Equipment, No. 4(60), pp. 53-57. https://doi.org/10.30748/soivt.2019.60.07.