PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Synthesis of optimal steganographic method meeting given criteria

Treść / Zawartość
Identyfikatory
Warianty tytułu
PL
Synteza optymalnej metody steganografii według wybranych kryteriów
Języki publikacji
EN
Abstrakty
EN
One of the steganography areas is digital watermarking. In this paper, the technique of comparative analysis of embedding information methods into an image was proposed. A comprehensive analysis of the most relevant steganographic methods of hiding information was made. Own method of embedding information in still images was synthesized. The possibility of studied methods to adapt to the real channels was evaluated for the first time. The robustness and security of steganographic systems based on the proposed method were also demonstrated.
PL
Jednym z obszarów steganografii jest osadzanie cyfrowych znaków wodnych. W niniejszej pracy zaproponowano metodykę analizy porównawczej metod osadzania informacji w obrazach. Została dokonana wszechstronna analiza najnowszych metod ukrywania informacji za pomocą steganografii. Opracowano własną metodę osadzania informacji w nieruchomych obrazach. Oceniono możliwość adaptowania się metod do charakterystyk rzeczywistych kanałów komunikacyjnych. Wykazano wiarygodność i bezpieczeństwo systemów steganograficznych wykorzystujących proponowaną metodę.
Rocznik
Tom
Strony
27--34
Opis fizyczny
Bibliogr. 20 poz., rys., tab.
Twórcy
autor
  • Kharkiv National University of Radio Electronics, Communication Networks Department
  • Kharkiv National University of Radio Electronics, Communication Networks Department
Bibliografia
  • [1] Benham D., Memon N., Yeo B. L., Yeung M.: Fast watermarking of DCT-based compressed images, Proc Int Conf Image Science, Systems, and Technology, Las Vegas, NV, 1997, 243–253.
  • [2] Cox I., Miller M., Bloom J., Fridrich J., Kalker T.: Digital Watermarking and Steganography. Second Edition. Elsevier, 2008.
  • [3] Das Gupta M. (ed.): Watermarking - Vol. 1, InTeO, Croatia, 2012.
  • [4] Domarev V. V.: Safety of information technology. Methodology of protection systems. Ltd. TID DS, 2001.
  • [5] Fridrich J., Goljan M.: Comparing robustness of watermarking techniques. Proc. SPIE Vol. 3657, 1999, 214–225.
  • [6] Fridrich J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambride University Press, Cambridge 2009.
  • [7] Jadav Y.: Comparison of LSB and Subband DCT Technique for Image Watermarking. Conference on Advances in Communication and Control Systems, 2013, 398–401.
  • [8] Kashyap N., Sinha G. R.: Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT). I. J. Modern Education and Computer Science, vol. 3, 2012, 50–56.
  • [9] Koch E., Zhao J.: Toward robust and hidden image copyright labeling. IEE Workshop Nonlinear Signal and Image Processing, Neos Marmaras, Greece, 1995, 456–459.
  • [10] Konakhovich G., Puzyrenko A.: Computer steganography. Theory and Practice. MK-Press 2006.
  • [11] Kutter M., Petitcolas F.: A fair benchmark for image watermarking systems. Proc. Of Security and Watermarking of Multimedia Contents, 1999, 226–239.
  • [12] Li Z., Xilan Y., Hongsong L., Minrong C.: A Dynamic Multiple Watermarking Algorithm Based on DWT and HVS. Int. J. Communications, Network and System Sciences, 5, 2012, 490–495.
  • [13] Lukichov V. V., Luzhetskyi V. A., Vasiura A. S.: Methods and tools of stenographic information security based on wavelet transformations: monograph. VNTU, Vinnytsia 2014.
  • [14] Mei Jiansheng, Li Sukang, Tan Xiaomei: A Digital Watermarking Algorithm Based On DCT and DWT. Proc. of the 2009 International Symposium on Web Information Systems and Applications, 2009, 104–107.
  • [15] Ó Ruanaidh J., Pun T.: Rotation, scale and translation invariant digital image watermarking. Proc. of the ICIP'97, vol. 1, 1997, 536–539.
  • [16] Piva A., Barni M., Bartolini F.: Threshold Selection for Correlation-Based Watermark Detection. Proceedings of COST 254 Workshop on Intelligent Communications, Italy, L'Aquila, 1998, 67–72.
  • [17] Singh P., Chadha R. S.: A Survey of Digital Watermarking Techniques, Applications and Attacks. International Journal of Engineering and Innovative Technology, Vol. 2, Issue 9, 2013, 165–175.
  • [18] Sridevi T., Kumar V.: A Robust Watermarking Algorithm Based on Image Normalization and DC Coefficients. International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, 2011, 226–232.
  • [19] Surekha B., Swamy G. N.: A Spatial Domain Public Image Watermarking. International Journal of Security and Its Applications, Vol. 5, No. 1, 2011, 1–12.
  • [20] Vovk O. O., Astrahantsev A. A.: Development of the technique for determining the importance of steganographic algorithms characteristics. Visnyk of Lviv Polytechnic National University, “Information systems and networks”, Lviv, No 805, 2014, 52–60.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-48f178a4-420c-4bbc-8fd4-a92736b5a457
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.