Метод непрямого приховування інформації в процесі стиснення відеозображень

It is substantiated that steganographic systems should be used to ensure the protection of special information resources in conditions of its prompt delivery. Here, steganographic technologies are an integral part of complex information protection systems. Simultaneously, for steganographic systems,...

Full description

Saved in:
Bibliographic Details
Published inRadìoelektronnì ì komp'ûternì sistemi (Online) no. 4; pp. 119 - 131
Main Authors Бараннік, Володимир Вікторович, Бараннік, Наталія Вячеславівна, Ігнатьєв, Олександр Олексійович, Хіменко, Вікторія Вікторівна
Format Journal Article
LanguageEnglish
Published 29.11.2021
Online AccessGet full text
ISSN1814-4225
2663-2012
DOI10.32620/reks.2021.4.10

Cover

Abstract It is substantiated that steganographic systems should be used to ensure the protection of special information resources in conditions of its prompt delivery. Here, steganographic technologies are an integral part of complex information protection systems. Simultaneously, for steganographic systems, there is a contradiction between the density of embedded data and level of information compaction of video container (level of reduction of volume bit volume of compact presented video image concerning bit volume of an initial video image). It leads to the fact that under the conditions of the required quality (reliability) of digital video information, the bit rate level of the covert channel is insufficient. Consequently, the scientific-applied problem concerns the necessity to increase the integrity (the level of correspondence of the hidden information before its embedding in a video container and after its extraction) and bit rate of the hidden channel of special information transmission. It is relevant. The solution of the described problem in the field of application of steganographic transformations can be realized based on the application of two different approaches. The first approach is based on methods of direct message embedding. But this approach is characterized by introducing distortions in the video images used as a container. Therefore, changes in structural and statistical patterns in the syntactic description of the video container happen. It reduces the potential for video container compaction. The second approach to creating steganographic transformation methods is based on information hiding using indirect embedding technique. Here, the embedding process exploits the functional dependency between the elements of the video container and the elements of the embedded message. Setting a specific dependency between the elements in the video container corresponds to the embedded element with a value of "0" or "1". However, the existing indirect steganographic transformation methods have a disadvantage. It consists of an insufficient value of embedded data density. To eliminate these disadvantages, it is proposed to develop an approach that allows using not only psychovisual but also structural redundancy of video container for concealment. Therefore, the research objective of this paper is to develop a method for indirect information withholding in the video container compression process to increase the bit rate of the hidden message channel. In the process of research, a steganographic multiagent system is constructed, which allows embedding hidden message elements without loss of information based on the indirect approach by modifying the active bases of the multiagent basis considering their uncertainty. To select transformants (data sets) as containers for information embedding, the requirement of the existence of a base system with all active bases is taken into account. The number of embedded bits of the hidden message is equal to the number of active bases in the base system of the multiadic space. Because of the made experiments, the following results have been received: in the process of embedding messages based on the created method distortions in a video container is not brought; for the created method the additional increase in the hidden channel bit rate in average 5 … 7 times are reached.
AbstractList It is substantiated that steganographic systems should be used to ensure the protection of special information resources in conditions of its prompt delivery. Here, steganographic technologies are an integral part of complex information protection systems. Simultaneously, for steganographic systems, there is a contradiction between the density of embedded data and level of information compaction of video container (level of reduction of volume bit volume of compact presented video image concerning bit volume of an initial video image). It leads to the fact that under the conditions of the required quality (reliability) of digital video information, the bit rate level of the covert channel is insufficient. Consequently, the scientific-applied problem concerns the necessity to increase the integrity (the level of correspondence of the hidden information before its embedding in a video container and after its extraction) and bit rate of the hidden channel of special information transmission. It is relevant. The solution of the described problem in the field of application of steganographic transformations can be realized based on the application of two different approaches. The first approach is based on methods of direct message embedding. But this approach is characterized by introducing distortions in the video images used as a container. Therefore, changes in structural and statistical patterns in the syntactic description of the video container happen. It reduces the potential for video container compaction. The second approach to creating steganographic transformation methods is based on information hiding using indirect embedding technique. Here, the embedding process exploits the functional dependency between the elements of the video container and the elements of the embedded message. Setting a specific dependency between the elements in the video container corresponds to the embedded element with a value of "0" or "1". However, the existing indirect steganographic transformation methods have a disadvantage. It consists of an insufficient value of embedded data density. To eliminate these disadvantages, it is proposed to develop an approach that allows using not only psychovisual but also structural redundancy of video container for concealment. Therefore, the research objective of this paper is to develop a method for indirect information withholding in the video container compression process to increase the bit rate of the hidden message channel. In the process of research, a steganographic multiagent system is constructed, which allows embedding hidden message elements without loss of information based on the indirect approach by modifying the active bases of the multiagent basis considering their uncertainty. To select transformants (data sets) as containers for information embedding, the requirement of the existence of a base system with all active bases is taken into account. The number of embedded bits of the hidden message is equal to the number of active bases in the base system of the multiadic space. Because of the made experiments, the following results have been received: in the process of embedding messages based on the created method distortions in a video container is not brought; for the created method the additional increase in the hidden channel bit rate in average 5 … 7 times are reached.
Author Бараннік, Володимир Вікторович
Хіменко, Вікторія Вікторівна
Ігнатьєв, Олександр Олексійович
Бараннік, Наталія Вячеславівна
Author_xml – sequence: 1
  givenname: Володимир Вікторович
  orcidid: 0000-0002-2848-4524
  surname: Бараннік
  fullname: Бараннік, Володимир Вікторович
– sequence: 2
  givenname: Наталія Вячеславівна
  orcidid: 0000-0001-6420-1838
  surname: Бараннік
  fullname: Бараннік, Наталія Вячеславівна
– sequence: 3
  givenname: Олександр Олексійович
  orcidid: 0000-0003-1227-6840
  surname: Ігнатьєв
  fullname: Ігнатьєв, Олександр Олексійович
– sequence: 4
  givenname: Вікторія Вікторівна
  surname: Хіменко
  fullname: Хіменко, Вікторія Вікторівна
BookMark eNp1kD1Ow0AQhVcoSISQmtYXsLN_XtsliviTItFAbdkbWzKEBNlp6EiAVKB0puEQJiRAkZgrzN6IdUKFRDEzejPzveLtolp_0I8Q2ifYYlRQ3Eqjq8yimBKLWwRvoToVgpkUE1pDdeISbnJK7R3UzLJLjDF1HZs4bh09wyss1BhKmBuwggV8qzs1haVevENpVBK-1KOWM3UPMyj000pNDZXr8QClPi-hUBOVqxcDZhugVBNtOlK5odtY86O19YbURjnMtSzhU9eb_i_gozqrpz20HQe9LGr-zga6ODo8b5-YnbPj0_ZBx5SEOth0qRdRFspYcCo8TGRIGHe7WMRO15NMcoFtGRHedWXgcC4cFvCQhR7xiAxcGbEGsje-Mh1kWRrFvkyGwTAZ9IdpkPR8gv11rH4Vq1_F6nO91FzrD3eTJtdBevsv8QMW-66C
CitedBy_id crossref_primary_10_3103_S014641162470069X
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.32620/reks.2021.4.10
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2663-2012
EndPage 131
ExternalDocumentID 10_32620_reks_2021_4_10
GroupedDBID 9MQ
AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c1270-829e23bcf6426901cb1348d06f7d9c3c4605ce14d8ca744673a4b3b9191ca8ce3
ISSN 1814-4225
IngestDate Thu Apr 24 23:06:57 EDT 2025
Tue Jul 01 04:08:42 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c1270-829e23bcf6426901cb1348d06f7d9c3c4605ce14d8ca744673a4b3b9191ca8ce3
ORCID 0000-0002-2848-4524
0000-0001-6420-1838
0000-0003-1227-6840
OpenAccessLink http://nti.khai.edu/ojs/index.php/reks/article/download/reks.2021.4.10/1700
PageCount 13
ParticipantIDs crossref_citationtrail_10_32620_reks_2021_4_10
crossref_primary_10_32620_reks_2021_4_10
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-11-29
PublicationDateYYYYMMDD 2021-11-29
PublicationDate_xml – month: 11
  year: 2021
  text: 2021-11-29
  day: 29
PublicationDecade 2020
PublicationTitle Radìoelektronnì ì komp'ûternì sistemi (Online)
PublicationYear 2021
SSID ssj0002875178
ssib044757823
ssib052605930
ssib038076033
Score 2.1649656
Snippet It is substantiated that steganographic systems should be used to ensure the protection of special information resources in conditions of its prompt delivery....
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 119
Title Метод непрямого приховування інформації в процесі стиснення відеозображень
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpR3LbtNA0KoKBzggnqK8lAORkKIE78OvY_OoKiQ4oFbqLYrXtgSFFJX2wokW6AnUW7jwEaW0wKENv7D-I2YfdidpWgocMt5dz4xnZ2bt2c0-HOd-5DGRQEuoC5pAB4WktA7vvF49cXu9mGV-RoVajfz4iT-_yB8teUtT5zto1tL6WtwQbyauK_kXq0IZ2FWtkv0Ly5ZMoQDSYF-AYGGAZ7Jxte1Wo5aCTa_aJtWQ6nRHQ17Tl3ZxG-CcRnI1nNMlLUTATLo2igrpUKc9hEp1CSvSAF30sLZ5QE1dIh8V8YJFybpVEEOJX-ADDIwU9LgwnQK3rDQxdLWjjNVDWJSMqWFcyqJCVlaOUE11A5QmSBYD_VHWcLeFQ_6n0IjUbITWCnzhl9U_D32Tr9nLMrySqzRQuWZTjc_a8teqBb58Nr4hrG4f2vIEKc-dbAVbpVnVkjQN9pAm9pZCY6VRjPbckgwxG3E1bJnSHQxx8N_ithENdrTmka9YExoRQ-Mqwah7lHV1jxmbIhFcLK51MYbvF2IoE2se3PIoxMV69ZCyyLHqcqzdU8hKQaOz6HjWQxQtxK9dcNU8kDOcbtWJOv4zwUS92qFFStQaW-vJJhoKCa9zanYmaKS6DAJ6Bi9hQtHHgaMIiNgIyATTxIR443EaU8dgwNt1NV1WRyZQ0uANO7t9ZEf8sUi1nD9M3K5m0VUMuopBl3fVQttzNAjMbB07sgZhhTpSw0eTNdQWp9AvKvOeGtIpDoR9rv9vCDyiY_hSAWZTOP3Mh6NCo_4M6pgsXHYu2RGFyqz5PFxxptL-Veci2mf2mvNJfpH7-aYcyr2KPJT78lf-Nt-WB1DwTQ4rKit_5h8gu5u_k7tyB5AO8-1KPoDLezmE2wdyJ9_KB_nnitw1BMN8C5hu5IMKgE2g39CsDSUwGsg9yA7lD_h9Bfwd-V3dzj9edxbnOgut-bo9h6cu1LykekijlLJYZL7a98AlIiaMh4nrZ0ESCSbU1BqREp6EohdwiLxZj8csjkhERC8UKbvhTPdX-ulNp0KCLPMTlmQkY0qvoYCYMgTqMAbVJmTGaRTa7Ap7SIU6K-lF9wSTzzgPSoJXZn-mk1BvnR31tnPhqD3ccabXVtfTu9D5XIvvadf6DWLecCo
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%D0%9C%D0%B5%D1%82%D0%BE%D0%B4+%D0%BD%D0%B5%D0%BF%D1%80%D1%8F%D0%BC%D0%BE%D0%B3%D0%BE+%D0%BF%D1%80%D0%B8%D1%85%D0%BE%D0%B2%D1%83%D0%B2%D0%B0%D0%BD%D0%BD%D1%8F+%D1%96%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D1%96%D1%97+%D0%B2+%D0%BF%D1%80%D0%BE%D1%86%D0%B5%D1%81%D1%96+%D1%81%D1%82%D0%B8%D1%81%D0%BD%D0%B5%D0%BD%D0%BD%D1%8F+%D0%B2%D1%96%D0%B4%D0%B5%D0%BE%D0%B7%D0%BE%D0%B1%D1%80%D0%B0%D0%B6%D0%B5%D0%BD%D1%8C&rft.jtitle=Rad%C3%ACoelektronn%C3%AC+%C3%AC+komp%27%C3%BBtern%C3%AC+sistemi+%28Online%29&rft.au=%D0%91%D0%B0%D1%80%D0%B0%D0%BD%D0%BD%D1%96%D0%BA%2C+%D0%92%D0%BE%D0%BB%D0%BE%D0%B4%D0%B8%D0%BC%D0%B8%D1%80+%D0%92%D1%96%D0%BA%D1%82%D0%BE%D1%80%D0%BE%D0%B2%D0%B8%D1%87&rft.au=%D0%91%D0%B0%D1%80%D0%B0%D0%BD%D0%BD%D1%96%D0%BA%2C+%D0%9D%D0%B0%D1%82%D0%B0%D0%BB%D1%96%D1%8F+%D0%92%D1%8F%D1%87%D0%B5%D1%81%D0%BB%D0%B0%D0%B2%D1%96%D0%B2%D0%BD%D0%B0&rft.au=%D0%86%D0%B3%D0%BD%D0%B0%D1%82%D1%8C%D1%94%D0%B2%2C+%D0%9E%D0%BB%D0%B5%D0%BA%D1%81%D0%B0%D0%BD%D0%B4%D1%80+%D0%9E%D0%BB%D0%B5%D0%BA%D1%81%D1%96%D0%B9%D0%BE%D0%B2%D0%B8%D1%87&rft.au=%D0%A5%D1%96%D0%BC%D0%B5%D0%BD%D0%BA%D0%BE%2C+%D0%92%D1%96%D0%BA%D1%82%D0%BE%D1%80%D1%96%D1%8F+%D0%92%D1%96%D0%BA%D1%82%D0%BE%D1%80%D1%96%D0%B2%D0%BD%D0%B0&rft.date=2021-11-29&rft.issn=1814-4225&rft.eissn=2663-2012&rft.issue=4&rft.spage=119&rft.epage=131&rft_id=info:doi/10.32620%2Freks.2021.4.10&rft.externalDBID=n%2Fa&rft.externalDocID=10_32620_reks_2021_4_10
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1814-4225&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1814-4225&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1814-4225&client=summon