Visible to the public Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information

TitleEfficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information
Publication TypeConference Paper
Year of Publication2019
AuthorsYudin, Oleksandr, Ziubina, Ruslana, Buchyk, Serhii, Frolov, Oleg, Suprun, Olha, Barannik, Natalia
Conference Name2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT)
Date Publisheddec
Keywordsbuilt-in containers, code structures, coding theory, Comparative Analysis, compositionality, container., Containers, critical information, cryptography, data extraction, digital data container, digital platform, digital representation, digital video data platform, Discrete Cosine Transformation (DCT), discrete cosine transformation matrix, discrete cosine transforms, distortion, efficiency assessment, embedded critical data, embedded data resistance, embedded digital data, encoding embedding, Image coding, image container, image fragment, image media image, Image reconstruction, Koch methods, Lakes, matrix algebra, Metrics, pubcrawl, quantization coefficient, resilience, Resiliency, security, steganographic coding, steganographic coding method, steganographic embedding, steganography, structural elements, transformed image, visualization, weight coefficients, Zhao methods
AbstractThe presented method of encoding and steganographic embedding of a series of bits for the hidden message was first developed by modifying the digital platform (bases) of the elements of the image container. Unlike other methods, steganographic coding and embedding is accomplished by changing the elements of the image fragment, followed by the formation of code structures for the established structure of the digital representation of the structural elements of the image media image. The method of estimating quantitative indicators of embedded critical data is presented. The number of bits of the container for the developed method of steganographic coding and embedding of critical information is estimated. The efficiency of the presented method is evaluated and the comparative analysis of the value of the embedded digital data in relation to the method of weight coefficients of the discrete cosine transformation matrix, as well as the comparative analysis of the developed method of steganographic coding, compared with the Koch and Zhao methods to determine the embedded data resistance against attacks of various types. It is determined that for different values of the quantization coefficient, the most critical are the built-in containers of critical information, which are built by changing the part of the digital video data platform depending on the size of the digital platform and the number of bits of the built-in container.
Citation Keyyudin_efficiency_2019