Localization of disturbance region of formal parameters of steganographic cover to ensure steganosystem stability

Authors

DOI:

https://doi.org/10.3103/S0735272724090024

Keywords:

steganosystem, resistance to attacks against embedded message, digital image, singular number, perturbation

Abstract

The effectiveness of information security in any industry critically depends on the theoretical basis, which is based on the methods and algorithms used. Existing mathematical approaches do not fully eliminate theoretical problems in information security, leaving the task of their improvement and further development urgent. Today, one of the most effective and powerful means of information security is steganography. Given this, the study aims to increase the efficiency of steganographic systems. The efficiency of a steganographic system is understood as an assessment of its resistance to attacks against an embedded message, with a digital image considered as a cover. The goal of the work is achieved by substantiating the localization of the perturbation region of formal parameters of the complete set, defining the cover as a result of the steganographic transformation, which is the maximum number of blocks of the cover matrix. The most important result of the work is obtaining a sufficient condition for ensuring the resistance of the steganography algorithm to disturbances, which has been practically implemented during the development of the steganographic transformation of the singular decomposition region of the cover matrix and made it possible to increase the steganosystem efficiency by 57% as compared to the prototype. The obtained sufficient condition can be effectively used to select parameters of the steganomethod, which will ensure its relatively significant resistance to disturbing actions and a priori qualitative assessment of the insensitivity degree and reduction of the sensitivity of a steganomessage, as has been demonstrated in this study work using examples of specific steganomethods.

References

  1. O. Harasymchuk et al., Modern Methods of Ensuring Information Protection in Cybersecurity Systems Using Artificial Intelligence and Blockchain Technology. Kharkiv: Technology Center PC, 2025, doi: https://doi.org/10.15587/978-617-8360-12-2.
  2. S. Stankevich, O. Kondratov, M. Herda, O. Maslenko, I. Saprykin, “Infrared image iterative enhancement in frequency domain,” Radioelectron. Commun. Syst., vol. 67, no. 6, pp. 277–286, 2024, doi: https://doi.org/10.3103/S0735272724070045.
  3. M. V. Honcharov, A. V. Honcharov, “General theoretical foundations of the study of the concept of «information security»,” Anal. Comp. Jurisprud., no. 2, pp. 32–36, 2025, doi: https://doi.org/10.24144/2788-6018.2025.02.2.
  4. A. T. Utapulatov, “The essence and scientific-theoretical foundations of the concept of information security,” EPRA Int. J. Res. Dev., vol. 8, no. 11, pp. 235–238, 2023, doi: https://doi.org/10.36713/epra2016.
  5. C. A. Horne, A. Ahmad, S. A. Maynard, “A theory on information security,” in Australasian Conference on Information Systems (ACIS 2016), 2016, pp. 1–12, uri: https://aisel.aisnet.org/acis2016/87.
  6. A. Stychynska, “Theoretical fundamentals of information security policy,” Grani, vol. 24, no. 6, pp. 100–108, 2021, doi: https://doi.org/10.15421/172164.
  7. M. Bloch et al., “An overview of information-theoretic security and privacy: metrics, limits and applications,” IEEE J. Sel. Areas Inf. Theory, vol. 2, no. 1, pp. 5–22, 2021, doi: https://doi.org/10.1109/JSAIT.2021.3062755.
  8. M. Dalal, M. Juneja, “Steganography and steganalysis (in digital forensics): a cybersecurity guide,” Multimed. Tools Appl., vol. 80, no. 4, pp. 5723–5771, 2021, doi: https://doi.org/10.1007/s11042-020-09929-9.
  9. M. Shaharom, K. Tahar, “Multispectral image matching using SIFT and SURF algorithm: a review,” Int. J. Geoinformatics, vol. 19, no. 1, pp. 13–21, 2023, doi: https://doi.org/10.52939/ijg.v19i1.2495.
  10. A. A. Kobozeva, V. A. Horoshko, Information security analysis, [in Russian]. Kiev: Izd. GUIKT, 2009.
  11. B. A. Forouzan, Introduction to Cryptography and Network Security. McGraw Hill, 2008, uri: https://almuhammadi.com/sultan/books_2020/Forouzan.pdf.
  12. J. R. Laracy, T. Marlowe, “Systems theory and information security: foundations for a new educational approach,” Inf. Secur. Educ. J., vol. 5, no. 2, p. 35, 2018, doi: https://doi.org/10.6025/isej/2018/5/2/35-48.
  13. R. Hryshchuk, Theoretical Foundations of Modeling Processes of Attack on Information by Methods of Theories of Differential Games and Differential Transformations. Zhytomyr: Ruta, 2010.
  14. A. A. Kobozeva, I. I. Bobok, A. I. Garbuz, “General principles of integrity checking of digital images and application for steganalysis,” Transp. Telecommun. J., vol. 17, no. 2, pp. 128–137, 2016, doi: https://doi.org/10.1515/ttj-2016-0012.
  15. I. I. Bobok, A. A. Kobozeva, “Development of the theoretical approach based on matrix theory for analyzing the state of information security systems,” Probl. Reg. Energ., no. 3(63), pp. 29–43, 2024, doi: https://doi.org/10.52254/1857-0070.2024.3-63.03.
  16. I. I. Bobok, A. A. Kobozeva, “Theoretical foundations of digital content integrity expertise,” Probl. Reg. Energ., vol. 65, no. 1, pp. 105–120, 2025, doi: https://doi.org/10.52254/1857-0070.2025.1-65.08.
  17. C. Bergman, J. Davidson, “Unitary embedding for data hiding with the SVD,” in Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents, 2005, p. 619, doi: https://doi.org/10.1117/12.587796.
  18. J. W. Demmel, Applied Numerical Linear Algebra. Philadelphia: SIAM, 1997, doi: https://doi.org/10.1137/1.9781611971446.
  19. I. Bobok, A. Kobozieva, S. Sokalsky, “The problem of choosing a steganographic container in conditions of attacks against an embedded message,” Probl. Reg. Energ., no. 4(56), pp. 74–88, 2022, doi: https://doi.org/10.52254/1857-0070.2022.4-56.07.
  20. N. Subramanian, O. Elharrouss, S. Al-Maadeed, A. Bouridane, “Image steganography: a review of the recent advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: https://doi.org/10.1109/ACCESS.2021.3053998.
  21. A. A. Kobozeva, A. V. Sokolov, “Steganographic method with code control of information embedding based on multi-level code words,” Radioelectron. Commun. Syst., vol. 66, no. 4, pp. 173–189, 2023, doi: https://doi.org/10.3103/S0735272723040052.
  22. A. Kobozeva, A. Sokolov, “Robust steganographic method with code-controlled information embedding,” Probl. Reg. Energ., no. 4(52), pp. 115–130, 2021, doi: https://doi.org/10.52254/1857-0070.2021.4-52.11.
  23. R. C. Gonzalez, R. E. Woods, Digital Image Processing. Hoboken: Pearson, 2007.
  24. T. Gloe, R. Böhme, “The ‘Dresden Image Database’ for benchmarking digital image forensics,” in Proceedings of the 2010 ACM Symposium on Applied Computing, 2010, pp. 1584–1590, doi: https://doi.org/10.1145/1774088.1774427.
  25. M. A. Aslam et al., “Image steganography using least significant bit (LSB) - a systematic literature review,” in 2022 2nd International Conference on Computing and Information Technology (ICCIT), 2022, pp. 32–38, doi: https://doi.org/10.1109/ICCIT52419.2022.9711628.
  26. M. Fateh, M. Rezvani, Y. Irani, “A new method of coding for steganography based on LSB matching revisited,” Secur. Commun. Networks, vol. 2021, pp. 1–15, 2021, doi: https://doi.org/10.1155/2021/6610678.
  27. “NRCS photo gallery.” https://www.nrcs.usda.gov/wps/portal/nrcs/main/national/newsroom/multimedia/.
  28. R. Srinivas, S. Panda, “Performance analysis of various filters for image noise removal in different noise environment,” Int. J. Adv. Comput. Res., vol. 3, no. 4, pp. 47–52, 2013, uri: https://accentsjournals.org/PaperDirectory/Journal/IJACR/2013/12/8.pdf.
  29. G. F. Konakhovich, D. O. Progonov, O. Y. Puzyrenko, Computer steganographic processing and analysis of multimedia data, [in Ukrainian]. Kyiv: Alex Print Centre, 2018.
Dependences of perturbations of complete set of SNN on their number

Published

2024-08-26

Issue

Section

Research Articles