STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE
ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE
1 A. Kobozeva, 1E. Lebedeva, 2O. Kostyrka
1
Odessa National Polytechnik University, Ukraine
2
Academy of Fire Safety named after Chernobyl Heroes, Ukraine
Abstract. One of the main requirements to steganografic algorithm to be developed is robustness against disturbing influences, that is, to attacks against the embedded message. It was shown that guaranteeing the stego algorithm robustness does not depend on whether the additional information is embedded into the spatial or transformation domain of the cover image. Given the existing advantages of the spatial domain of the cover image in organization of embedding and extracting processes, a sufficient condition for ensuring robustness of such stego transformation was obtained in this work. It was shown that the amount of brightness correction related to the pixels of the cover image block is similar to the amount of correction related to the maximum singular value of the corresponding matrix of the block in case of embedding additional data that ensures robustness against attacks on the embedded message. Recommendations were obtained for selecting the size lof the cover image block used in stego transformation as one of the parameters determining the calculation error of stego message. Given the inversely correspondence between the stego capacity of the stego channel being organized and the size of the cover image block, l=8 value was recommended.
Keywords: Stego algorithm, robustness, attack against the embedded message, spatial domain, digital image.
STEGANOTRANSFORMARE A REGIUNII SPAŢIALE A IMAGINII – CONTAINER, REZISTENTĂ ÎMPOTRIVĂ ATACURILOR CONTRA MESAJULUI ÎNCORPORAT
1Cobozeva . ., 1Lebedeva .Iu., 2Costârca .V.
1UЧiversitatea NaţioЧală politehЧică diЧ Odesa
, Ucraina
2
Academia securităţii aЧtiiЧceЧdiare Eroii Cernobâl, Ucraina
Rezumat. Una dintre principalele МОrТЧțОle pentru steganoalgoritmul în procesul elaborărТТ este МОrТЧa de stabilitate lК pОrturЛКțТТ – КtКМurТlor ьЧНrОptКtО ьЦpotrТvă ЦОsКУuluТ ьЧМorporКt. SО НОЦoЧstrОКгă, Мă stКЛТlТtКtОК steganoalgoritmului nu depinde de faptul, în ce regiune a containerului, care este coЧsТНОrКt МК o ТЦКРТЧО НТРТtКlă - spК ТКlă sКu НО trКЧsПorЦКrО ( ьЧ НoЦОЧТul НО ПrОМvОЧ ă, sТЧРulКrТtКtО, НОsМoЦpuЧОrО К ЦКtrТМОТ ТЦКРТЧОТ ОtМ.) КrО loМ ьЧМărМКrОК ТЧПorЦК ТОТ suplТЦОЧtКrО. AvсЧН ьЧ vОНОrО КvКЧtКУОlО ОбТstОЧtО prТvТЧН НoЦОЧТul spК ТКl НО МoНТПТМКrО şТ НОМoНТПТМКrО К ТЧПorЦК ТОТ, ьЧ luМrКrО ОstО ПorЦulКtă МoЧНТ ТК ПorЦКlă ЧОМОsКră НО oЛțТЧutО К stКЛТlТtă ТТ proМОНurТТ НО stОРКЧotrКЧsПorЦКrО. SО НОЦoЧstrОКгă, Мă МorОМtКrОК luЦТЧoгТtă ТТ pТбОlТlor ьЧ ЛloМuluТ МoЧtКТЧОruluТ Мu КМОТКşТ vКloКrО ОstО ОМСТvКlОЧtă Мu ОПОМtul НО МorОМ ТО К vКlorТТ ЦКбТЦКlО К ЧuЦăruluТ НО sТЧРulКrТtКtО К ЦКtrТМОТ rОspОМtТvО К ЛloМuluТ МoЧtКТЧОruluТ lК ьЧМărМКrОК ТЧПorЦК ТОТ suplТЦОЧtКrО, МКrО РКrКЧtОКгă stКЛТlТtКtОК lК КtКМurТlor МoЧtrК ТЧПorЦК ТОТ ТЧМorporКtО. SО prОгТЧtă rОМoЦКЧНărТ prТvТЧН НТЦОЧsТoЧКrОК ЛloМuluТ Мontainerului utilizat pentru proМОНurК НО stОРКЧotrКЧsПorЦКrО ьЧ МКlТtКtО НО pКrКЦОtru МКrО НОtОrЦТЧă ОroКrОК НО МКlМul ьЧ proМОsОlО НО stОРКЧotrКЧsПorЦКrО. ТЧсЧН МoЧt НО rКportul ТЧvОrs propor ТoЧКl НТЧtrО МКpКМТtКtОК ЧООvТНОЧtă НО trКПТМ К МКЧКluluТ orРКЧТгКt stОРКЧoРrКПТМ șТ К НТЦОЧsТuЧТТ ЛloМuluТ МoЧtКТЧОruluТ sО rОМoЦКЧНă utТlТгКrОК НТЦОЧsТuЧТТ l=8.
Cuvinte–cheie: Algoritm steganografic, stabilitate, atacul împotriva imaginiТ ьЧМorporКtО, ТЦКРТЧО НТРТtКlă.
-, Щ
1 . ., 1 . ., 2 . .
1О , У
2А .Г , У
. , ,
– ,
. , ,
, , –
( , ,
.) .
,
. ,
,
. l ,
, ,
.
l=8.
: C , , ,
, .
1.
,
, , ,
,
, - .
,
, ,
,
[1]. ,
.
, , ,
,
«
».
,
[1-6].
,
,
.
,
( ), ,
( ), ( ),
( ).
.
,
– , .
, , ,
, . [4,7,8].
,
[4,5,8-10], ,
. ,
– [2,3],
( ). ,
( ,
)
( , ), ,
.
, , /
,
, .
,
-, ,
« ».
;
.
- .
2.
–
- .
: 1.
;
2.
- ;
3. ,
,
.
,
, .
3.
Д2-4].
. Д3]
,
, S
, , , – Д2,3], , . 1
A , Д3], ,
, - , . [3], , , , , . , , , .
B - ll - . B
Д2,3]:
BUVT
l
Tl
l v ,...,v
u ,...,
u 2 1
1 1 0 0 0 0 0 0
, (1)
V ,
U - ll , ui, vi, i1,l, -
( ) B , diag(1,...,l ), 1...l 0 - .
. B , (1)
:
BU
VT, (2)) ,..., (
diag l
1 - i i, i1,l,
B .
B (2)
:
T l ll v ,...,v
u ,..., u
B 2 1
1 1 1 0 0 0 0 0 0
T l ll v ,...,v
u ,...,
u 2 1
u ,...,ul
v1,...,vl
T 1 1 0 0 0 0 0 0 0 0 , (3)
T
v u B
B 1 1 1 .
, (3)
:
BBB. (4)
T
v u B1 1 1
- B.
(4)
[2].
[11] , u1, v1 ,
, [2],
,
n- nO Rl:
O
n
u1 , O
n
v1 , (5)
n- :
l T O R l l l
n
1 , 1 ,, 1 . (6)
B
, (4),
.
Tl
u u u
u1 11, 21,..., 1 , v1
v11,v21,...,vl1
T,:
B1u1v1T
1 21 11 1 ... l u u u
v11,v21,...,vl1
1 1 1 21 1 1 11 1 1 1 21 1 21 21 1 11 21 1 1 11 1 21 11 1 11 11 1 l l l l l l v u v u v u v u v u v u v u v u v u
. (7)
B
l l
l
l l
l
l l
l
1 1
1
1 1
1
1 1
1
. (8)
, ,
[3],
- ,
, ,
l b1
. (9)
За ча и 1. ,
, (3)-(4)
: ,
,
. ,
: ( ) ,
[12].
, (Adobe Photoshop, GIMP .),
.
, (4), (8),
/ 1,l,
.
l
/
, , ,
.
За ча и 2. ,
(5) (3) (8)
, .
Matlab
, 200 (
, ), , ( RGB;
).
(1), 1 1 (1{60,80,100}) (
); B (3).
,
uint8,
} 255 ,..., 2 , 1 , 0
{ ,
, (9).
8
l , 1 80, .1. b
9.65 ( 10),
3.5%. b ,
, 10 ( . .1).
За ча и 3.
1
(9) b l.
, l, b
, , (
, )
} 255 ,..., 1 , 0
{ , . . ( ,
,
, (4), (8)).
.1.
3
b
l, ,
, .2 1 80. ,
l 16 l 8 b
, l8 l 4 ,
, (4), (8),
8
8 44. 88-
16
16 4 [4]
. ,
(4), (8) l 8.
(8)
, (4).
.2. b
Д11] , ,
,
,
B – B,
Д3]:
2
1 (B) (B B) B
max j j
l
j
,
) B B ( ), B
( j
j
- B BB ,
2 B
-
B
, , 1, ,
2 B
.
1
B , ,
,
2 B
, , b
B
,
2 B
,
:
l B
l
b 1 2
. (10)
, .
Утв р и 1 (
щ щ , И- ).
,
, B
2 B
, ,
- l
l B , ,
b,
(10).
b ,
2
B
.
, ,
, , .
, , . Э
,
( , Jpeg), . .
, .
[3]
8
72
2
B . (10) b9,
,
, QF60,
.
4.
:
―
- ;
― ,
, ,
.
,
l l8.
,
, ,
- .
[1] Horoshko, V.A. Metody I sredstva zaschity informatsii [Text]: nauchnoe izdanie / V.A. Horoshko, А.А. Chekatkov; Red. Iu.S. Kovtaniuc. — K.: IUNIOR, 2003. — 505 . (in Russian)
[2] Kobozeva, А.А. Teoria vozmuschenii kak osnova obschego podhoda k otsenke chiuvstvitelinosti steganosoobschenii / А.А. Kobozeva, .V. Naromanova // Informatika ta matematichny metody v modliuvanny. — 2012. — 2, Nr.3. — .254–267. (in Russian) [3] Kobozeva, А.А. Formalinye uslovia obespechenia ustoichivosti steganometoda k sjatiu i ih
realizatsia v novom steganoalgoritme [Electrony resurs] / А.А. Kobozrva, .А. Melinik // Problemy regionalnoy energhetiki. — Kishinau, 2013. —№ 1(21). — . 93–102. — Regim dostupu: http://ieasm.webart.md/data/m71_2_237.pdf (in Russian)
[4] Gribunin, V.G. Tsifrovaia steganografia [Text] : monografia / V.G. Gribunin, I.N. Okov, I.V. Turinsev. — . : SOLON-Press, 2002. — 272 . (in Russian)
[5] Li, B. A Survey on Image Steganography and Steganalysis / B. Li et al. // Journal of Information Hiding and Multimedia Signal Processing. — 2011. — Vol.2, No.2. — PP.142– 172.
[6] Podilchuk, C.I. Digital Watermarking: Algorithms and Applications / C.I. Podilchuk, E.J. Delp // IEEE Signal Processing Magazine. — 2001. — Vol.18, Iss. 4. — PP. 33–46. [7] Nasir, I.А. A Robust Color Image Watermarking Scheme Based on Image Normalization /
[8] Perwej Y. Copyright protection of digital images using robust watermarking based on joint DLT and DWT / Y. Perwej, F. Perwej, A. Perwej // International Journal of Scientific & Engineering Research. — 2012. — Vol. 3, Iss. 6. — . 1–9.
[9] Fan, C.-H. A robust watermarking technique resistant Jpeg compression / C.-H. Fan, H.-Y. Huang, W.-H. Hsu // Journal of Information Science and Engineering. — 2011. — Vol. 27, Iss. 1. — PP. 163–180.
[10] Suhail, M.A. Digital watermarking based DCT and JPEG model / M.A. Suhail, M.S. Obaidat // IEEE Transactions on Instrumentation and Measurement. — 2003. — Vol. 52, Iss. 5. — PP. 1640–1647.
[11] Kobozeva, А.А. Nechuvstvitelinosti steganosoobschenia k sjatiu i formalinye dostatochnye uslovia ee obespechenia / А.А. Kobozrva, .А. Melinik // Zbirnik naukovih pratsi Viiskovogo institutu Kievsikogo natsionalinogo univrsitetu і . . Shevchenka. – 2012. — Vip. 38. — . 193–203. (in Russian)
[12] Kobozeva, А.А. Osnovy metoda vyiavlenia klonirovanyh uchastkov izobrajenia, podvergnutyh korrektsii iarkosti / А.А. Kobozeva, .Iu.Levebeva // Suchasna spetsialina tehnika. – 2013. - №3. – .13-20. (in Russian)
.
– . . .,
., . .
-.
: , , , . E-mail:
alla_kobozeva@ukr.net
– . . .
-.
: ,
.
– А
.
( . ).
: