• Nenhum resultado encontrado

STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE

N/A
N/A
Protected

Academic year: 2017

Share "STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE "

Copied!
11
0
0

Texto

(1)

STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE

ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE

1 A. Kobozeva, 1E. Lebedeva, 2O. Kostyrka

1

Odessa National Polytechnik University, Ukraine

2

Academy of Fire Safety named after Chernobyl Heroes, Ukraine

Abstract. One of the main requirements to steganografic algorithm to be developed is robustness against disturbing influences, that is, to attacks against the embedded message. It was shown that guaranteeing the stego algorithm robustness does not depend on whether the additional information is embedded into the spatial or transformation domain of the cover image. Given the existing advantages of the spatial domain of the cover image in organization of embedding and extracting processes, a sufficient condition for ensuring robustness of such stego transformation was obtained in this work. It was shown that the amount of brightness correction related to the pixels of the cover image block is similar to the amount of correction related to the maximum singular value of the corresponding matrix of the block in case of embedding additional data that ensures robustness against attacks on the embedded message. Recommendations were obtained for selecting the size lof the cover image block used in stego transformation as one of the parameters determining the calculation error of stego message. Given the inversely correspondence between the stego capacity of the stego channel being organized and the size of the cover image block, l=8 value was recommended.

Keywords: Stego algorithm, robustness, attack against the embedded message, spatial domain, digital image.

STEGANOTRANSFORMARE A REGIUNII SPAŢIALE A IMAGINII CONTAINER, REZISTENTĂ ÎMPOTRIVĂ ATACURILOR CONTRA MESAJULUI ÎNCORPORAT

1Cobozeva . ., 1Lebedeva .Iu., 2Costârca .V.

1UЧiversitatea NaţioЧală politehЧică diЧ Odesa

, Ucraina

2

Academia securităţii aЧtiiЧceЧdiare Eroii Cernobâl, Ucraina

Rezumat. Una dintre principalele МОrТЧțОle pentru steganoalgoritmul în procesul elaborărТТ este МОrТЧa de stabilitate lК pОrturЛКțТТ – КtКМurТlor ьЧНrОptКtО ьЦpotrТvă ЦОsКУuluТ ьЧМorporКt. SО НОЦoЧstrОКгă, Мă stКЛТlТtКtОК steganoalgoritmului nu depinde de faptul, în ce regiune a containerului, care este coЧsТНОrКt МК o ТЦКРТЧО НТРТtКlă - spК ТКlă sКu НО trКЧsПorЦКrО ( ьЧ НoЦОЧТul НО ПrОМvОЧ ă, sТЧРulКrТtКtО, НОsМoЦpuЧОrО К ЦКtrТМОТ ТЦКРТЧОТ ОtМ.) КrО loМ ьЧМărМКrОК ТЧПorЦК ТОТ suplТЦОЧtКrО. AvсЧН ьЧ vОНОrО КvКЧtКУОlО ОбТstОЧtО prТvТЧН НoЦОЧТul spК ТКl НО МoНТПТМКrО şТ НОМoНТПТМКrО К ТЧПorЦК ТОТ, ьЧ luМrКrО ОstО ПorЦulКtă МoЧНТ ТК ПorЦКlă ЧОМОsКră НО oЛțТЧutО К stКЛТlТtă ТТ proМОНurТТ НО stОРКЧotrКЧsПorЦКrО. SО НОЦoЧstrОКгă, Мă МorОМtКrОК luЦТЧoгТtă ТТ pТбОlТlor ьЧ ЛloМuluТ МoЧtКТЧОruluТ Мu КМОТКşТ vКloКrО ОstО ОМСТvКlОЧtă Мu ОПОМtul НО МorОМ ТО К vКlorТТ ЦКбТЦКlО К ЧuЦăruluТ НО sТЧРulКrТtКtО К ЦКtrТМОТ rОspОМtТvО К ЛloМuluТ МoЧtКТЧОruluТ lК ьЧМărМКrОК ТЧПorЦК ТОТ suplТЦОЧtКrО, МКrО РКrКЧtОКгă stКЛТlТtКtОК lК КtКМurТlor МoЧtrК ТЧПorЦК ТОТ ТЧМorporКtО. SО prОгТЧtă rОМoЦКЧНărТ prТvТЧН НТЦОЧsТoЧКrОК ЛloМuluТ Мontainerului utilizat pentru proМОНurК НО stОРКЧotrКЧsПorЦКrО ьЧ МКlТtКtО НО pКrКЦОtru МКrО НОtОrЦТЧă ОroКrОК НО МКlМul ьЧ proМОsОlО НО stОРКЧotrКЧsПorЦКrО. ТЧсЧН МoЧt НО rКportul ТЧvОrs propor ТoЧКl НТЧtrО МКpКМТtКtОК ЧООvТНОЧtă НО trКПТМ К МКЧКluluТ orРКЧТгКt stОРКЧoРrКПТМ șТ К НТЦОЧsТuЧТТ ЛloМuluТ МoЧtКТЧОruluТ sО rОМoЦКЧНă utТlТгКrОК НТЦОЧsТuЧТТ l=8.

Cuvintecheie: Algoritm steganografic, stabilitate, atacul împotriva imaginiТ ьЧМorporКtО, ТЦКРТЧО НТРТtКlă.

-, Щ

1 . ., 1 . ., 2 . .

1О , У

2А , У

. , ,

– ,

. , ,

, , –

( , ,

.) .

(2)

,

. ,

,

. l ,

, ,

.

l=8.

: C , , ,

, .

1.

,

, , ,

,

, - .

,

, ,

,

[1]. ,

.

, , ,

,

«

».

,

[1-6].

,

,

.

,

( ), ,

( ), ( ),

( ).

.

,

– , .

, , ,

, . [4,7,8].

,

[4,5,8-10], ,

. ,

(3)

– [2,3],

( ). ,

( ,

)

( , ), ,

.

, , /

,

, .

,

-, ,

« ».

;

.

- .

2.

- .

: 1.

;

2.

- ;

3. ,

,

.

,

, .

3.

Д2-4].

. Д3]

,

, S

(4)

, , , – Д2,3], , . 1

A , Д3], ,

, - , . [3], , , , , . , , , .

B - ll - . B

Д2,3]:

BUVT

l

T

l

l v ,...,v

u ,...,

u 2 1

1 1 0 0 0 0 0 0                        

, (1)

V ,

U - ll , ui, vi, i1,l, -

( ) B , diag(1,...,l ), 1...l 0 - .

. B , (1)

:

BU



VT, (2)

) ,..., (

diag  l

 1 - ii, i1,l,

B .

B (2)

:

                    T l l

l v ,...,v

u ,..., u

B 2 1

1 1 1 0 0 0 0 0 0           

                T l l

l v ,...,v

u ,...,

u 2 1

(5)

u ,...,ul

v1,...,vl

T 1 1 0 0 0 0 0 0 0 0                        

, (3)

T

v u B

B 1 1 1 .

, (3)

:

BBB. (4)

T

v u B1 1 1

 - B.

(4)

[2].

[11] , u1, v1 ,

, [2],

,

n- nO Rl:

O

n

u1  , O

n

v1  , (5)

n- :

l T O R l l l

n 

  

 

 1 , 1 ,, 1 . (6)

B

 , (4),

.

T

l

u u u

u111, 21,..., 1 , v1

v11,v21,...,vl1

T,

:

B1u1v1T

             1 21 11 1 ... l u u u

v11,v21,...,vl1

                     1 1 1 21 1 1 11 1 1 1 21 1 21 21 1 11 21 1 1 11 1 21 11 1 11 11 1 l l l l l l v u v u v u v u v u v u v u v u v u                            

. (7)

(6)

B

       

 

       

 

  

  

  

  

  

  

l l

l

l l

l

l l

l

1 1

1

1 1

1

1 1

1

         

 

. (8)

, ,

[3],

- ,

, ,

l b1

 . (9)

За ча и 1. ,

, (3)-(4)

: ,

,

. ,

: ( ) ,

[12].

, (Adobe Photoshop, GIMP .),

.

, (4), (8),

/ 1,l,

.

l

/

, , ,

.

За ча и 2. ,

(5) (3) (8)

, .

Matlab

, 200 (

, ), , ( RGB;

).

(7)

(1), 1 1 (1{60,80,100}) (

); B (3).

,

uint8,

} 255 ,..., 2 , 1 , 0

{ ,

, (9).

8

l , 1 80, .1. b

9.65 ( 10),

3.5%. b ,

, 10 ( . .1).

За ча и 3.

1

(9) b l.

, l, b

, , (

, )

} 255 ,..., 1 , 0

{ , . . ( ,

,

, (4), (8)).

.1.

(8)

3

b

l, ,

, .2 1 80. ,

l 16 l 8 b

, l8 l 4 ,

, (4), (8),

8

8 44. 88-

16

16 4 [4]

. ,

(4), (8) l 8.

(8)

, (4).

.2. b

Д11] , ,

,

,

(9)

B – B,

Д3]:

2

1 (B) (B B) B

max j j

l

j     

 ,

) B B ( ), B

( j

j  

 - B BB ,

2 B

 -

B

 , , 1, ,

2 B

 .

1

B , ,

,

2 B

 , , b

B

,

2 B

 ,

:

l B

l

b 1 2

    

 . (10)

, .

Утв р и 1 (

щ щ , И- ).

,

, B

2 B

 , ,

- l

l B , ,

b,

(10).

b  ,

2

B

 .

, ,

, , .

, , . Э

,

( , Jpeg), . .

, .

[3]

 8

(10)

72

2 

B . (10) b9,

,

, QF60,

.

4.

:

- ;

― ,

, ,

.

,

l l8.

,

, ,

- .

[1] Horoshko, V.A. Metody I sredstva zaschity informatsii [Text]: nauchnoe izdanie / V.A. Horoshko, А.А. Chekatkov; Red. Iu.S. Kovtaniuc. — K.: IUNIOR, 2003. — 505 . (in Russian)

[2] Kobozeva, А.А. Teoria vozmuschenii kak osnova obschego podhoda k otsenke chiuvstvitelinosti steganosoobschenii / А.А. Kobozeva, .V. Naromanova // Informatika ta matematichny metody v modliuvanny. — 2012. — 2, Nr.3. — .254–267. (in Russian) [3] Kobozeva, А.А. Formalinye uslovia obespechenia ustoichivosti steganometoda k sjatiu i ih

realizatsia v novom steganoalgoritme [Electrony resurs] / А.А. Kobozrva, .А. Melinik // Problemy regionalnoy energhetiki. — Kishinau, 2013. —№ 1(21). — . 93–102. — Regim dostupu: http://ieasm.webart.md/data/m71_2_237.pdf (in Russian)

[4] Gribunin, V.G. Tsifrovaia steganografia [Text] : monografia / V.G. Gribunin, I.N. Okov, I.V. Turinsev. — . : SOLON-Press, 2002. — 272 . (in Russian)

[5] Li, B. A Survey on Image Steganography and Steganalysis / B. Li et al. // Journal of Information Hiding and Multimedia Signal Processing. — 2011. — Vol.2, No.2. — PP.142– 172.

[6] Podilchuk, C.I. Digital Watermarking: Algorithms and Applications / C.I. Podilchuk, E.J. Delp // IEEE Signal Processing Magazine. — 2001. — Vol.18, Iss. 4. — PP. 33–46. [7] Nasir, I.А. A Robust Color Image Watermarking Scheme Based on Image Normalization /

(11)

[8] Perwej Y. Copyright protection of digital images using robust watermarking based on joint DLT and DWT / Y. Perwej, F. Perwej, A. Perwej // International Journal of Scientific & Engineering Research. — 2012. — Vol. 3, Iss. 6. — . 1–9.

[9] Fan, C.-H. A robust watermarking technique resistant Jpeg compression / C.-H. Fan, H.-Y. Huang, W.-H. Hsu // Journal of Information Science and Engineering. — 2011. — Vol. 27, Iss. 1. — PP. 163–180.

[10] Suhail, M.A. Digital watermarking based DCT and JPEG model / M.A. Suhail, M.S. Obaidat // IEEE Transactions on Instrumentation and Measurement. — 2003. — Vol. 52, Iss. 5. — PP. 1640–1647.

[11] Kobozeva, А.А. Nechuvstvitelinosti steganosoobschenia k sjatiu i formalinye dostatochnye uslovia ee obespechenia / А.А. Kobozrva, .А. Melinik // Zbirnik naukovih pratsi Viiskovogo institutu Kievsikogo natsionalinogo univrsitetu і . . Shevchenka. – 2012. — Vip. 38. — . 193–203. (in Russian)

[12] Kobozeva, А.А. Osnovy metoda vyiavlenia klonirovanyh uchastkov izobrajenia, podvergnutyh korrektsii iarkosti / А.А. Kobozeva, .Iu.Levebeva // Suchasna spetsialina tehnika. – 2013. - №3. – .13-20. (in Russian)

.

. . .,

., . .

-.

: , , , . E-mail:

alla_kobozeva@ukr.net

. . .

-.

: ,

.

– А

.

( . ).

:

Referências

Documentos relacionados

The profile and motion of overlapping flies are recognized concerning the positions of the centers of the body and wings, as well as the constraints of body size and wing angle..

5 RОгЮХЭКЭОХО ЩОЧЭrЮ МКЩКМТЭățТХО ОЦЩКЭТМО НЮЩă sМКХО ХК КНШХОsМОЧțТТ ьЧ МШЧПХТМЭ МЮ ХОРОК PОЧЭrЮ МКЧКХЮХ rКțТШЧКХ КХ ОЦЩКЭТОТ, МО sО МКrКМЭОrТгОКгă ЩrТЧ ШrТОЧЭКrОК

For each object patch, a periodogram approach is applied in the spatial domain (object area) and time domain (small baseline differential interferometric stack) for a

Digital image inpainting is an important issue in the domain of image restoration and an international interesting research topic in recent years. A lot of papers on image

Translation coefficients between difference image histograms are defined as a measure of the weak correlation between the least significant hit (LSB) plane and the remained bit

Based on their functionality attacks may be classified into three types, attacks on secrecy of data, attacks on availability of nodes, attacks on the network:..

The JPEG process is a widely used form of lossy image compression that centers on the Discrete Cosine Transform.. DCT and Fourier transforms convert images from spatial-domain to

Resumo: O pragmatismo enquanto tendência na Organização do Conhecimento requer novas configurações metodológicas. A análise do domínio, concebida sob essa