Keywords: information security, steganographic approach, unauthorized access, information transfer
A STUDY OF THE POSSIBILITIES OF USING STEGANOGRAPHIC METHODS OF INFORMATION PROTECTION
UDC 681.3
DOI:
Steganographic methods are used to hide the very fact of the existence of certain messages. The paper analyzes the key concepts that are used in steganographic methods of information transformation. Describes the features of the steganographic methods hide information in graphic files. Developed the threat model unauthorized transfer of information by steganographic methods of information transformation using the graphical containers. The article Presents a classification scheme of threats of unauthorized information transfer using the methods of its steganographic transformation. An experiment was conducted to identify the most effective ways to counteract unauthorized access to information. The author has established that almost all methods of counteraction to unauthorized access on time of influence do not exceed 2 seconds. Highlighted ways to counter at the time of exposure that do not exceed 0.7 seconds. The experiment was conducted among 10 people with the help of the S-tools program and the created AntiStego software. The paper presents the algorithm of the program "AntiStego" together with the description of the software modules implementing counteraction to unauthorized access. A generalized scheme of the experiment for combating the unauthorized covert transfer of information.
1. Petitcolas A.P. Information hiding - a survey, Proceedings of the IEEE, special issue on protection of multimedia content/ A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, July 1999.-vol.87(7). - P. 1062-1078.
2. Gribunin V.G. Computer steganography. / V.G. Gribunin, I.N. Okov, I.V. Turintsev, V.Yu. Golovachev, A.V. Konyaev, - M: Solon-R, 2002 .-- 240c.
3. . Richard E. Blahut Principles and practice of information theory / E. Richard // Addison-Wesley, Reading, 1987. – pp. 76-90.
4. Gustavus J. Simmons The prisoners' problem and the subliminal channel / J.Gustavus // Advances in Cryptology: Proceedings of Crypto 83 (David Chaum, ed.), Plenum Press, 1984, - pp. 51-67.
5. Pfitzmann B. Information Hiding Terminology / B.Pfitzmann // Information hiding: first international workshop, vol. 1174 of Lecture Notes in Computer Science, Isaac Newton Institute, Cambridge, England, 1996. - pp. 347-350
6. L'vovich I.Ya. Primenenie metodologicheskogo analiza v issledovanii bezopasnosti / I.Ya.L'vovich, A. A. Voronov // Informatsiya i bezopasnost'. 2011. Vol. 14. No. 3. pp. 469-470.
7. L'vovich I.Ya. Faktory ugrozy ekonomicheskoy bezopasnosti gosudarstva / I. Ya. L'vovich, A. A. Voronov, Yu. P. Preobrazhenskiy // Informatsiya i bezopasnost'. 2006. Vol. 9. No. 1. pp. 36-39.
8. Gribunin V. G. Tsifrovaya steganografiya. / V. G. Gribunin, I. N. Okov, I. V. Turintsev // M.: Solon-Press, 2009. – 272 p.
9. Agranovskiy A. V., Balakin A. V., Gribunin V. G., Sapozhnikov S. A. Steganografiya, tsifrovye vodyanye znaki i stegoanaliz. Monografiya. – M.: Vuzovskaya kniga, 2009. – 220 p.
10. Preobrazhenskiy Yu. P. Razrabotka metodov formalizatsii zadach na osnove semanticheskoy modeli predmetnoy oblasti / Yu. P.Preobrazhenskiy // Vestnik Voronezhskogo instituta vysokikh tekhnologiy. 2008. No. 3. pp. 075-077.
11. Konakhovich G. F., Puzyrenko A. Yu. Komp'yuternaya steganografiya. Teoriya i praktika. – K.: MK-Press, 2006. – 288 p.
12. Maksimov I.B. Printsipy formirovaniya avtomatizirovannykh rabochikh mest / I. B. Maksimov // Vestnik Voronezhskogo instituta vysokikh tekhnologiy. 2014. No. 12. pp. 130-135.
13. Maksimov I. B. Klassifikatsiya avtomatizirovannykh rabochikh mest / I. B. Maksimov // Vestnik Voronezhskogo instituta vysokikh tekhnologiy. 2014. No.12. pp. 127-129.
14. Merzlyakova E. Yu. Postroenie steganograficheskikh sistem dlya rastrovykh izobrazheniy, baziruyushchikhsya na teoretiko-informatsionnykh printsipakh. / E. Yu.Merzlyakova //Dis. … kand. tekhn. nauk: 05.13.19. – Novosibirsk: SibGUTI, 2011. – 161 p.
15. Slipenchuk P. V. Steganografiya v kodakh, ispravlyayushchikh oshibki / P. V. Slipenchuk // Vestnik MGTU. – 2013. – No. 5. – pp. 1-12.
Keywords: information security, steganographic approach, unauthorized access, information transfer
For citation: Pitolin A.V., Preobrazhensky Y.P., Choporov O.N. A STUDY OF THE POSSIBILITIES OF USING STEGANOGRAPHIC METHODS OF INFORMATION PROTECTION. Modeling, Optimization and Information Technology. 2018;6(2). URL: https://moit.vivt.ru/wp-content/uploads/2018/04/PitolinSoavtors_2_18_1.pdf DOI: (In Russ).
Published 30.06.2018