Keywords: analysis of dct coefficients, identification of stego inserts, analysis of a stegocontainer, analysis of images with inserts, koch-zhao method
Method of detection of hidden data using steganography method Koch-Zhao
UDC 004.932.2
DOI: 10.26102/2310-6018/2020.29.2.007
The article proposes an image analysis algorithm with a built-in message based on the KochZhao steganographic method. The object of research is the image into which the Koch-Zhao embedding was carried out. The key idea is a comparative analysis of pairs of coefficients of a discrete cosine transform. For this, the dependence of the difference of the coefficients on the block number is constructed. Numerical differentiation of this dependence makes it possible to determine the boundaries of the embedded message. After that, the analysis of the initial dependence on the selected interval makes it possible to establish the applicable parameters of the Koch-Zhao method. Scientific novelty lies in the development of the steganographic analysis algorithm of the Koch-Zhao method, based on the analysis of discrete cosine transform coefficients, characterized in that it contains an automatic step search module that allows you to determine the embedding parameters and extract the message. Computer experiment completed. It is established that the proposed algorithm makes it possible to establish with absolute accuracy the size, content and location of the hidden message, in the case when it is embedded in a continuous sequence of blocks. The practical significance of the results lies in the fact that the developed software package allows stego analysis of images with data using the Koch-Zhao method with low filling of the stegocontainer (less than 40% of bits of the zero bit layer).
1. Provos N., Honeyman P. Detecting steganographic content on the internet. Technical Report CITI 01-1a, University of Michigan. 2001.
2. Westfeld A., Pfitzmann A. Attacks on Steganographic Systems: Breaking the Steganographic Utilities EzStego, Jsteg, Steganos and Stools and Some Lessons Learned. 3rd International Workshop on Information Hiding. 2000:61–76.
3. Aliev A.T. On the application of the LSB steganographic method to graphic files with large areas of monotonous fill. Vestnik DGTU. 2004;4 (22):454–460.
4. Barsukov V.S. Romancov A.P. Assessment of the stealth level of multimedia steganographic channels for storing and transmitting information. Special'naja Tehnika. 2000:1.
5. Kustov V.N., Paraskevopulo A.Ju. Simple secrets of steganalysis. Zashhita informacii, INSIDE. 2005;4:72–78.
6. Golub V.A., Drjuchenko M.A. Comprehensive approach for revealing steganographic concealment in JPEG files. Infokommunikacionnye tehnologii. 2009;7(1):44–50.
7. Zhilkin M.Ju. Stegoanalysis of graphic data in various formats. Doklady TUSURa. 2008;2(18):63–64.
8. Monarev V. A. Shift detection of hidden information. Vestnik SibGUTI. 2012;4:62–68
9. Koch E. Towards robust and hidden image copyright labeling. IEEE Workshop on Nonlinear Signal and Image Processing. 1995:452–455.
Keywords: analysis of dct coefficients, identification of stego inserts, analysis of a stegocontainer, analysis of images with inserts, koch-zhao method
For citation: Vilkhovskiy D.E. Method of detection of hidden data using steganography method Koch-Zhao. Modeling, Optimization and Information Technology. 2020;8(2). URL: https://moit.vivt.ru/wp-content/uploads/2020/05/Vilkhovskiy_2_20_1.pdf DOI: 10.26102/2310-6018/2020.29.2.007 (In Russ).
Published 30.06.2020