ИССЛЕДОВАНИЕ ВОЗМОЖНОСТЕЙ ИСПОЛЬЗОВАНИЯ СТЕГАНОГРАФИЧЕСКИХ СПОСОБОВ ЗАЩИТЫ ИНФОРМАЦИИ
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

A STUDY OF THE POSSIBILITIES OF USING STEGANOGRAPHIC METHODS OF INFORMATION PROTECTION

Pitolin A.V.   Preobrazhensky Y.P.   Choporov O.N.  

UDC 681.3
DOI:

  • Abstract
  • List of references
  • About authors

Steganographic methods are used to hide the very fact of the existence of certain messages. The paper analyzes the key concepts that are used in steganographic methods of information transformation. Describes the features of the steganographic methods hide information in graphic files. Developed the threat model unauthorized transfer of information by steganographic methods of information transformation using the graphical containers. The article Presents a classification scheme of threats of unauthorized information transfer using the methods of its steganographic transformation. An experiment was conducted to identify the most effective ways to counteract unauthorized access to information. The author has established that almost all methods of counteraction to unauthorized access on time of influence do not exceed 2 seconds. Highlighted ways to counter at the time of exposure that do not exceed 0.7 seconds. The experiment was conducted among 10 people with the help of the S-tools program and the created AntiStego software. The paper presents the algorithm of the program "AntiStego" together with the description of the software modules implementing counteraction to unauthorized access. A generalized scheme of the experiment for combating the unauthorized covert transfer of information.

1. Petitcolas A.P. Information hiding - a survey, Proceedings of the IEEE, special issue on protection of multimedia content/ A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, July 1999.-vol.87(7). - P. 1062-1078.

2. Gribunin V.G. Computer steganography. / V.G. Gribunin, I.N. Okov, I.V. Turintsev, V.Yu. Golovachev, A.V. Konyaev, - M: Solon-R, 2002 .-- 240c.

3. . Richard E. Blahut Principles and practice of information theory / E. Richard // Addison-Wesley, Reading, 1987. – pp. 76-90.

4. Gustavus J. Simmons The prisoners' problem and the subliminal channel / J.Gustavus // Advances in Cryptology: Proceedings of Crypto 83 (David Chaum, ed.), Plenum Press, 1984, - pp. 51-67.

5. Pfitzmann B. Information Hiding Terminology / B.Pfitzmann // Information hiding: first international workshop, vol. 1174 of Lecture Notes in Computer Science, Isaac Newton Institute, Cambridge, England, 1996. - pp. 347-350

6. L'vovich I.Ya. Primenenie metodologicheskogo analiza v issledovanii bezopasnosti / I.Ya.L'vovich, A. A. Voronov // Informatsiya i bezopasnost'. 2011. Vol. 14. No. 3. pp. 469-470.

7. L'vovich I.Ya. Faktory ugrozy ekonomicheskoy bezopasnosti gosudarstva / I. Ya. L'vovich, A. A. Voronov, Yu. P. Preobrazhenskiy // Informatsiya i bezopasnost'. 2006. Vol. 9. No. 1. pp. 36-39.

8. Gribunin V. G. Tsifrovaya steganografiya. / V. G. Gribunin, I. N. Okov, I. V. Turintsev // M.: Solon-Press, 2009. – 272 p.

9. Agranovskiy A. V., Balakin A. V., Gribunin V. G., Sapozhnikov S. A. Steganografiya, tsifrovye vodyanye znaki i stegoanaliz. Monografiya. – M.: Vuzovskaya kniga, 2009. – 220 p.

10. Preobrazhenskiy Yu. P. Razrabotka metodov formalizatsii zadach na osnove semanticheskoy modeli predmetnoy oblasti / Yu. P.Preobrazhenskiy // Vestnik Voronezhskogo instituta vysokikh tekhnologiy. 2008. No. 3. pp. 075-077.

11. Konakhovich G. F., Puzyrenko A. Yu. Komp'yuternaya steganografiya. Teoriya i praktika. – K.: MK-Press, 2006. – 288 p.

12. Maksimov I.B. Printsipy formirovaniya avtomatizirovannykh rabochikh mest / I. B. Maksimov // Vestnik Voronezhskogo instituta vysokikh tekhnologiy. 2014. No. 12. pp. 130-135.

13. Maksimov I. B. Klassifikatsiya avtomatizirovannykh rabochikh mest / I. B. Maksimov // Vestnik Voronezhskogo instituta vysokikh tekhnologiy. 2014. No.12. pp. 127-129.

14. Merzlyakova E. Yu. Postroenie steganograficheskikh sistem dlya rastrovykh izobrazheniy, baziruyushchikhsya na teoretiko-informatsionnykh printsipakh. / E. Yu.Merzlyakova //Dis. … kand. tekhn. nauk: 05.13.19. – Novosibirsk: SibGUTI, 2011. – 161 p.

15. Slipenchuk P. V. Steganografiya v kodakh, ispravlyayushchikh oshibki / P. V. Slipenchuk // Vestnik MGTU. – 2013. – No. 5. – pp. 1-12.

Pitolin Andrey Vladimirovich
Candidate of Technical Sciences, Associate Professor
Email: pitol@mail.ru

Voronezh State Technical University

Voronezh, Russian Federation

Preobrazhensky Yuri Petrovich
Candidate of Technical Sciences, Associate Professor
Email: hekwin@yandex.ru

Voronezh Institute of High Technologies

Voronezh, Russian Federation

Choporov Oleg Nikolaevich
Doctor of Technical Sciences, Professor
Email: choporov_oleg@mail.ru


Voronezh, Russian Federation

Keywords: information security, steganographic approach, unauthorized access, information transfer

For citation: Pitolin A.V. Preobrazhensky Y.P. Choporov O.N. A STUDY OF THE POSSIBILITIES OF USING STEGANOGRAPHIC METHODS OF INFORMATION PROTECTION. Modeling, Optimization and Information Technology. 2018;6(2). Available from: https://moit.vivt.ru/wp-content/uploads/2018/04/PitolinSoavtors_2_18_1.pdf DOI: (In Russ).

767

Full text in PDF