Метод обнаружения скрытой передачи данных, использующий стеганографический метод Коха-Жао
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

Method of detection of hidden data using steganography method Koch-Zhao

Vilkhovskiy D.E.  

UDC 004.932.2
DOI: 10.26102/2310-6018/2020.29.2.007

Публикация отозвана (RETRACTED) 25.12.2020
Причина ретракции: дублирование публикации. Дополнительная информация о причинах ретракции: статья является результатом перефразирования ранее опубликованной статьи без ссылки на одного из соавторов исходной статьи (Белим С.В., Вильховский Д.Э. Стеганоанализ алгоритма Коха-Жао // Математические структуры и моделирование. 2018. № 4. С. 112-118).
  • Abstract
  • List of references
  • About authors

The article proposes an image analysis algorithm with a built-in message based on the KochZhao steganographic method. The object of research is the image into which the Koch-Zhao embedding was carried out. The key idea is a comparative analysis of pairs of coefficients of a discrete cosine transform. For this, the dependence of the difference of the coefficients on the block number is constructed. Numerical differentiation of this dependence makes it possible to determine the boundaries of the embedded message. After that, the analysis of the initial dependence on the selected interval makes it possible to establish the applicable parameters of the Koch-Zhao method. Scientific novelty lies in the development of the steganographic analysis algorithm of the Koch-Zhao method, based on the analysis of discrete cosine transform coefficients, characterized in that it contains an automatic step search module that allows you to determine the embedding parameters and extract the message. Computer experiment completed. It is established that the proposed algorithm makes it possible to establish with absolute accuracy the size, content and location of the hidden message, in the case when it is embedded in a continuous sequence of blocks. The practical significance of the results lies in the fact that the developed software package allows stego analysis of images with data using the Koch-Zhao method with low filling of the stegocontainer (less than 40% of bits of the zero bit layer).

1. Provos N., Honeyman P. Detecting steganographic content on the internet. Technical Report CITI 01-1a, University of Michigan. 2001.

2. Westfeld A., Pfitzmann A. Attacks on Steganographic Systems: Breaking the Steganographic Utilities EzStego, Jsteg, Steganos and Stools and Some Lessons Learned. 3rd International Workshop on Information Hiding. 2000:61–76.

3. Aliev A.T. On the application of the LSB steganographic method to graphic files with large areas of monotonous fill. Vestnik DGTU. 2004;4 (22):454–460.

4. Barsukov V.S. Romancov A.P. Assessment of the stealth level of multimedia steganographic channels for storing and transmitting information. Special'naja Tehnika. 2000:1.

5. Kustov V.N., Paraskevopulo A.Ju. Simple secrets of steganalysis. Zashhita informacii, INSIDE. 2005;4:72–78.

6. Golub V.A., Drjuchenko M.A. Comprehensive approach for revealing steganographic concealment in JPEG files. Infokommunikacionnye tehnologii. 2009;7(1):44–50.

7. Zhilkin M.Ju. Stegoanalysis of graphic data in various formats. Doklady TUSURa. 2008;2(18):63–64.

8. Monarev V. A. Shift detection of hidden information. Vestnik SibGUTI. 2012;4:62–68

9. Koch E. Towards robust and hidden image copyright labeling. IEEE Workshop on Nonlinear Signal and Image Processing. 1995:452–455.

Vilkhovskiy Danil Eduardovich

Email: vilkhovskiy@gmail.com

Omsk State University. F.M. Dostoevsky (OmSU)

Omsk, Russian Federation

Keywords: analysis of dct coefficients, identification of stego inserts, analysis of a stegocontainer, analysis of images with inserts, koch-zhao method

For citation: Vilkhovskiy D.E. Method of detection of hidden data using steganography method Koch-Zhao. Modeling, Optimization and Information Technology. 2020;8(2). Available from: https://moit.vivt.ru/wp-content/uploads/2020/05/Vilkhovskiy_2_20_1.pdf DOI: 10.26102/2310-6018/2020.29.2.007 (In Russ).

603

Full text in PDF

Published 26.07.2021