Skip to main content
Log in

Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In the classical sense, steganography does not pursue the goal of protecting information from extraction, but the use of a two-component steganographic system ensures not only information masking but also cryptographic strength. The article examines the resistance of the steganographic system for embedding a two-component container to information extraction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.

REFERENCES

  1. Fridrich, J., Steganography in Digital Media, New York: Cambridge Univ. Press, 2010. https://doi.org/10.1017/cbo9781139192903

    Book  Google Scholar 

  2. Konakhovich, G.F. and Puzyrenko, A.Yu., Komp’yuternaya steganografiya. Teoriya i praktika (Computer Steganography: Theory and Practice), Kiev: MK-Press, 2006.

  3. Shelukhin, O.I. and Kanaev, S.D., Algoritmy i programmnaya realizatsiya (Algorithms and Program Implementation), Moscow: Goryachaya Liniya-Telekom, 2021.

  4. Shakurskii, M.V., Algorithm for hiding the use of a two-component container in a steganographic system, Vopr. Zashchity Inf., 2020, no. 3, pp. 3–5.

  5. Shakurskiy, M.V., Two-component steganographic system for embedding information into least significant bits of audio signals, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 988–993. https://doi.org/10.3103/S0146411622080235

    Article  Google Scholar 

  6. Vvedenie v kriptografiyu (Introduction to Cryptography), Yashchenko, V.V., Ed., Moscow: MTsNMO, 2012, 4th ed.

  7. Garg, S.K., Cryptography using XOR cipher, Res. J. Sci. Technol., 2017, vol. 9, no. 1, pp. 25–28. https://doi.org/10.5958/2349-2988.2017.00004.3

    Article  Google Scholar 

  8. Shakurskii, V.K. and Shakurskii, M.V., Szhimayushchie otobrazheniya v invariantnykh preobrazovatelyakh i sistemakh steganografii. Monografiya (Contraction Mappings in Invariant Transformers and Steganography Systems: Monograph), Samara: Samarskii Nauchnyi Tsentr Ross. Akad. Nauk, 2014.

  9. Shakurskiy, M.V., A two-component steganographic system based on the sum of linear functions of two signals using a multiplicative form of constraint of embedded signals, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1153–1158. https://doi.org/10.3103/s0146411621080435

    Article  Google Scholar 

  10. Shakurskiy, M.V., Shakurskiy, V.K., and Volovach, V.I., Two-channel real-time steganographic system, Proc. IEEE East-West Design & Test Symp. (EWDTS 2014), Kiev, 2014, IEEE, 2014, pp. 309–311. https://doi.org/10.1109/ewdts.2014.7027074

  11. Shakurskiy, M.V., Kozlovskiy, V.N., Chekmarev, A.N., and Sanchugov, V.I., Invariant algorithm of information concealing for electrotechnical systems, IEEE Conf. of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg, 2020, 2020, pp. 363–365. https://doi.org/10.1109/EIConRus49466.2020.9039140

  12. Shakurskii, M.V. and Karaulova, O.A., Two-component steanographic system based on ratio of linear functions of two signals using an additive type of embedded signal communication, Infokommunikatsionnye Tekhnol., 2022, vol. 18, no. 1, pp. 118–124. https://doi.org/10.18469/ikt.2020.18.1.09

    Article  Google Scholar 

  13. Shakurskiy, M.V., A real-time two-component steganographic system for embedding information into sound signal, Probl. Inf. Bezop. Komp’uternye Sist., 2020, no. 2, pp. 40–45.

  14. Shakurskii, M.V., Properties of invariant two-component steganographic systems with additive algorithm of constraint of embedded signals, Vopr. Zashchity Inf., 2018, no. 4, pp. 3–9.

Download references

Funding

This work was supported by ongoing institutional funding. No additional grants to carry out or direct this particular research were obtained.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. V. Shakurskii.

Ethics declarations

The authors of this work declare that they have no conflicts of interest.

Additional information

Translated by S. Avodkova

Publisher’s Note.

Allerton Press remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shakurskii, M.V., Karaulova, O.A. & Kartashevskaya, E.S. Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction. Aut. Control Comp. Sci. 57, 862–867 (2023). https://doi.org/10.3103/S014641162308028X

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S014641162308028X

Keywords:

Navigation