350 rub
Journal Science Intensive Technologies №8 for 2013 г.
Article in number:
Method of steganography image transformation on the basis of spatial desynchronization
Authors:
S.E. Zelenkin
Abstract:
The carried out analysis of the existing systems of an information transfer and the used organization of the latent channels steganographic methods proved that there are no uniform approaches and decisions to the construction of steganographic systems. Enough considerable quantity of steganalysis means is developed, allowing to find out, pick out, delete or destroy the latent information. The offered method allows to resist constantly improved means universal steganalysis. The great value for the reliability of the system as a whole is the correct coordination of all components of the system at the set limitations. Otherwise any sophisticated steganographic method can be easily found out.
Pages: 54-57
References

  1. Fridrich J. Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes // Lecture Notes in Computer Science (LNCS). 2005. V. 3200. Р. 67 - 81.
  2. Cachin C. An information-theoretic Model for Steganography // LNCS. 1998. V. 1525. Р. 305 - 318.
  3. Korzhik V., Imai H., Shikata J., Morales Luna G., Gerling E. On the Use of Bhattacharya Distance as a Measure of the Detetability of Steganographic System // LNCS. 2008. V. 4920. Р. 23 - 32.
  4. Solanki K., Sarkar A., and Manjunath B. S. YASS: yet another steganographic scheme that resists blind steganalysis // 9th International Workshop on Information Hiding, Jun 2007.
  5. Зеленкин С. Е. Модель робастной стеганографической системы // Наукоёмкие технологии. 2010. Т 11. № 9. С. 84 - 86.