Сurrent state and prospects of steganography development in telecommunication systems

Authors

  • Ivan Samborskyi Institute of special communication and information security of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0001-5579-8740
  • Anastasiia Tolstova Institute of special communication and information security of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0001-6411-9498

DOI:

https://doi.org/10.20535/2411-1031.2022.10.1.261079

Keywords:

electromagnetic steganography, stego, container, telecommunications

Abstract

At present, it is necessary to ensure stable, continuous and hidden transmission of information, so it is advisable to consider the hiding of the very fact of the transmission of the message. Thus, the risk of access to information with limited access is significantly reduced. Along with this, additional messages can be encrypted. Thus, steganography is a science that provides information exchange in such a way that the very fact of the existence of a confidential message is hidden. It complements cryptography (data encryption) with another level of security rather than replacing it. To date, the use of steganography involves a number of methods for protecting information resources. It is divided into linguistic and technical. In turn, linguistic steganography is divided into: semagrams, open codes and closed ciphers. Technical steganography is divided into stego-text, stego-audio, stego-video and stego-image. For this purpose, such message carriers as images, text, audio or video are used. The media message and message (information) that needs to be hidden is broken down into bits, and these bits of information are hidden in each bit (in bits) of the media message. The information is encrypted by changing the different properties of the message carrier. Technical steganography uses special methods of signal protection, which it is advisable to implement in promising departmental means of digital communication. One of the ways to increase the hidden fact of the transmission of digital message by steganographic methods is the use of streamlined electromagnetic steganography. This concept involves the transmission of a low-power digital signal simultaneously with the radiation of a significantly more powerful legitimate source. Such a source, for example, can be a digital broadcasting transmitter. The hiding message transmission algorithm consists of three main stages: 1) the formation of electromagnetic radiation containing a hidden message 2) the additive linear addition of electromagnetic radiation containing a hidden message and stream electromagnetic container in space, 3) the demodulation of the total signal, followed by the release of the hidden message. Electromagnetic steganography, as an independent branch in the general theory of stego, with the creation of the theory of multiplayer detection has the prospects of qualitatively new development. The approaches of this theory allow to mask the hidden message not by reducing the spectral power density due to the use of broadband signals, but by ensuring the possibility of concealment of the ocular spectrum of the hidden message emitter under the ambient energy spectrum of radiation.

Author Biographies

Ivan Samborskyi, Institute of special communication and information security of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

candidate of engineering sciences, senior researcher, associate professor of special telecommunication systems academic department

Anastasiia Tolstova, Institute of special communication and information security of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

postgraduate student

References

N. Johnson, and S. Jajodia, “Exploring steganography: seeing the unseen”, IEEE Computer, vol. 31, no. 2, pp. 26-34, February 1998, doi: https://doi.org/10.1109/MC.1998.4655281.

A. Saleema, and T. Amarunnishad, “A new steganography algorithm using hybrid fuzzy neural networks”, in Proc. International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST-2015), vol. 24, Trissur (India), 2016, pp. 1566-1574, doi: https://doi.org/10.1016/j.protcy.2016.05.139.

S. A. Alhaj, A. M. Shaheen, and T. M. Al-Kharoubi, “Multi-layers Video Steganography: A Novel Technique for Image Hiding”, Transactions on Networks and Communications vol. 4, no. 6, pp. 43-52, 2016, doi: http://dx.doi.org/10.14738/tnc.46.2529.

A. Solichin, and Painem, “Motion-based less significant frame for improving lsb-based video steganography”, in Proc. IEEE International Seminar on Application for Technology of Information and Communication (ISemantic), Semarang, Indonesia, 2016, pp. 179-183, doi: http://dx.doi.org/10.1109/isemantic.2016.7873834.

K. Rezagholipour, and M. Eshghi, “Video steganography algorithm based on motion vector of moving object”, in Proc. IEEE 2016 Eighth International Conference on Information and Knowledge Technology (IKT), Hamedan, Iran, 2016, pp. 183-187, doi: http://dx.doi.org/10.1109/ikt.2016.7777764.

A. Putu, and M. Gusti, “MP4 video steganography using least significant bit (LSB) substitution and advanced encryption standard (AES)”, Journal of Theoretical and Applied Information Technology, vol. 95, no. 21, pp. 5805-5813, November 2017.

S. Mumthas, and A. Lijiya, “Transform domain video steganography using RSA, random DNA encryption and Huffman Encoding”, in Proc. 7th International Conference on Advances in Computing and Communications, vol. 115, pp. 660-666, 2017, doi: http://dx.doi.org/10.1016/j.procs.2017.09.152.

O. F. Abdel Wahab, A. I. Hussein, H. F. Hamed, H. M. Kelash, A. A. Khalaf, and H. M. Ali, “Hiding data in images using steganography techniques with compression algorithms”, TELKOMNIKA (Telecommunication Computing Electronics and Control), vol 17, no. 3, pp. 1168-1175, 2019, doi: http://dx.doi.org/10.12928/telkomnika.v17i3.12230.

G. Swain, “Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution”, Arabian Journal for Science and Engineering, vol. 44, no. 4, pp. 2995-3004, 2018, doi: http://dx.doi.org/10.1007/s13369-018-3372-2.

S. P. Rajput, K. P. Adhiya, and G. K. Patnaik, “An Efficient Audio Steganography Technique to Hide Text in Audio”, in Proc. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 2017, pp. 122-137, doi: http://dx.doi.org/10.1109/iccubea.2017.8463948.

F. Y. Shih, Image Processing and Pattern Recognition: fundamentals and Techniques. Hoboken, New Jersey, USA: John Wiley & Sons, 2010.

M. Zelkowitz, Security on the Web. Cambridge, Massachusetts, USA: Academic Press, 2011.

S. Bhattacharyya, and G. Sanyal, “A Robust Image Steganography using DWT Difference Modulation (DWTDM)”, International Journal of Computer network & Information Security, vol. 4, no. 7, pp. 27-40, 2012, doi: http://dx.doi.org/10.5815/ijcnis.2012.07.04.

N. Johnson, and S. Jajodia, “Exploring steganography: seeing the unseen”, Computer, vol. 31, no. 2, pp. 26-34, 1998, doi: http://dx.doi.org/10.1109/mc.1998.4655281.

M. Hussain, A. W. Abdul Wahab, A. T. S. Ho, and Ki-H. Jung, “A Survey of Image Steganography Technique”, Signal Processing: Image Communication, vol. 65, pp. 46-66, 2018, doi: http://dx.doi.org/10.1016/j.image.2018.03.012.

S. V. Sharma, M. Raj, and S. Swathi, “A Survey of Text Steganography Methods”, International Journal of Scientific Research in Science and Technology, 2021, pp. 238-241, doi: https://doi.org/10.32628/IJSRST.

A. Nag, S. Biswas, and P. P. Sarkar, “A Novel Technique for Image Steganography Based on DWT and Huffman Encoding”, International Journal of Computer Science and Information Technology, vol. 2, no. 3, pp. 103-112, 2010, doi: http://dx.doi.org/10.5121/ijcsit.2010.2308.

D. Bhattacharyya, T. Kim, and P. Dutta, “A method of data hiding in audio signal”, Journal of the Chinese Institute of Engineers, vol. 35, no. 5, pp. 523-528, 2012, doi: http://dx.doi.org/10.1080/02533839.2012.679054.

H. B. Kekre, A. Athawale, and S. Rao, “Athawale U. Information Hiding in Audio Signals”, International Journal of Computer Application, vol. 7, no. 9, pp. 14-19, 2010, doi: http://dx.doi.org/10.5120/1278-1623.

D. N. Hmood, K. A. Khudhiar, and M. S. Altaei, “A New Steganographic Method for Embedded Image In Audio File”, International Journal of Computer Science and Security, vol. 6, no. 2, pp.135-141, 2015.

H. B. Kekre, and A. Athawale, “Information Hiding In Audio Signal”, International Journal of Computer Application, vol. 7, no. 9, pp. 14-19, 2010, doi: http://dx.doi.org/10.5120/1278-1623.

V. F. Yerokhin, and A. V. Tolstova, “Algorithm for coherent-incoherent separation of homochronous signals of binary relative phase manipulation”, in Proc. of the scientific-practical conference Information and telecommunication systems and technologies and cybersecurity: new challenges, new tasks, Kyiv, 2021, pp. 167-168.

Published

2022-06-30

How to Cite

Samborskyi, I., & Tolstova, A. (2022). Сurrent state and prospects of steganography development in telecommunication systems. Collection "Information Technology and Security", 10(1), 27–38. https://doi.org/10.20535/2411-1031.2022.10.1.261079

Issue

Section

CRYPTOLOGY