Сurrent state and prospects of steganography development in telecommunication systems
DOI:
https://doi.org/10.20535/2411-1031.2022.10.1.261079Keywords:
electromagnetic steganography, stego, container, telecommunicationsAbstract
At present, it is necessary to ensure stable, continuous and hidden transmission of information, so it is advisable to consider the hiding of the very fact of the transmission of the message. Thus, the risk of access to information with limited access is significantly reduced. Along with this, additional messages can be encrypted. Thus, steganography is a science that provides information exchange in such a way that the very fact of the existence of a confidential message is hidden. It complements cryptography (data encryption) with another level of security rather than replacing it. To date, the use of steganography involves a number of methods for protecting information resources. It is divided into linguistic and technical. In turn, linguistic steganography is divided into: semagrams, open codes and closed ciphers. Technical steganography is divided into stego-text, stego-audio, stego-video and stego-image. For this purpose, such message carriers as images, text, audio or video are used. The media message and message (information) that needs to be hidden is broken down into bits, and these bits of information are hidden in each bit (in bits) of the media message. The information is encrypted by changing the different properties of the message carrier. Technical steganography uses special methods of signal protection, which it is advisable to implement in promising departmental means of digital communication. One of the ways to increase the hidden fact of the transmission of digital message by steganographic methods is the use of streamlined electromagnetic steganography. This concept involves the transmission of a low-power digital signal simultaneously with the radiation of a significantly more powerful legitimate source. Such a source, for example, can be a digital broadcasting transmitter. The hiding message transmission algorithm consists of three main stages: 1) the formation of electromagnetic radiation containing a hidden message 2) the additive linear addition of electromagnetic radiation containing a hidden message and stream electromagnetic container in space, 3) the demodulation of the total signal, followed by the release of the hidden message. Electromagnetic steganography, as an independent branch in the general theory of stego, with the creation of the theory of multiplayer detection has the prospects of qualitatively new development. The approaches of this theory allow to mask the hidden message not by reducing the spectral power density due to the use of broadband signals, but by ensuring the possibility of concealment of the ocular spectrum of the hidden message emitter under the ambient energy spectrum of radiation.
References
N. Johnson, and S. Jajodia, “Exploring steganography: seeing the unseen”, IEEE Computer, vol. 31, no. 2, pp. 26-34, February 1998, doi: https://doi.org/10.1109/MC.1998.4655281.
A. Saleema, and T. Amarunnishad, “A new steganography algorithm using hybrid fuzzy neural networks”, in Proc. International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST-2015), vol. 24, Trissur (India), 2016, pp. 1566-1574, doi: https://doi.org/10.1016/j.protcy.2016.05.139.
S. A. Alhaj, A. M. Shaheen, and T. M. Al-Kharoubi, “Multi-layers Video Steganography: A Novel Technique for Image Hiding”, Transactions on Networks and Communications vol. 4, no. 6, pp. 43-52, 2016, doi: http://dx.doi.org/10.14738/tnc.46.2529.
A. Solichin, and Painem, “Motion-based less significant frame for improving lsb-based video steganography”, in Proc. IEEE International Seminar on Application for Technology of Information and Communication (ISemantic), Semarang, Indonesia, 2016, pp. 179-183, doi: http://dx.doi.org/10.1109/isemantic.2016.7873834.
K. Rezagholipour, and M. Eshghi, “Video steganography algorithm based on motion vector of moving object”, in Proc. IEEE 2016 Eighth International Conference on Information and Knowledge Technology (IKT), Hamedan, Iran, 2016, pp. 183-187, doi: http://dx.doi.org/10.1109/ikt.2016.7777764.
A. Putu, and M. Gusti, “MP4 video steganography using least significant bit (LSB) substitution and advanced encryption standard (AES)”, Journal of Theoretical and Applied Information Technology, vol. 95, no. 21, pp. 5805-5813, November 2017.
S. Mumthas, and A. Lijiya, “Transform domain video steganography using RSA, random DNA encryption and Huffman Encoding”, in Proc. 7th International Conference on Advances in Computing and Communications, vol. 115, pp. 660-666, 2017, doi: http://dx.doi.org/10.1016/j.procs.2017.09.152.
O. F. Abdel Wahab, A. I. Hussein, H. F. Hamed, H. M. Kelash, A. A. Khalaf, and H. M. Ali, “Hiding data in images using steganography techniques with compression algorithms”, TELKOMNIKA (Telecommunication Computing Electronics and Control), vol 17, no. 3, pp. 1168-1175, 2019, doi: http://dx.doi.org/10.12928/telkomnika.v17i3.12230.
G. Swain, “Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution”, Arabian Journal for Science and Engineering, vol. 44, no. 4, pp. 2995-3004, 2018, doi: http://dx.doi.org/10.1007/s13369-018-3372-2.
S. P. Rajput, K. P. Adhiya, and G. K. Patnaik, “An Efficient Audio Steganography Technique to Hide Text in Audio”, in Proc. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 2017, pp. 122-137, doi: http://dx.doi.org/10.1109/iccubea.2017.8463948.
F. Y. Shih, Image Processing and Pattern Recognition: fundamentals and Techniques. Hoboken, New Jersey, USA: John Wiley & Sons, 2010.
M. Zelkowitz, Security on the Web. Cambridge, Massachusetts, USA: Academic Press, 2011.
S. Bhattacharyya, and G. Sanyal, “A Robust Image Steganography using DWT Difference Modulation (DWTDM)”, International Journal of Computer network & Information Security, vol. 4, no. 7, pp. 27-40, 2012, doi: http://dx.doi.org/10.5815/ijcnis.2012.07.04.
N. Johnson, and S. Jajodia, “Exploring steganography: seeing the unseen”, Computer, vol. 31, no. 2, pp. 26-34, 1998, doi: http://dx.doi.org/10.1109/mc.1998.4655281.
M. Hussain, A. W. Abdul Wahab, A. T. S. Ho, and Ki-H. Jung, “A Survey of Image Steganography Technique”, Signal Processing: Image Communication, vol. 65, pp. 46-66, 2018, doi: http://dx.doi.org/10.1016/j.image.2018.03.012.
S. V. Sharma, M. Raj, and S. Swathi, “A Survey of Text Steganography Methods”, International Journal of Scientific Research in Science and Technology, 2021, pp. 238-241, doi: https://doi.org/10.32628/IJSRST.
A. Nag, S. Biswas, and P. P. Sarkar, “A Novel Technique for Image Steganography Based on DWT and Huffman Encoding”, International Journal of Computer Science and Information Technology, vol. 2, no. 3, pp. 103-112, 2010, doi: http://dx.doi.org/10.5121/ijcsit.2010.2308.
D. Bhattacharyya, T. Kim, and P. Dutta, “A method of data hiding in audio signal”, Journal of the Chinese Institute of Engineers, vol. 35, no. 5, pp. 523-528, 2012, doi: http://dx.doi.org/10.1080/02533839.2012.679054.
H. B. Kekre, A. Athawale, and S. Rao, “Athawale U. Information Hiding in Audio Signals”, International Journal of Computer Application, vol. 7, no. 9, pp. 14-19, 2010, doi: http://dx.doi.org/10.5120/1278-1623.
D. N. Hmood, K. A. Khudhiar, and M. S. Altaei, “A New Steganographic Method for Embedded Image In Audio File”, International Journal of Computer Science and Security, vol. 6, no. 2, pp.135-141, 2015.
H. B. Kekre, and A. Athawale, “Information Hiding In Audio Signal”, International Journal of Computer Application, vol. 7, no. 9, pp. 14-19, 2010, doi: http://dx.doi.org/10.5120/1278-1623.
V. F. Yerokhin, and A. V. Tolstova, “Algorithm for coherent-incoherent separation of homochronous signals of binary relative phase manipulation”, in Proc. of the scientific-practical conference Information and telecommunication systems and technologies and cybersecurity: new challenges, new tasks, Kyiv, 2021, pp. 167-168.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Collection "Information Technology and Security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).