This email address is being protected from spambots. You need JavaScript enabled to view it.
 
+7 (4912) 72-03-73
 
Интернет-портал РГРТУ: https://rsreu.ru

UDC 004.8

EFFICIENCY DETERMINING FOR THE CONTAINERLESS DATA HIDING METHOD AGAINST THE MODERN METHODS OF STEGANALYSIS

I. V. Rudakov, Ph.D. (Tech.), BMSTU, Moscow, Russia; e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

M. V. Filippov, Ph.D. (Tech.), BMSTU, Moscow, Russia; e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

M. A. Kudryavtsev, post-graduate student, BMSTU, Moscow, Russia;

orcid.org/0000-0001-7034-8270, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

D. Yu. Pudov, Master's student, BMSTU, Moscow, Russia;

orcid.org/0000-0003-0980-1317, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

Article consider the problem of detecting data hidden by the steganographic method developed by the authors. The aim of the article is to review the current methods and tools destined for discovering hidden messages in images, their applicability to assess the reliability of the method developed by the authors. Determine the possibility of detecting the transmission of hidden information and the possibility of extracting hidden data. The article discusses steganalysis methods for algorithms based on first-order statistics, which effectively detect distortions due to data embedding in a spatial domain. Authors conside the methods based on differences in statistics, which allow to detect changes in the frequency domain, as well as methods based on blind classifiers that can detect the fact of hiding data by most known steganographic methods, as well as determine the lengths of hidden data. Finally authors consider methods for assessing the naturalness of images and applying all discussed steganalysis methods for proposed method. At the end authors give recommendations for the further improvement of thir method.

Key words: steganography, container, first-order statistics, blind classifiers, neural networks, stegoanalysis, secret message, data hiding.

 Download