Investigation of the influence of a template matrix on the embedding of information in an image

Authors

  • Dimitar Todorov Technical University of Varna, Department of Computer Science and Engineering, 9010, 1 Studentska Street, Varna, Bulgaria
  • Zheyno Zheynov Technical University of Varna, Department of Computer Science and Engineering, 9010, 1 Studentska Street, Varna, Bulgaria
  • Hristo Valchanov Technical University of Varna, Department of Computer Science and Engineering, 9010, 1 Studentska Street, Varna, Bulgaria
  • Milena Karova Technical University of Varna, Department of Computer Science and Engineering, 9010, 1 Studentska Street, Varna, Bulgaria
  • Ivaylo Plamenov Penev Технически университет - Варна

DOI:

https://doi.org/10.29114/ajtuv.vol5.iss2.234

Keywords:

steganography, template, matrix, message length

Abstract

Steganography is a modern approach to protect classified data against malicious attacks and misuse. Presented, accordingly, in this paper is a novel method for steganographic embedding of information. A template matrix is used for screening the original message embedded in an image. The efficiency of the steganographic embedding depends on the length of the message. The particular dependency is, therefore, the primary focus of the proposed work. The end results of the experiment were extremely satisfactory with the percentage of successfully retrieved messages being more than 90%, and the size of the processed images with embedded messages being fully acceptable and capable of being used in a communication environment.

Downloads

Download data is not yet available.

References

<p>Grebennikov, V. V. (2019). Steganography. History of cryptography, LitRes, (pp. 66-69). (in Russian)<br />&nbsp;<br />Gribunin, V. G., Kokov, I. N. &amp;Turintcev I.V. (2009). Digital stenography, Moscow: SOLON-PRESS. (in Russian)<br />&nbsp;<br />Fridrich, J. (2010). Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, ISBN 978- 0521190190<br /><a href="https://doi.org/10.1017/CBO9781139192903" target="_blank">Crossref</a><br />&nbsp;<br />Fridrich, J. (2004). Steganography II. In International Multimedia Conference: Proceedings of the 2004 workshop on Multimedia and security, 2004.<br />&nbsp;<br />Kruus, P., Scace, C., Heyman, M., &amp; Mundy, M. (2003). A survey of steganography techniques for image files. Advanced Security Research Journal. 5(1), 41-52.<br />&nbsp;<br />Kordov, K. &amp; Stoyanov, B. (2017). Least Significant Bit Steganography using Hitzl-Zele Chaotic Map. International Journal of Electronics and Telecommunications, 63(4), 417-422.<br /><a href="https://doi.org/10.1515/eletel-2017-0061" target="_blank">Crossref</a><br />&nbsp;<br />Rani, N. &amp; Chaudhary, J. (2013). Text Steganography Techniques: A Review. International Journal of Engineering Trends and Technology (IJETT),4(7).<br />&nbsp;<br />Neil, F. &amp; Johnson, S. J. (1998). George Mason University, "Exploring Steganography: Seeing the Unseen", IEEE Computers, 26-34.<br /><a href="https://doi.org/10.1109/MC.1998.4655281" target="_blank">Crossref</a><br />&nbsp;<br />Ross, J., &amp; Petitcolas, F.A.P. (1998). On the limits of steganography. IEEE Journal of Selected Areas in Communications, 16(4),474-481. May 1998. Special Issue on Copyright &amp; Privacy Protection. ISSN 0733-8716.<br /><a href="https://doi.org/10.1109/49.668971" target="_blank">Crossref</a><br />&nbsp;<br />Nain, S. &amp; Kumar, S. (2014) Steganography and Its Various Techniques. International Journal of Enhanced Research in Science Technology &amp; Engineering, 3(6),241-245. ISSN: 2319-7463<br />&nbsp;<br />Stanev, S. &amp; Szczypiorski, K. (2016). Steganography Training: A Case Study from University of Shumen in Bulgaria. International Journal of Electronics and Telecommunications, 62(3), 315-318.<br /><a href="https://doi.org/10.1515/eletel-2016-0043" target="_blank">Crossref</a><br />&nbsp;<br />Stanev, S., Zhelezov, S. &amp; Yakimov, I. (2012). An approach for parallel steganalysis based on data compression. In Proceedings of Jubilee International Congress, 40, 360-367.<br />&nbsp;<br />Stoyanov, B. P., Zhelezov, S. K. &amp; Kordov, K. M. (2016). Least significant bit image steganography algorithm based on chaotic rotation equations. Comptes rendus de l'Academie bulgare des Sciences, 69(7), 845-850.<br />&nbsp;<br />Lokhande, U. (2014). An Effective Way of using LSB Steganography in images along with Cryptography. International Journal of Computer Applications, 88(12)<br /><a href="https://doi.org/10.5120/15406-3902" target="_blank">Crossref</a><br />&nbsp;<br />Zhelezov, S. (2016). Modified Algorithm for Steganalysis. Mathematical and Software Engineering, 1(2), 31-36.<br />&nbsp;<br />Zhelezov, S. &amp; Paraskevov, H. (2015). Possibilities for steganographic parallel processing with a cluster system. Contemporary Engineering Sciences, 8(20).<br /><a href="https://doi.org/10.12988/ces.2015.58230" target="_blank">Crossref</a></p>

Downloads

Published

2021-12-31

How to Cite

Todorov, D., Zheynov, Z., Valchanov, H., Karova, M., & Penev, I. P. (2021). Investigation of the influence of a template matrix on the embedding of information in an image. ANNUAL JOURNAL OF TECHNICAL UNIVERSITY OF VARNA, BULGARIA, 5(2), 140–145. https://doi.org/10.29114/ajtuv.vol5.iss2.234

Issue

Section

INFORMATION TECHNOLOGIES, COMMUNICATION AND COMPUTER EQUIPMENT

Similar Articles

You may also start an advanced similarity search for this article.