| Русский Русский | English English |
   
Главная
20 | 12 | 2024
10.14489/vkit.2021.06.pp.012-018

DOI: 10.14489/vkit.2021.06.pp.012-018

Варюхин В. А., Левина А. Б.
МЕТОД СТЕГАНОГРАФИЧЕСКОГО ВСТРАИВАНИЯ ИНФОРМАЦИИ НА ОСНОВЕ НЕПРЕРЫВНОГО ВЕЙВЛЕТ-ПРЕОБРАЗОВАНИЯ
(с. 12-18)

Аннотация. Рассмотрено непрерывное вейвлет-преобразование как метод стеганографического встраивания конфиденциальной информации в изображение. Главная цель стеганографии – скрыть информацию таким образом, чтобы возможность обнаружения данных была минимальна. Это делается путем сокрытия сообщения внутри контейнера на основе принципа незаметности. Методы стеганографии делятся на две группы: пространственные (визуально ухудшают качество изображения за счет непосредственного изменения компонент) и частотные (взаимодействуют с частотными характеристиками, что значительно лучше сказывается на качестве преобразованного изображения). Сейчас все чаще на смену распространенного частотного метода – дискретно-косинусного преобразования – приходит вейвлет-преобразование. Такой метод встраивания конфиденциальной информации визуально менее заметен для человеческого зрения. Представлены характеристики преобразования Хаара, а также изображения, демонстрирующие принцип работы вейвлет-преобразования. Разработан алгоритм стеганографии на основе вейвлет-преобразования, реализованный в среде Matlab. Представлен анализ полученных результатов на примере тестового изображения. Описаны достоинства данного метода.

Ключевые слова:  вейвлет; стеганография; изображение; алгоритм; вейвлет Хаара; фильтр низких частот; фильтр высоких частот; коэффициенты аппроксимации.

 

Variukhin V. А., Levina A. В.
METHOD FOR STEGANOGRAPHIC HIDE OF INFORMATION BASED ON CONTINUOUS WAVELET TRANSFORM
(pp. 12-18)

Abstract. This article discusses continuous wavelet transform as a method of steganographic embedding of confidential information into an image. The main purpose of steganography is to hide information so that the possibility of data detection is minimized. This is done by hiding the message inside the container so that outsiders are not aware of the secret’s existence. Thus, the main principle of steganography is the principle of invisibility, which is also the basis of security when using these systems to transfer information. Steganography methods are divided into two large groups: spatial and frequency. The former visually degrade the image quality by directly changing the components (pixels). The latter interact with frequency characteristics, which has the best effect on the quality of the converted image. At this point in time, one of the most common frequency methods (discrete-cosine transform) is increasingly being replaced by a wavelet transform. This method of embedding confidential information is visually less noticeable to human vision, relative to those existing at a given time.The paper presents brief theoretical information on the wavelet transform, gives the characteristics of the Haar transform, presents images demonstrating the principle of the wavelet transform. The developed algorithm for steganography based on the wavelet transform is shown. The algorithm was implemented in the Matlab environment, as well as the analysis of the results obtained using the example of a test image. Conclusions, advantages of this method, as well as recommendations for further research in this area are given.

Keywords: Wavelet; Steganography; Image; Algorithm; Haar wavelet; Low passfilter; High passfilter; Approximation coefficients.

Рус

В. А. Варюхин (Национальный исследовательский университет ИТМО, Санкт-Петербург, Россия)
А. Б. Левина (Санкт-Петербургский государственный электротехнический университет «ЛЭТИ» им. В.И. Ульянова, Санкт-Петербург, Россия) E-mail: Этот e-mail адрес защищен от спам-ботов, для его просмотра у Вас должен быть включен Javascript

 

Eng

V. А. Variukhin (ITMO University, St. Petersburg, Russia)
A. В. Levina (Saint Petersburg Electrotechnical University "LETI", St. Petersburg, Russia) E-mail: Этот e-mail адрес защищен от спам-ботов, для его просмотра у Вас должен быть включен Javascript

Рус

1. Wu N., Hwang M. S. Data Hiding: Current Status and Key Issues // Int. J. Network Secur. 2009. V. 4, No. 1. P. 1 – 9.
2. Digital Image Steganography: Survey and Analysis of Current Methods / A. Cheddad et al. // Sig. Process. 2010. V. 90, No. 3. P. 727 – 752.
3. Akansu A., Haddad R. Wavelet Transform // Multiresolution Signal Decomposition. Academic Press, 2001. P. 391 – 442.
4. Mallat S. Wavelet Bases. A Wavelet Tour of Signal Processing (Third Edition). Academic Press, 2009. P. 263 – 376.
5. Naoki S. Frequently Asked Questions on Wavelets [Электронный ресурс]. University of California. 2004. URL: https://www.math.ucdavis.edu/~saito/courses/ACHA.suppl/wavelet_faq.pdf (дата обращения: 19.05.2021).
6. Nicolaou A. A Wavelet Wading Pool [Электронный ресурс]. Cornell University. 1996. URL: http://www.cgl.uwaterloo.ca/~anicolao/wadingpool/WaveletWadingPool.html (дата обращения: 19.05.2021).
7. Levina A., Taranov S. Creation of Codes Based on Wavelet Transformation and its Application in ADV612 Chips [Электронный ресурс] // International Journal of Wavelets, Multiresolution and Information Processing. 2016. № 15. URL: https://www.researchgate.net/publication/311446869_Creation_of_Codes_Based_on_Wavelet_Transformation_and_its_Application_in_ADV612_Chips (дата обращения: 19.05.2021).
8. Levina A., Taranov S. Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and its Application [Электронный ресурс] // International Conference on Codes, Cryptology, and Information Security. 2015. № 9084. C. 247 – 258. URL: https://www.researchgate.net/publication/283882 996_Algorithms_of_Constructing_Linear_and_Robust_Codes_Based_on_Wavelet_Decomposition_and_its_Application (дата обращения: 19.05.2021).
9. Levina A., Taranov S. Construction of Linear and Robust Codes that is Based on the Scaling Function Coefficients of Wavelet Transforms [Электронный ресурс] // Journal of Applied and Industrial Mathematics. 2015. № 9. C. 540 – 546. URL: https://link.springer.com/article/10.1134/S1990478915040109 (дата обращения: 19.05.2021).
10. Levina A., Taranov S. New Construction of Algebraic manipulation Detection Codes Based on Wavelet Transform // Proceedings of the 18th Conference of Open Innovations Association FRUCT. 18–22 April, St. Petersburg, Russia. 2016. C. 187 – 192.
11. Ghasemi E., Jamshid S., Fassihi N. High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm [Электронный ресурс] // Lecture Notes in Electrical Engineering. Hong Kong, 2011. C. 1 – 4. URL: http://www.iaeng.org/publication/IMECS 2011/IMECS2011_pp495-498.pdf (дата обращения: 19.05.2021)
12. Murugan G., Uthandipalayam R. Performance Analysis of Image Steganography using Wavelet Transform for Safe and Secured Transaction // Multimedia Tools and Applications. 2020. № 79. C. 9101 – 9115.
13. Hemalatha S., Acharya D., Renuka A. Wave-let Transform Based Steganography Technique to Hide Audio Signals in Image // Procedia Computer Science. 2015. № 47. C. 272 – 281.
14. Pramanik S., Bandyopadhyay S. Image Steganography Using Wavelet Transform And Genetic Algorithm // International Journal of Innovative Research in Advanced Engineering. 2014. V. 1, № 1. C. 1 – 4.
15. Avinash K., Madhuri S. An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform Using Pixel Value Differencing Approach [Электронный ресурс] // Mathematical Problems in Engineering. 2015. № 2. C. 1 – 11. URL: https://www.researchgate.net/publication/276374055_An_Image_Steganography_Method_Hiding_Secret_Data_into_Coefficients_of_Integer_Wavelet_Transform_Using_Pixel_Value_Differencing_Approach (дата обращения: 19.05.2021).
16. Han-Yang L., Sanjeev T., Joyce W. Wavelet Based Steganography and Watermarking [Электронный ресурс]. Ithaca: Cornell University, 1998. 4 с. URL: https://www.cs.cornell.edu/topiwala/wavelets/report.html (дата обращения: 19.05.2021).

Eng

1. Wu N., Hwang M. S. (2009). Data Hiding: Current Status and Key Issues. International Journal of Security and Networks, Vol. 4, (1), pp. 1 – 9.
2. Cheddad A. et al. (2010). Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing, Vol. 90, (3), pp. 727 – 752.
3. Akansu A., Haddad R. (2001). Wavelet Transform. Multiresolution Signal Decomposition, pp. 391 – 442. Academic Press.
4. Mallat S. (2009). Wavelet Bases. A Wavelet Tour of Signal Processing (Third Edition), pp. 263 – 376. Academic Press.
5. Naoki S. (2004). Frequently Asked Questions on Wavelets. University of California. Available at: https://www.math.ucdavis.edu/~saito/courses/ACHA.suppl/wavelet_faq.pdf (Accessed: 19.05.2021).
6. Nicolaou A. (1996). A Wavelet Wading Pool. Cornell University. Available at: http://www.cgl.uwater loo.ca/~anicolao/wadingpool/WaveletWadingPool.html (Accessed: 19.05.2021).
7. Levina A., Taranov S. (2016). Creation of Codes Based on Wavelet Transformation and its Application in ADV612 Chips. International Journal of Wavelets, Multiresolution and Information Processing, 15. Available at: https://www.researchgate.net/publication/ 311446869_Creation_of_Codes_Based_on_Wavelet_Transformation_and_its_Application_in_ADV612_Chips (Accessed: 19.05.2021).
8. Levina A., Taranov S. (2015). Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and its Application. International Conference on Codes, Cryptology, and Information Security, 9084, pp. 247 – 258. Available at: https://www.research gate.net/publication/283882996_Algorithms_of_Constructing_Linear_and_Robust_Codes_Based_on_Wavelet_Decomposition_and_its_Application (Accessed: 19.05.2021).
9. Levina A., Taranov S. (2015). Construction of Linear and Robust Codes that is Based on the Scaling Function Coefficients of Wavelet Transforms. Journal ofApplied and Industrial Mathematics, (9), pp. 540 – 546. Available at: https://link.springer.com/article/ 10.1134/S1990478915040109 (Accessed: 19.05.2021).
10. Levina A., Taranov S. (2016). New Construction of Algebraic manipulation Detection Codes Based on Wavelet Transform. Proceedings of the 18th Conference of Open Innovations Association FRUCT, pp. 187 – 192. Saint Petersburg.
11. Ghasemi E., Jamshid S., Fassihi N. (2011). High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm. Lecture Notes in Electrical Engineering, pp. 1 – 4. Hong Kong. Available at: http://www.iaeng.org/publication/IMECS2011/IMECS2011_pp495-498.pdf (Accessed: 19.05.2021)
12. Murugan G., Uthandipalayam R. (2020). Performance Analysis of Image Steganography using Wavelet Transform for Safe and Secured Transaction. Multimedia Tools and Applications, 79, pp. 9101 – 9115.
13. Hemalatha S., Acharya D., Renuka A. (2015). Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image. Procedia Computer Science, 47, pp. 272 – 281.
14. Pramanik S., Bandyopadhyay S. (2014). Image Steganography Using Wavelet Transform And Genetic Algorithm. International Journal of Innovative Research in Advanced Engineering, Vol. 1, (1), pp. 1 – 4.
15. Avinash K., Madhuri S. (2015). An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform Using Pixel Value Differencing Approach. Mathematical Problems in Engineering, (2), pp. 1 – 11. Available at: https://www.researchgate.net/publication/276374055_An_Image_Steganography_Method_Hiding_Secret_Data_into_Coefficients_of_Integer_Wavelet_Transform_Using_Pixel_Value_Differencing_Approach (Accessed: 19.05.2021).
16. Han-Yang L., Sanjeev T., Joyce W. (1998). Wavelet Based Steganography and Watermarking. Ithaca: Cornell University. Available at: https://www.cs. cor-nell.edu/topiwala/wavelets/report.html (Accessed: 19.05.2021).

Рус

Статью можно приобрести в электронном виде (PDF формат).

Стоимость статьи 450 руб. (в том числе НДС 18%). После оформления заказа, в течение нескольких дней, на указанный вами e-mail придут счет и квитанция для оплаты в банке.

После поступления денег на счет издательства, вам будет выслан электронный вариант статьи.

Для заказа скопируйте doi статьи:

10.14489/vkit.2021.06.pp.012-018

и заполните  форму 

Отправляя форму вы даете согласие на обработку персональных данных.

.

 

Eng

This article  is available in electronic format (PDF).

The cost of a single article is 450 rubles. (including VAT 18%). After you place an order within a few days, you will receive following documents to your specified e-mail: account on payment and receipt to pay in the bank.

After depositing your payment on our bank account we send you file of the article by e-mail.

To order articles please copy the article doi:

10.14489/vkit.2021.06.pp.012-018

and fill out the  form  

 

.

 

 

 
Rambler's Top100 Яндекс цитирования