ÐзобÑеÑение оÑноÑиÑÑÑ Ðº ÑÐµÑ Ð½Ð¸ÐºÐµ ÑайнопиÑи и пÑедназнаÑено Ð´Ð»Ñ Ð¾ÑганизаÑии ÑкÑÑÑого Ñ ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð¸ пеÑедаÑи конÑиденÑиалÑной инÑоÑмаÑии по оÑкÑÑÑÑм каналам ÑвÑзи, Ñакже Ð¼Ð¾Ð¶ÐµÑ Ð¸ÑполÑзоваÑÑÑÑ Ð´Ð»Ñ Ð¼Ð°ÑкиÑовки изобÑажений, ÑодеÑжаÑÐ¸Ñ Ð±Ð¾Ð»ÑÑие обÑÐµÐ¼Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑной инÑоÑмаÑии.The invention relates to cryptographic techniques and is intended for the organization of hidden storage and transmission of confidential information through open communication channels, can also be used for marking images containing large amounts of additional information.
ÐзвеÑÑÐ½Ñ ÑпоÑÐ¾Ð±Ñ ÑÑеганогÑаÑиÑеÑкой заÑиÑÑ Ð¸Ð½ÑоÑмаÑии, оÑнованнÑе на внедÑении дополниÑелÑной инÑоÑмаÑии в ÑаÑÑÑовÑе изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð¿ÑÑем Ð·Ð°Ð¼ÐµÐ½Ñ Ð¼Ð»Ð°Ð´ÑÐ¸Ñ Ð·Ð½Ð°ÑаÑÐ¸Ñ Ð±Ð¸Ñов в байÑÐ°Ñ ÑвеÑового пÑедÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¸ÑÑ Ð¾Ð´Ð½Ð¾Ð³Ð¾ изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð±Ð¸Ñами добавлÑемой инÑоÑмаÑии [Bender W., Gruhl D., Morimoto N., Lu A., Techniques for data hiding, IBM systems journal, VOL 35, NOS 3&4, 1996. RU 2002135272, 10.07.2004].Known methods for steganographic protection of information based on the introduction of additional information in raster images by replacing the least significant bits in bytes of the color representation of the original image with bits of added information [Bender W., Gruhl D., Morimoto N., Lu A., Techniques for data hiding, IBM systems journal, VOL 35, NOS 3 & 4, 1996. RU 2002135272, 07/10/2004].
ÐÑновнÑм недоÑÑаÑком ÑÐ°ÐºÐ¸Ñ ÑпоÑобов ÑвлÑеÑÑÑ Ð½ÐµÐ²ÑÑÐ¾ÐºÐ°Ñ ÑÑÑекÑивноÑÑÑ Ð¾Ð±ÐµÑпеÑÐµÐ½Ð¸Ñ Ð·Ð°ÑиÑÑ Ð¸Ð½ÑоÑмаÑии, Ñак как вноÑимÑе ими в пÑоÑеÑÑе внедÑÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑии Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¿ÑиводÑÑ Ðº иÑÐºÐ°Ð¶ÐµÐ½Ð¸Ñ ÑÑда ÑÑаÑиÑÑиÑеÑÐºÐ¸Ñ Ð¿Ð°ÑамеÑÑов обÑабаÑÑваемÑÑ Ð¸Ð·Ð¾Ð±Ñажений, ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжено меÑодами ÑÑаÑиÑÑиÑеÑкого анализа [Andreas W., Andreas P., Attacks on Steganographic Systems. Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools - and Some Lessons Learned, Proceedings of the Workshop on Information Hiding, 1999]. Ðа наÑÑоÑÑий Ð¼Ð¾Ð¼ÐµÐ½Ñ ÑÑÑекÑивно пÑименÑÑÑÑÑ Ñакие меÑÐ¾Ð´Ñ Ð°Ð½Ð°Ð»Ð¸Ð·Ð°, как визÑалÑнÑй ÑÑегоанализ, анализ длин ÑеÑий, анализ ÑиÑла пеÑÐµÑ Ð¾Ð´Ð¾Ð², оÑенка ÑнÑÑопии, анализ гиÑÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° оÑнове кÑиÑеÑÐ¸Ñ Ï2.The main disadvantage of such methods is the low efficiency of information protection, since the changes introduced by them during the implementation of information lead to a distortion of a number of statistical parameters of processed images, which can be detected by statistical analysis methods [Andreas W., Andreas P., Attacks on Steganographic Systems. Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools - and Some Lessons Learned, Proceedings of the Workshop on Information Hiding, 1999]. At present, such analysis methods as visual stegoanalysis, analysis of series lengths, analysis of the number of transitions, estimation of entropy, analysis of histograms based on the Ï 2 criterion are effectively used.
ÐзвеÑÑен Ñакже ÑпоÑоб внедÑÐµÐ½Ð¸Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑной инÑоÑмаÑии в изобÑажениÑ, в коÑоÑом Ð´Ð»Ñ Ð¿ÑоÑиводейÑÑÐ²Ð¸Ñ Ð½ÐµÐºÐ¾ÑоÑÑм меÑодам анализа пÑи запиÑи инÑоÑмаÑии иÑполÑзÑеÑÑÑ ÑолÑко ÑаÑÑÑ Ð¼Ð»Ð°Ð´ÑÐ¸Ñ Ð·Ð½Ð°ÑаÑÐ¸Ñ Ð±Ð¸Ñов в байÑÐ°Ñ ÑвеÑового пÑедÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¸ÑÑ Ð¾Ð´Ð½Ð¾Ð³Ð¾ изобÑажениÑ, оÑÑавÑиеÑÑ Ð±Ð¸ÑÑ Ð¸ÑполÑзÑÑÑÑÑ Ð´Ð»Ñ Ð¿Ð¾ÑледÑÑÑей коÑÑекÑии наиболее важнÑÑ ÑÑаÑиÑÑиÑеÑÐºÐ¸Ñ Ð¿Ð°ÑамеÑÑов [Niels Proves, Defending Against Statistical Steganalysis, Proceeding of the 10 USENIX Security Symposium, 2001, P.323-335].There is also a method of embedding additional information in images, in which to counteract some analysis methods when recording information, only part of the least significant bits in bytes of the color representation of the original image are used, the remaining bits are used for subsequent correction of the most important statistical parameters [Niels Proves, Defending Against Statistical Steganalysis , Proceeding of the 10 USENIX Security Symposium, 2001, P.323-335].
ÐедоÑÑаÑком ÑпоÑоба ÑвлÑеÑÑÑ Ñо, ÑÑо коÑÑекÑиÑÑÑÑие Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¿ÑиводÑÑ Ðº дополниÑелÑÐ½Ð¾Ð¼Ñ Ð¸ÑÐºÐ°Ð¶ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½ÑейнеÑа и ÑменÑÑаÑÑ Ð¿ÑопÑÑкнÑÑ ÑпоÑобноÑÑÑ ÑÑегоканала вÑледÑÑвие иÑполÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ ÑаÑÑи Ñвободного пÑоÑÑÑанÑÑва под коÑÑекÑиÑÑÑÑÑÑ Ð¸Ð½ÑоÑмаÑиÑ. Ð ÑÐ¾Ð¼Ñ Ð¶Ðµ, коÑÑекÑиÑÑÑÑие иÑпÑавлениÑ, напÑавленнÑе на пÑоÑиводейÑÑвие какомÑ-либо из меÑодов ÑÑаÑиÑÑиÑеÑкого анализа за ÑÑÐµÑ ÐºÐ¾ÑÑекÑии одного из паÑамеÑÑов, могÑÑ Ð¿ÑивеÑÑи к еÑе болÑÑÐµÐ¼Ñ Ð¸ÑÐºÐ°Ð¶ÐµÐ½Ð¸Ñ Ð´ÑÑÐ³Ð¸Ñ Ð¿Ð°ÑамеÑÑов и, как ÑледÑÑвие, к более Ð½Ð°Ð´ÐµÐ¶Ð½Ð¾Ð¼Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑкÑÑÑого канала дÑÑгими меÑодами анализа. Ð ÑаÑÑноÑÑи, иÑкажениÑ, вноÑимÑе внедÑением дополниÑелÑной инÑоÑмаÑии и коÑÑекÑиÑÑÑÑими изменениÑми пÑи иÑполÑзовании Ñказанного ÑпоÑоба, оказÑваÑÑÑÑ Ð»ÐµÐ³ÐºÐ¾ замеÑнÑми пÑи пÑоведении визÑалÑного анализа биÑовÑÑ ÑÑезов полÑÑенного изобÑажениÑ.The disadvantage of this method is that corrective changes lead to additional distortion of the container and reduce the bandwidth of the stegochannel due to the use of part of the free space for corrective information. In addition, corrective corrections aimed at counteracting any of the methods of statistical analysis by correcting one of the parameters can lead to even more distortion of other parameters and, as a result, to more reliable detection of the covert channel by other analysis methods. In particular, the distortions introduced by the introduction of additional information and corrective changes when using this method turn out to be easily noticeable during visual analysis of bit slices of the obtained image.
РнедоÑÑаÑкам ÑказаннÑÑ Ð²ÑÑе ÑпоÑобов внедÑÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑии в ÑаÑÑÑовÑе изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ ÑледÑÐµÑ Ñакже оÑнеÑÑи и Ñо, ÑÑо Ð´Ð»Ñ Ð²Ð½ÐµÐ´ÑÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑии могÑÑ Ð¸ÑполÑзоваÑÑÑÑ ÑолÑко младÑие знаÑаÑие биÑÑ Ð±Ð°Ð¹Ñов ÑвеÑового пÑедÑÑавлениÑ, ÑÑо не позволÑÐµÑ Ð² полной меÑе иÑполÑзоваÑÑ Ð²ÐµÑÑ Ð¾Ð±Ñем даннÑÑ Ð¸Ð·Ð¾Ð±ÑажениÑ.The disadvantages of the above methods of embedding information in bitmap images should also include the fact that only the least significant bits of the bytes of the color representation can be used to embed information, which does not allow the full use of the entire amount of image data.
ÐадаÑей, на ÑеÑение коÑоÑой напÑавлено ÑÑо изобÑеÑение, ÑвлÑеÑÑÑ Ð¿Ð¾Ð²ÑÑение ÑÑÐ¾Ð²Ð½Ñ Ð·Ð°ÑиÑÑ ÐºÐ¾Ð½ÑиденÑиалÑной инÑоÑмаÑии пÑи ее ÑкÑÑÑом Ñ Ñанении и пеÑедаÑе по оÑкÑÑÑÑм каналам ÑвÑзи, в ÑлÑÑае иÑполÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð² каÑеÑÑве конÑейнеÑов ÑаÑÑÑовÑÑ ÑоÑоÑеалиÑÑиÑнÑÑ Ð¸Ð·Ð¾Ð±Ñажений, а Ñакже повÑÑение оÑноÑиÑелÑного обÑема ÑкÑÑваемой инÑоÑмаÑии за ÑÑÐµÑ Ð¸ÑполÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ ÑÑÐµÐ´Ð½Ð¸Ñ Ð¸ ÑÑаÑÑÐ¸Ñ ÑазÑÑдов инÑоÑмаÑионнÑÑ Ð±Ð°Ð¹Ñов изобÑажениÑ.The task this invention is directed to is to increase the level of protection of confidential information when it is hidden and transmitted over open communication channels, if raster photorealistic images are used as containers, and also to increase the relative amount of hidden information through the use of medium and high digits information bytes of the image.
ÐÑо доÑÑигаеÑÑÑ Ð·Ð° ÑÑÐµÑ Ñого, ÑÑо Ð´Ð»Ñ Ð²Ð½ÐµÐ´ÑÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑии вÑбиÑаÑÑÑÑ Ñе биÑÑ Ð¸ÑÑ Ð¾Ð´Ð½Ð¾Ð³Ð¾ изобÑажениÑ, поведение коÑоÑÑÑ Ð½Ð°Ð¸Ð¼ÐµÐ½ÐµÐµ пÑедÑказÑемо и изменение коÑоÑÑÑ Ð½Ðµ пÑÐ¸Ð²ÐµÐ´ÐµÑ Ðº замеÑнÑм иÑкажениÑм иÑÑ Ð¾Ð´Ð½Ð¾Ð³Ð¾ изобÑажениÑ. РкаÑеÑÑве ÑÐ°ÐºÐ¸Ñ Ð±Ð¸Ñов кодеÑом вÑбиÑаÑÑÑÑ Ð±Ð¸ÑÑ, ÑаÑположеннÑе на гÑаниÑÐ°Ñ Ð¼ÐµÐ¶Ð´Ñ ÑазлиÑнÑми облаÑÑÑми изобÑажениÑ, пÑи ÑÑом поиÑк ÑооÑвеÑÑÑвÑÑÑÐ¸Ñ Ð±Ð¸Ñов в изобÑажении оÑÑÑеÑÑвлÑеÑÑÑ Ð°Ð²ÑомаÑиÑеÑки непоÑÑедÑÑвенно во вÑÐµÐ¼Ñ Ð·Ð°Ð¿Ð¸Ñи дополниÑелÑной инÑоÑмаÑии. Ðз обÑабаÑÑваемого изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð²ÑделÑеÑÑÑ Ð±Ð¸ÑÐ¾Ð²Ð°Ñ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ, коÑоÑÐ°Ñ Ð¿Ð¾Ð´Ð°ÐµÑÑÑ Ð½Ð° Ð²Ñ Ð¾Ð´ кодеÑа или декодеÑа, пÑи ÑÑом запиÑÑ Ð¸Ð»Ð¸ извлеÑение инÑоÑмаÑии оÑÑÑеÑÑвлÑеÑÑÑ ÑолÑко в ÑÐµÑ ÑлÑÑаÑÑ , когда в окно пÑоÑмоÑÑа кодеÑа или декодеÑа Ð¿Ð¾Ð¿Ð°Ð´Ð°ÐµÑ ÑÑаÑÑок биÑовой поÑледоваÑелÑноÑÑи, ÑодеÑжаÑий пеÑÐµÑ Ð¾Ð´ Ð¾Ñ 0 к 1 или Ð¾Ñ 1 к 0. РпÑоÑеÑÑе внедÑÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑии Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ Ð¿Ð¾Ð´Ð²ÐµÑгнÑÑÑ ÐºÐ°Ðº биÑÑ, пÑинадлежаÑие вÑбÑанной биÑовой поÑледоваÑелÑноÑÑи, Ñак и оÑÑавÑиеÑÑ Ð±Ð¸ÑÑ Ð¸Ð·Ð¾Ð±ÑажениÑ. ÐÑи ÑÑом ÑаÑÑÑ Ð±Ð¸Ñов Ð¼Ð¾Ð¶ÐµÑ Ð¸ÑполÑзоваÑÑÑÑ Ð´Ð»Ñ ÐºÐ¾Ð¼Ð¿ÐµÐ½ÑаÑии вноÑимÑÑ Ð¸Ñкажений как в пÑоÑеÑÑе запиÑи инÑоÑмаÑии, Ñак и пÑи поÑледÑÑÑей коÑÑекÑии полÑÑенного изобÑажениÑ.This is achieved due to the fact that for the introduction of information, those bits of the original image are selected whose behavior is the least predictable and whose change does not lead to noticeable distortions of the original image. As such bits, the encoder selects the bits located at the boundaries between different regions of the image, while the search for the corresponding bits in the image is performed automatically immediately during the recording of additional information. A bit sequence is extracted from the processed image, which is fed to the input of the encoder or decoder, while recording or retrieving information is carried out only in cases where a portion of the bit sequence containing a transition from 0 to 1 or from 1 to 0 falls into the viewing window of the encoder or decoder In the process of embedding information, both the bits belonging to the selected bit sequence and the remaining bits of the image can be changed. In this case, part of the bits can be used to compensate for the introduced distortions both in the process of recording information and in the subsequent correction of the received image.
Ð¢ÐµÑ Ð½Ð¸ÑеÑким ÑезÑлÑÑаÑом ÑвлÑеÑÑÑ Ð¿Ð¾Ð²ÑÑение обÑемов внедÑÑемой инÑоÑмаÑии за ÑÑÐµÑ Ð¸ÑполÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ ÐºÐ°Ðº младÑÐ¸Ñ , Ñак ÑÑÐµÐ´Ð½Ð¸Ñ Ð¸ ÑÑаÑÑÐ¸Ñ Ð·Ð½Ð°ÑаÑÐ¸Ñ Ð±Ð¸Ñов байÑов ÑвеÑового пÑедÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÑоÑек изобÑажениÑ, пÑи доÑÑаÑоÑном ÑÐ¾Ñ Ñанении визÑалÑного каÑеÑÑва изобÑажениÑ. ÐоÑледнее возможно благодаÑÑ ÑомÑ, ÑÑо в ÑоÑоÑеалиÑÑиÑнÑÑ Ð¸Ð·Ð¾Ð±ÑажениÑÑ Ð¿Ð¾Ð²ÐµÐ´ÐµÐ½Ð¸Ðµ ÑоÑек, ÑаÑположеннÑÑ Ð½Ð° гÑаниÑе Ð¼ÐµÐ¶Ð´Ñ ÑазлиÑнÑми облаÑÑÑми изобÑажениÑ, полÑÑенного Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑиÑÑового пÑеобÑазованиÑ, завиÑÐ¸Ñ Ð¾Ñ Ð±Ð¾Ð»ÑÑого ÑиÑла ÑлÑÑайнÑÑ ÑакÑоÑов и Ñложно пÑедÑказÑемо. ÐÑполÑзование ÑпеÑиалÑного кода, в ÑÐ²Ð¾Ñ Ð¾ÑеÑедÑ, позволÑÐµÑ ÑÐ¾Ñ ÑаниÑÑ Ð±Ð¾Ð»ÑÑинÑÑво ÑÑаÑиÑÑиÑеÑÐºÐ¸Ñ Ð¿Ð°ÑамеÑÑов изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ñ Ð´Ð¾ÑÑаÑоÑно вÑÑокой ÑоÑноÑÑÑÑ Ð¸ ÑвеÑÑи к минимÑÐ¼Ñ ÑиÑло дополниÑелÑно конÑÑолиÑÑемÑÑ Ð¿Ð°ÑамеÑÑов и коÑÑекÑиÑÑÑÑÐ¸Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹, благодаÑÑ ÑÐµÐ¼Ñ ÑдаеÑÑÑ ÑÑпеÑно пÑоÑивоÑÑоÑÑÑ ÑÑÐ´Ñ ÑÑаÑиÑÑиÑеÑÐºÐ¸Ñ Ð¼ÐµÑодов анализа. ÐÑоме Ñого, ÑÐ°ÐºÑ Ð½Ð°Ð»Ð¸ÑÐ¸Ñ Ð¿Ð¾ÑÑоÑонней инÑоÑмаÑии не ÑдаеÑÑÑ ÑÑÑановиÑÑ Ð¸ пÑи пÑоведении визÑалÑного анализа биÑовÑÑ ÑÑезов полÑÑенного изобÑажениÑ.The technical result is to increase the amount of embedded information through the use of both the least significant and the most significant and significant bits of bytes of the color representation of the image points, while maintaining the visual quality of the image. The latter is possible due to the fact that in photorealistic images the behavior of points located on the border between different regions of the image obtained by digital conversion depends on a large number of random factors and is difficult to predict. Using a special code, in turn, allows you to save most of the statistical parameters of the image with sufficiently high accuracy and to minimize the number of additionally controlled parameters and corrective changes, thanks to which it is possible to successfully resist a number of statistical analysis methods. In addition, the fact of the presence of extraneous information cannot be established during the visual analysis of bit slices of the received image.
СÑÑноÑÑÑ ÑпоÑоба поÑÑнÑеÑÑÑ Ð½Ð° пÑимеÑе обÑабоÑки кодеÑом и декодеÑом поÑледоваÑелÑноÑÑи биÑов иÑÑ Ð¾Ð´Ð½Ð¾Ð³Ð¾ изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ñиг.1, полÑÑенной в ÑооÑвеÑÑÑвии Ñо ÑÑ ÐµÐ¼Ð¾Ð¹ на Ñиг.2.The essence of the method is illustrated by the example of processing by the encoder and decoder the sequence of bits of the original image of figure 1, obtained in accordance with the scheme in figure 2.
ФоÑмиÑование биÑовой поÑледоваÑелÑноÑÑи оÑÑÑеÑÑвлÑеÑÑÑ ÑоглаÑно ÑÑ ÐµÐ¼Ðµ поÑледоваÑелÑной обÑабоÑки изобÑажений, пÑиведенной на Ñиг.2.The formation of the bit sequence is carried out according to the scheme of sequential image processing shown in figure 2.
Ð ÑлÑÑае обÑабоÑки ÑвеÑного изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ ÐµÐ³Ð¾ Ð½ÐµÐ¾Ð±Ñ Ð¾Ð´Ð¸Ð¼Ð¾ пÑедÑÑавиÑÑ Ð² виде ÑÑÐµÑ Ð¼Ð¾Ð½Ð¾ÑоннÑÑ Ð¸Ð·Ð¾Ð±Ñажений, ÑооÑвеÑÑÑвÑÑÑÐ¸Ñ ÑÐ°Ð·Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð½Ð° кÑаÑнÑÑ, зеленÑÑ Ð¸ ÑинÑÑ ÑоÑÑавлÑÑÑие, ÑеÑно-белÑе изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ ÑÐ°ÐºÐ¾Ð¼Ñ ÑÐ°Ð·Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð½Ðµ подвеÑгаÑÑÑÑ. Ðалее, Ñак как Ð´Ð»Ñ Ñ ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑии о ÑвеÑе каждой ÑоÑки полÑÑеннÑÑ Ð¸Ð·Ð¾Ð±Ñажений доÑÑаÑоÑно одного байÑа, они ÑаÑкладÑваÑÑÑÑ Ð½Ð° воÑÐµÐ¼Ñ Ð±Ð¸ÑовÑÑ Ñлоев. ÐÐ»Ñ Ð²Ð½ÐµÐ´ÑÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑии вÑбиÑаеÑÑÑ Ð¾Ð´Ð¸Ð½ из полÑÑеннÑÑ Ñлоев, коÑоÑÑй и пÑедÑÑавлÑеÑÑÑ Ð² виде биÑовой поÑледоваÑелÑноÑÑи. ÐоÑледÑÑÑÐ°Ñ Ð·Ð°Ð¿Ð¸ÑÑ Ð¸Ð½ÑоÑмаÑии оÑÑÑеÑÑвлÑеÑÑÑ Ð·Ð° ÑÑÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¾ÑделÑнÑÑ Ð±Ð¸Ñов полÑÑенной поÑледоваÑелÑноÑÑи, пÑи ÑÑом вÑе нижележаÑие Ñлои могÑÑ Ð±ÑÑÑ Ð¸ÑполÑÐ·Ð¾Ð²Ð°Ð½Ñ Ð´Ð»Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑной коÑÑекÑии или же Ð´Ð»Ñ Ð·Ð°Ð¿Ð¸Ñи инÑоÑмаÑии на ÑледÑÑÑем Ñаге.In the case of processing a color image, it must be presented in the form of three monotonous images corresponding to the decomposition into red, green and blue components, black and white images are not subjected to such decomposition. Further, since one byte is enough to store information about the color of each point of the received images, they are decomposed into eight bit layers. To embed information, one of the obtained layers is selected, which is presented in the form of a bit sequence. Subsequent recording of information is carried out by changing the individual bits of the obtained sequence, while all the underlying layers can be used for additional correction or for recording information in the next step.
ÐÐµÐ¾Ð±Ñ Ð¾Ð´Ð¸Ð¼Ð¾ оÑмеÑиÑÑ, ÑÑо в биÑовÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑÑÑ Ð¸ÑÑ Ð¾Ð´Ð½ÑÑ Ð¸Ð·Ð¾Ð±Ñажений пÑиÑÑÑÑÑвÑÑÑ Ð´Ð¾ÑÑаÑоÑно длиннÑе ÑеÑии из одинаковÑÑ Ð±Ð¸Ñов. Ð ÑлÑÑае запиÑи инÑоÑмаÑии, пÑÑем непоÑÑедÑÑвенного замеÑÐµÐ½Ð¸Ñ Ð²ÑÐµÑ Ð±Ð¸Ñов иÑÑ Ð¾Ð´Ð½Ð¾Ð¹ поÑледоваÑелÑноÑÑи биÑами ÑкÑÑваемого ÑообÑениÑ, ÑеÑии одинаковÑÑ Ð±Ð¸Ñов бÑдÑÑ ÑазÑÑÑенÑ, а Ñама биÑÐ¾Ð²Ð°Ñ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ Ð¿Ð¾ÑеÑÑÐµÑ ÑвÑÐ·Ñ Ñ Ð¸ÑÑ Ð¾Ð´Ð½Ñм изобÑажением (наÑÑÑаÑÑÑÑ ÐºÐ¾ÑÑелÑÑионнÑе завиÑимоÑÑи). Ð ÑÑом ÑлÑÑае ÑÐ°ÐºÑ Ð·Ð°Ð¿Ð¸Ñи дополниÑелÑной инÑоÑмаÑии Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð»ÐµÐ³ÐºÐ¾ ÑÑÑановлен как в ÑезÑлÑÑаÑе пÑÐ¾Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¿ÑоÑÑого ÑÑаÑиÑÑиÑеÑкого анализа изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾ биÑовÑм ÑлоÑм, Ñак и визÑалÑно. ÐÐ»Ñ Ð¾Ð±ÐµÑпеÑÐµÐ½Ð¸Ñ ÑкÑÑÑноÑÑи запиÑи инÑоÑмаÑии и ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ðº минимÑÐ¼Ñ Ð²Ð¸Ð·ÑалÑнÑÑ Ð¸Ñкажений, в пÑоÑеÑÑе запиÑи дополниÑелÑной инÑоÑмаÑии в биÑовÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ, Ð½ÐµÐ¾Ð±Ñ Ð¾Ð´Ð¸Ð¼Ð¾ обеÑпеÑиÑÑ ÑÐ¾Ñ ÑанноÑÑÑ Ð´Ð»Ð¸Ð½Ð½ÑÑ ÑеÑий из одинаковÑÑ Ð±Ð¸Ñов. ÐÑоме Ñого, Ð´Ð»Ñ Ð¿ÑоÑиводейÑÑÐ²Ð¸Ñ Ð½ÐµÐºÐ¾ÑоÑÑм ÑÑаÑиÑÑиÑеÑким меÑодам анализа Ð½ÐµÐ¾Ð±Ñ Ð¾Ð´Ð¸Ð¼Ð¾ Ñакже ÑÐ¾Ñ ÑаниÑÑ Ð¸ÑÑ Ð¾Ð´Ð½Ñе ÑооÑноÑÐµÐ½Ð¸Ñ ÑиÑла нÑлей и ÐµÐ´Ð¸Ð½Ð¸Ñ Ð² биÑовой поÑледоваÑелÑноÑÑи и ÑиÑла пеÑÐµÑ Ð¾Ð´Ð¾Ð² Ð¾Ñ ÐµÐ´Ð¸Ð½Ð¸ÑÑ Ðº нÑÐ»Ñ Ð¸ Ð¾Ñ Ð½ÑÐ»Ñ Ðº единиÑе к обÑей длине поÑледоваÑелÑноÑÑи.It should be noted that in the bit sequences of the source images there are quite long series of the same bits. In the case of recording information by directly replacing all bits of the original sequence with the bits of the message to be hidden, the series of identical bits will be destroyed, and the bit sequence itself will lose touch with the original image (correlation dependencies are violated). In this case, the fact of recording additional information can be easily established both as a result of a simple statistical analysis of the image by bit layers, and visually. To ensure the secrecy of recording information and minimizing visual distortions, in the process of recording additional information in a bit sequence, it is necessary to ensure the safety of long series of the same bits. In addition, in order to counteract some statistical analysis methods, it is also necessary to preserve the initial ratios of the number of zeros and ones in the bit sequence and the number of transitions from one to zero and from zero to one to the total length of the sequence.
Ðаиболее полно опиÑаннÑм вÑÑе ÑÑебованиÑм оÑвеÑÐ°ÐµÑ ÑпоÑоб запиÑи дополниÑелÑной инÑоÑмаÑии в биÑовÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ, коÑоÑÑй в Ñ Ð¾Ð´Ðµ запиÑи инÑоÑмаÑии подвеÑÐ³Ð°ÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ ÑолÑко биÑÑ, ÑаÑположеннÑе на гÑаниÑÐ°Ñ Ð¿ÐµÑÐµÑ Ð¾Ð´Ð¾Ð² поÑледоваÑелÑноÑÑей одинаковÑÑ Ð±Ð¸Ñов. Так, напÑимеÑ, в поÑледоваÑелÑноÑÑи 0000011111... Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ Ð¿Ð¾Ð´Ð²ÐµÑгнÑÑÑ Ð»Ð¸Ð±Ð¾ ÑолÑко пÑÑÑй, либо ÑолÑко ÑеÑÑой биÑÑ, ÑооÑвеÑÑÑвенно в ÑезÑлÑÑаÑе могÑÑ Ð±ÑÑÑ Ð¿Ð¾Ð»ÑÑÐµÐ½Ñ Ð´Ð²Ð° ваÑианÑа измененной поÑледоваÑелÑноÑÑи:The most fully described requirements are met by the method of recording additional information in a bit sequence, which, during the recording of information, changes only the bits located at the transition boundaries of sequences of identical bits. So, for example, in the sequence 0000 01 1111 ... either only the fifth or only the sixth bit can be changed, respectively, as a result, two versions of the changed sequence can be obtained:
0000111111... (изменение пÑÑого биÑа)0000111111 ... (change of the fifth bit)
0000001111... (изменение ÑеÑÑого биÑа)0000001111 ... (sixth bit change)
Ðак можно замеÑиÑÑ, Ñакие Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² биÑовой поÑледоваÑелÑноÑÑи не пÑиводÑÑ Ðº ÑазÑÑÑÐµÐ½Ð¸Ñ Ð´Ð»Ð¸Ð½Ð½ÑÑ ÑеÑий одинаковÑÑ Ð±Ð¸Ñов и поÑÐ²Ð»ÐµÐ½Ð¸Ñ Ð½Ð¾Ð²ÑÑ Ð¿ÐµÑÐµÑ Ð¾Ð´Ð¾Ð², как в ÑлÑÑае Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð´ÑÑÐ³Ð¸Ñ Ð±Ð¸Ñов поÑледоваÑелÑноÑÑи или одновÑеменного Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¿ÑÑого и ÑеÑÑого биÑов:As you can see, such changes in the bit sequence do not lead to the destruction of long series of identical bits and the appearance of new transitions, as in the case of changing other bits of the sequence or simultaneously changing the fifth and sixth bits:
0101011011... (изменение вÑоÑого, ÑеÑвеÑÑого и воÑÑмого биÑов)0101011011 ... (change of the second, fourth and eighth bits)
0000101111... (изменение пÑÑого и ÑеÑÑого биÑов)0000101111 ... (change of the fifth and sixth bits)
РкаÑеÑÑве кÑиÑеÑиев пÑи извлеÑении инÑоÑмаÑии из биÑовой поÑледоваÑелÑноÑÑи могÑÑ Ð²ÑÑÑÑпаÑÑ Ð´Ð»Ð¸Ð½Ñ Ð¿Ð¾ÑледоваÑелÑноÑÑей, ÑоÑÑоÑÑÐ¸Ñ Ð¸Ð· одинаковÑÑ Ð±Ð¸Ñов, и Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð³ÑÐ°Ð½Ð¸Ñ (позиÑии ÑлеменÑов в наÑале и в конÑе поÑледоваÑелÑноÑÑей одинаковÑÑ Ð±Ð¸Ñов). ÐÑполÑзование в каÑеÑÑве кÑиÑеÑÐ¸Ñ Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ð¹ гÑÐ°Ð½Ð¸Ñ Ð¿Ð¾ÑледоваÑелÑноÑÑей одинаковÑÑ Ð±Ð¸Ñов ÑвлÑеÑÑÑ Ð±Ð¾Ð»ÐµÐµ пÑедпоÑÑиÑелÑнÑм вÑледÑÑвие болÑÑей инÑоÑмаÑионной емкоÑÑи. Ðиже пÑедÑÑавлен пÑимеÑ, демонÑÑÑиÑÑÑÑий, как за ÑÑÐµÑ Ð·Ð°Ð¼ÐµÐ½Ñ Ð±Ð¸Ñов, ÑаÑположеннÑÑ Ð½Ð° гÑаниÑÐ°Ñ Ð¿ÐµÑÐµÑ Ð¾Ð´Ð¾Ð² биÑовÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑей нÑлей и единиÑ, могÑÑ Ð±ÑÑÑ Ð¾ÑÑÑеÑÑÐ²Ð»ÐµÐ½Ñ Ð·Ð°Ð¿Ð¸ÑÑ Ð¸ извлеÑение инÑоÑмаÑии.The criteria for extracting information from a bit sequence can be the lengths of sequences consisting of the same bits and the position of the boundaries (position of elements at the beginning and at the end of sequences of identical bits). Using as a criterion the positions of the boundaries of sequences of identical bits is more preferable due to the greater information capacity. Below is an example that demonstrates how, by replacing bits located at the junction boundaries of bit sequences of zeros and ones, information can be recorded and retrieved.
ÐÑÐ¸Ð¼ÐµÑ Ð·Ð°Ð¿Ð¸Ñи инÑоÑмаÑии в биÑовÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ. ÐÑÑÑÑ Ð¸Ð¼ÐµÐµÑÑÑ Ð¸ÑÑ Ð¾Ð´Ð½Ð°Ñ Ð±Ð¸ÑÐ¾Ð²Ð°Ñ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ Ð¡, и ÑÑебÑеÑÑÑ Ð·Ð°Ð¿Ð¸ÑаÑÑ ÑообÑение Ð=10010110. ÐÑоÑÑой Ð´ÐµÐºÐ¾Ð´ÐµÑ ÑаÑÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð±Ð¸ÑовÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ Ð¿Ð¾ паÑам и оÑÑÑеÑÑвлÑÐµÑ Ð¸Ð·Ð²Ð»ÐµÑение инÑоÑмаÑии ÑоглаÑно ÑледÑÑÑим пÑавилам.An example of recording information in a bit sequence. Suppose you have the original bit sequence C, and you want to record the message E = 10010110. A simple decoder considers a bit sequence in pairs and extracts information according to the following rules.
1. ÐÑли паÑа ÑодеÑÐ¶Ð¸Ñ 1 и 0, Ñо в завиÑимоÑÑи Ð¾Ñ Ð¸Ñ Ð¾ÑеÑедноÑÑи Ð´ÐµÐºÐ¾Ð´ÐµÑ Ð¿Ð¸ÑÐµÑ 1 (ÑооÑвеÑÑÑвÑÐµÑ 10) либо 0 (ÑооÑвеÑÑÑвÑÐµÑ 01).1. If the pair contains 1 and 0, then, depending on their order, the decoder writes 1 (corresponds to 10) or 0 (corresponds to 01).
2. ÐÑли паÑа ÑоÑÑÐ¾Ð¸Ñ ÑолÑко из ÐµÐ´Ð¸Ð½Ð¸Ñ Ð¸Ð»Ð¸ ÑолÑко из нÑлей, Ñо она пÑопÑÑкаеÑÑÑ.2. If a pair consists of only ones or only zeros, then it is skipped.
СооÑвеÑÑÑвÑÑÑÐ°Ñ Ð´Ð°Ð½Ð½Ñм пÑавилам ÐºÐ¾Ð´Ð¾Ð²Ð°Ñ ÑаблиÑа декодеÑа пÑедÑÑавлена ÑаблиÑей 1.The decoder code table corresponding to these rules is represented by table 1.
ТаблиÑа 1.Table 1. ÐÑ Ð¾Ð´entrance РезÑлÑÑаÑResult 0000 -- 0101 00 1010 1one 11eleven --
ÐÐ½Ð°Ñ Ð¿Ñавила извлеÑÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑии декодеÑом, на оÑнове иÑÑ Ð¾Ð´Ð½Ð¾Ð¹ биÑовой поÑледоваÑелÑноÑÑи С, за ÑÑÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð³ÑаниÑнÑÑ Ð±Ð¸Ñов в ÑооÑвеÑÑÑвии Ñ Ð±Ð¸Ñами запиÑÑваемого ÑообÑÐµÐ½Ð¸Ñ Ð Ð¼Ð¾Ð¶Ð½Ð¾ ÑÑоÑмиÑоваÑÑ Ð½Ð¾Ð²ÑÑ Ð±Ð¸ÑовÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ S=СâÐ. ÐиÑÑ Ð¸ÑÑ Ð¾Ð´Ð½Ð¾Ð¹ биÑовой поÑледоваÑелÑноÑÑи, подвеÑгÑиеÑÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ, оÑмеÑÐµÐ½Ñ Ð¶Ð¸ÑнÑм ÑÑиÑÑом.Knowing the rules for extracting information by the decoder, based on the original bit sequence C, by changing the boundary bits in accordance with the bits of the recorded message E, a new bit sequence S = СâÐ can be formed. The bits of the original bit sequence that have changed are marked in bold.
С=11100000000111001101111011011001001110011...C = 11100000000111001101111011011001001110011 ...
Ð=10010110...E = 10010110 ...
S=СâÐS = CâE
S=11100000000111011100111011011010001100011...S = 11 10 00 00 00 01 11 01 11 00 11 10 11 01 10 10 00 11 00 01 1 ...
Y=x1xxx0x0xxx1x011xxx0...Y = x1xxx0x0xxx1x011xxx0 ...
Ð'=10010110...E '= 10010110 ...
Ðа оÑнове биÑовой поÑледоваÑелÑноÑÑи S ÑоглаÑно кодовой ÑаблиÑе Ð´ÐµÐºÐ¾Ð´ÐµÑ Ð²Ð¾ÑÑÑÐ°Ð½Ð°Ð²Ð»Ð¸Ð²Ð°ÐµÑ ÑообÑение Ð', ÑооÑвеÑÑÑвÑÑÑее запиÑÐ°Ð½Ð½Ð¾Ð¼Ñ Ð² поÑледоваÑелÑноÑÑÑ S ÑообÑÐµÐ½Ð¸Ñ Ð: SâYâÐ'.Based on the bit sequence S according to the code table, the decoder restores the message E 'corresponding to the message E recorded in the sequence S: S â Y â E'.
ÐÑобенноÑÑÑÑ Ð¿Ñедлагаемого ÑпоÑоба запиÑи инÑоÑмаÑии в биÑовÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ ÑвлÑеÑÑÑ ÑÐ¾Ñ Ñанение иÑÑ Ð¾Ð´Ð½Ð¾Ð¹ ÑнÑÑопии биÑовой поÑледоваÑелÑноÑÑи, Ñо еÑÑÑ Ð·Ð°Ð¿Ð¸ÑÑ Ð¸Ð½ÑоÑмаÑии оÑÑÑеÑÑвлÑеÑÑÑ Ð½Ðµ за ÑÑÐµÑ Ð²Ð½ÐµÑÐµÐ½Ð¸Ñ Ð½Ð¾Ð²Ð¾Ð¹ дополниÑелÑной инÑоÑмаÑии в поÑледоваÑелÑноÑÑÑ, а за ÑÑÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¸Ð·Ð½Ð°ÑалÑно Ñже пÑиÑÑÑÑÑвÑÑÑей в ней инÑоÑмаÑии. С ÑÑой оÑобенноÑÑÑÑ Ð·Ð°Ð¿Ð¸Ñи ÑвÑзано Ñо, ÑÑо в пÑиведенном пÑимеÑе, в Ñ Ð¾Ð´Ðµ запиÑи инÑоÑмаÑии Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² иÑÑ Ð¾Ð´Ð½Ð¾Ð¹ поÑледоваÑелÑноÑÑи подвеÑглиÑÑ ÑолÑко пÑÑÑ Ð±Ð¸Ñов. ÐбÑÑÑнÑеÑÑÑ ÑÑо Ñем, ÑÑо ÑаÑÑÑ Ð¸Ð½ÑоÑмаÑии, изнаÑалÑно пÑиÑÑÑÑÑвовавÑÐ°Ñ Ð² биÑовой поÑледоваÑелÑноÑÑи, Ñовпала Ñ Ð·Ð°Ð¿Ð¸ÑÑваемой инÑоÑмаÑией.A feature of the proposed method for recording information in a bit sequence is to preserve the original entropy of the bit sequence, that is, information is recorded not by adding new additional information to the sequence, but by changing the information already present in it. This recording feature is related to the fact that in the above example, during the recording of information, only five bits underwent a change in the original sequence. This is explained by the fact that part of the information that was originally present in the bit sequence coincided with the recorded information.
ÐапиÑÑ Ð¸Ð½ÑоÑмаÑии в биÑовÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ Ð¿ÑедлагаеÑÑÑ Ð¾ÑÑÑеÑÑвлÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑпеÑиалÑного кода. Ðго пÑименение позволÑÐµÑ Ð°Ð²ÑомаÑизиÑоваÑÑ Ð¿ÑоÑеÑÑ Ð·Ð°Ð¿Ð¸Ñи инÑоÑмаÑии и ÑвеÑÑи его к пÑоÑÑой замене ÑеÑÑÑÐµÑ Ð±Ð¸ÑнÑÑ Ð²ÐµÐºÑоÑов, ÑÑоÑмиÑованнÑÑ Ð¸Ð· идÑÑÐ¸Ñ Ð¿Ð¾ÑледоваÑелÑно биÑов иÑÑ Ð¾Ð´Ð½Ð¾Ð¹ поÑледоваÑелÑноÑÑи векÑоÑами ÑаблиÑÑ Ð·Ð°Ð¼ÐµÐ½. ÐÑоÑеÑÑ Ð·Ð°Ð¿Ð¸Ñи инÑоÑмаÑии Ð´Ð»Ñ Ð´Ð°Ð½Ð½Ð¾Ð³Ð¾ ÑлÑÑÐ°Ñ Ð¿ÑедÑÑавлен на Ñиг.1. РкаждÑй Ð¼Ð¾Ð¼ÐµÐ½Ñ Ð²Ñемени ÐºÐ¾Ð´ÐµÑ Ð¿ÑоÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ Ð±Ð¸Ñов конÑейнеÑа по ÑеÑвеÑкам, пÑи ÑÑом Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´Ð²ÐµÑгаÑÑÑÑ ÑолÑко ÑÑедние два биÑа. ÐиÑÑ Ñлева и ÑпÑава позволÑÑÑ Ð±Ð¾Ð»ÐµÐµ ÑоÑно опÑеделиÑÑ Ð³ÑаниÑÑ Ð¿ÐµÑÐµÑ Ð¾Ð´Ð¾Ð² и иÑклÑÑиÑÑ ÑиÑÑаÑии, когда гÑаниÑа оказÑваеÑÑÑ Ð¼ÐµÐ¶Ð´Ñ ÑаÑÑмаÑÑиваемÑми паÑами. СмеÑение окна пÑоÑмоÑÑа кодеÑа на каждом Ñаге ÑоÑÑавлÑÐµÑ Ð´Ð²Ðµ позиÑии, ÑÑо позволÑÐµÑ Ð¾ÑÑÑеÑÑвлÑÑÑ Ð·Ð°Ð¿Ð¸ÑÑ Ð¸Ð½ÑоÑмаÑии во вÑÐµÑ Ð¿ÐµÑÐµÑ Ð¾Ð´Ð°Ñ Ð¿Ð¾ÑледоваÑелÑноÑÑей одинаковÑÑ Ð±Ð¸Ñов. ÐÑедлагаемÑй ÐºÐ¾Ð´ÐµÑ Ð¾ÑÑÑеÑÑвлÑÐµÑ Ð·Ð°Ð¼ÐµÐ½Ñ ÑлеменÑов биÑовой поÑледоваÑелÑноÑÑи в ÑооÑвеÑÑÑвии Ñ Ð·Ð°Ð¿Ð¸ÑÑваемÑми даннÑми ÑоглаÑно кодовой ÑаблиÑе. ÐÐ¾Ð´Ð¾Ð²Ð°Ñ ÑаблиÑа ÑоÑÑÐ¾Ð¸Ñ Ð¸Ð· двÑÑ ÑÑолбÑов, ÑодеÑжаÑÐ¸Ñ Ð²ÐµÐºÑоÑа Ð·Ð°Ð¼ÐµÐ½Ñ ÑооÑвеÑÑÑвенно Ð´Ð»Ñ Ð½ÑÐ»Ñ Ð¸ единиÑÑ Ð·Ð°Ð¿Ð¸ÑÑваемой инÑоÑмаÑии. СÑÑоки ÑаблиÑÑ ÑооÑвеÑÑÑвÑÑÑ Ð²Ñем возможнÑм ÑеÑÑÑÐµÑ Ð±Ð¸ÑнÑм векÑоÑам биÑовой поÑледоваÑелÑноÑÑи. Ðа каждом Ñаге окно пÑоÑмоÑÑа кодеÑа вÑделÑÑ ÑеÑÑÑÐµÑ Ð±Ð¸ÑнÑй оÑÑезок поÑледоваÑелÑноÑÑи (векÑоÑ) и в ÑооÑвеÑÑÑвии Ñ ÐºÐ¾Ð´Ð¾Ð²Ð¾Ð¹ ÑаблиÑей по ÑекÑÑÐµÐ¼Ñ Ð¸Ð½ÑоÑмаÑÐ¸Ð¾Ð½Ð½Ð¾Ð¼Ñ ÑÐ¸Ð¼Ð²Ð¾Ð»Ñ (биÑÑ Ð´Ð°Ð½Ð½ÑÑ ) оÑÑÑеÑÑвлÑÐµÑ ÐµÐ³Ð¾ Ð·Ð°Ð¼ÐµÐ½Ñ Ð½Ð° векÑÐ¾Ñ Ð¸Ð· кодовой ÑаблиÑÑ.It is proposed to write information in a bit sequence using a special code. Its application allows you to automate the process of recording information and reduce it to a simple replacement of four-bit vectors formed from successive bits of the original sequence by the vectors of the replacement table. The process of recording information for this case is presented in figure 1. At each moment of time, the encoder scans the sequence of bits of the container in fours, while only the middle two bits undergo a change. The bits on the left and on the right allow you to more accurately determine the boundary of transitions and exclude situations where the boundary is between the pairs in question. The shift of the encoder viewing window at each step is two positions, this allows information to be recorded in all transitions of sequences of identical bits. The proposed encoder replaces the elements of the bit sequence in accordance with the recorded data according to the code table. The code table consists of two columns containing replacement vectors for zero and a unit of recorded information, respectively. Rows of the table correspond to all possible four-bit vectors of the bit sequence. At each step, the encoder viewing window will highlight a four-bit segment of the sequence (vector) and, in accordance with the code table for the current information symbol (data bit), it will replace it with a vector from the code table.
ÐÐ¾Ð´Ð¾Ð²Ð°Ñ ÑаблиÑа кодеÑа пÑедÑÑавлена ÑаблиÑей 2. ÐÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÐ¼Ð°Ñ ÑаблиÑа ÑвлÑеÑÑÑ Ð¾Ð¿ÑималÑной, и ее иÑполÑзование пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº минималÑнÑм иÑкажениÑм, однако в некоÑоÑÑÑ ÑеализаÑиÑÑ Ð´Ð¾Ð¿ÑÑÑимо иÑполÑзование дÑÑÐ³Ð¸Ñ ÐºÐ¾Ð´Ð¾Ð²ÑÑ ÑаблиÑ. Ðод, опиÑаннÑй ÑаблиÑей 2, ÑвлÑеÑÑÑ Ð±Ð°Ð·Ð¾Ð²Ñм, не вноÑÐ¸Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑнÑÑ ÐºÐ¾ÑÑекÑиÑÑÑÑÐ¸Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹, и позволÑÐµÑ Ð¸ÑполÑзоваÑÑ Ð´Ð»Ñ Ð·Ð°Ð¿Ð¸Ñи инÑоÑмаÑии до ÑеÑÑи младÑÐ¸Ñ Ð±Ð¸ÑовÑÑ Ñлоев.The encoder code table is presented in Table 2. The proposed table is optimal, and its use leads to minimal distortion, however, in some implementations, the use of other code tables is permissible. The code described in Table 2 is basic, does not introduce additional corrective changes, and allows using up to six lower-order bit layers for recording information.
ТаблиÑа 2.Table 2. ÐÑ Ð¾Ð´ (4-Ñ Ð±Ð¸ÑнÑй векÑоÑ)Input (4-bit vector) ÐапиÑÑ Ð½ÑлÑZero recording ÐапиÑÑ ÐµÐ´Ð¸Ð½Ð¸ÑÑUnit record 00000000 -- -- 00010001 0011*0011 * -- 00100010 00100010 01000100 00110011 00110011 0111*0111 * 01000100 00100010 01000100 01010101 00110011 01010101 01100110 0010*0010 * 0100*0100 * 01110111 0011*0011 * 01110111 10001000 10001000 1100*1100 * 10011001 1011*1011 * 1101*1101 * 10101010 10101010 11001100 10111011 10111011 11011101 11001100 1000*1000 * 11001100 11011101 10111011 11011101 11101110 -- 1100*1100 * 11111111 -- --
ÐзобÑажение Ñ Ð²Ð½ÐµÐ´Ñенной в него дополниÑелÑной инÑоÑмаÑией полÑÑаеÑÑÑ Ð·Ð° ÑÑÐµÑ Ð¿ÑÐ¾Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾Ð¿ÐµÑаÑий, обÑаÑнÑÑ Ð¿Ð¾ оÑноÑÐµÐ½Ð¸Ñ Ðº опеÑаÑиÑм, пÑоводимÑм пÑи ÑоÑмиÑовании биÑовой поÑледоваÑелÑноÑÑи, но в каÑеÑÑве поÑледней вÑÑÑÑÐ¿Ð°ÐµÑ Ð½Ðµ иÑÑ Ð¾Ð´Ð½Ð°Ñ, а Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð½Ð°Ñ Ð±Ð¸ÑÐ¾Ð²Ð°Ñ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ.An image with additional information embedded in it is obtained by performing operations that are inverse to operations carried out during the formation of the bit sequence, but the last is not the original, but the changed bit sequence.
ÐзвлеÑение инÑоÑмаÑии оÑÑÑеÑÑвлÑеÑÑÑ ÑледÑÑÑим обÑазом. ÐналогиÑно пÑоÑедÑÑе запиÑи инÑоÑмаÑии из изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ ÑоглаÑно ÑÑ ÐµÐ¼Ðµ на Ñиг.2 ÑоÑмиÑÑеÑÑÑ Ð±Ð¸ÑÐ¾Ð²Ð°Ñ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ. ÐÐµÐºÐ¾Ð´ÐµÑ Ð°Ð½Ð°Ð»Ð¸Ð·Ð¸ÑÑÐµÑ ÑÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ Ð¿Ð¾ ÑÑойкам и Ð¸Ð·Ð²Ð»ÐµÐºÐ°ÐµÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð² ÑооÑвеÑÑÑвии Ñо Ñвоей кодовой ÑаблиÑей (ÑаблиÑа 3). СмеÑение окна пÑоÑмоÑÑа декодеÑа на каждом Ñаге ÑоÑÑавлÑÐµÑ Ð´Ð²Ðµ позиÑии (Ñиг.1).Information extraction is carried out as follows. Similar to the procedure for recording information from an image according to the scheme in figure 2, a bit sequence is formed. The decoder analyzes this sequence in triples and extracts information in accordance with its code table (table 3). The offset of the viewing window of the decoder at each step is two positions (figure 1).
ТаблиÑа 3.Table 3. ÐÑ Ð¾Ð´entrance РезÑлÑÑаÑResult 000000 -- 001001 00 010010 1one 011011 1one 100one hundred 00 101101 00 110110 1one 111111 --
ÐнеÑение коÑÑекÑиÑÑÑÑÐ¸Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹.Making corrective changes.
ÐаÑианÑÑ Ð·Ð°Ð¼ÐµÐ½Ñ, оÑмеÑеннÑе в ÑаблиÑе 2 звездоÑками, пÑиводÑÑ Ðº Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ ÑооÑноÑÐµÐ½Ð¸Ñ ÑиÑла ÐµÐ´Ð¸Ð½Ð¸Ñ Ð¸ нÑлей, но Ð¸Ñ Ð²Ð»Ð¸Ñние на обÑÑÑ ÑÑаÑиÑÑÐ¸ÐºÑ Ð²Ð·Ð°Ð¸Ð¼Ð½Ð¾ компенÑиÑÑеÑÑÑ Ð¸ макÑималÑное оÑклонение не пÑевÑÑÐ°ÐµÑ 1.45%, а макÑималÑное иÑкажение ÑиÑла пеÑÐµÑ Ð¾Ð´Ð¾Ð² ÑоÑÑавлÑÐµÑ Ð²Ñего поÑÑдка 0.25%. Такое оÑклонение не вÑÑвлÑеÑÑÑ ÑовÑеменнÑми ÑÑедÑÑвами ÑÑегоанализа, однако Ñ ÑелÑÑ Ð¿ÑоÑиводейÑÑÐ²Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ ÑовеÑÑеннÑм ÑÑедÑÑвам анализа ÑÑи паÑамеÑÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑÐ¾Ñ ÑаниÑÑ Ð¿ÑакÑиÑеÑки Ñ Ð°Ð±ÑолÑÑной ÑоÑноÑÑÑÑ, за ÑÑÐµÑ Ð²Ð½ÐµÑÐµÐ½Ð¸Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑнÑÑ ÐºÐ¾ÑÑекÑиÑÑÑÑÐ¸Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹. ÐÐ»Ñ ÑÑого в ÑÑÑоки базовой кодовой ÑаблиÑÑ 2 добавлÑÑÑÑÑ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑнÑе ÑоÑÑоÑниÑ. ÐÐ¾Ð·Ð¼Ð¾Ð¶Ð½Ð°Ñ ÐºÐ¾Ð´Ð¾Ð²Ð°Ñ ÑаблиÑа пÑедÑÑавлена в ÑаблиÑе 4.The substitution options marked with asterisks in Table 2 lead to a change in the ratio of the number of ones and zeros, but their influence on the overall statistics is mutually compensated and the maximum deviation does not exceed 1.45%, and the maximum distortion of the number of transitions is only about 0.25%. Such a deviation is not detected by modern means of stegoanalysis, however, in order to counter more advanced analysis tools, these parameters can be maintained with almost absolute accuracy, due to the introduction of additional corrective changes. To do this, additional states are added to the rows of the base code table 2. A possible code table is presented in table 4.
ТаблиÑа 4.Table 4. ÐÑ Ð¾Ð´entrance ÐапиÑÑ Ð½ÑлÑZero recording ÐапиÑÑ ÐµÐ´Ð¸Ð½Ð¸ÑÑUnit record ÐоÑÑекÑиÑCorrection 00000000 -- -- -- 00010001 00110011 -- -- 00100010 00100010 01000100 01100110 00100010 00110011 01110111 0101 (запиÑÑ 1)0101 (entry 1) 01000100 00100010 01000100 -- 01010101 00110011 01010101 00010001 01100110 00100010 01000100 -- 01110111 00110011 01110111 -- 10001000 10001000 11001100 -- 10011001 10111011 11011101 -- 10101010 10101010 11001100 10001000 10111011 10111011 11011101 -- 11001100 10001000 11001100 1010 (запиÑÑ 0)1010 (entry 0) 11011101 10111011 11011101 10011001 11101110 -- 11001100 -- 11111111 -- -- --
ÐÑполÑзование модиÑиÑиÑованной кодовой ÑаблиÑÑ Ð² кодиÑÑÑÑем модÑле позволÑÐµÑ Ð²Ð½Ð¾ÑиÑÑ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑнÑе коÑÑекÑиÑÑÑÑие Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¿Ð¾ меÑе Ð½ÐµÐ¾Ð±Ñ Ð¾Ð´Ð¸Ð¼Ð¾ÑÑи непоÑÑедÑÑвенно в Ñ Ð¾Ð´Ðµ запиÑи инÑоÑмаÑии, пÑи ÑÑом внеÑение коÑÑекÑиÑÑÑÑÐ¸Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹ в ÑÑде ÑлÑÑаев Ð¼Ð¾Ð¶ÐµÑ ÑопÑовождаÑÑÑÑ Ð·Ð°Ð¿Ð¸ÑÑÑ Ð¸Ð½ÑоÑмаÑии. Ðак, напÑимеÑ, в ÑÑÑÐ¾ÐºÐ°Ñ 4, 13 пÑиведенной кодовой ÑаблиÑÑ. Ð ÑÐ¾Ð¼Ñ Ð¶Ðµ Ñакой Ð¿Ð¾Ð´Ñ Ð¾Ð´ позволÑÐµÑ ÑÐ¾Ñ ÑаниÑÑ Ð²Ñе оÑновнÑе ÑÑаÑиÑÑиÑеÑкие Ñ Ð°ÑакÑеÑиÑÑики иÑÑ Ð¾Ð´Ð½Ð¾Ð¹ поÑледоваÑелÑноÑÑи Ñ Ð±Ð¾Ð»ÑÑой ÑоÑноÑÑÑÑ, не подвеÑÐ³Ð°Ñ Ð¿Ñи ÑÑом Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð´ÐµÐºÐ¾Ð´ÐµÑ.Using a modified code table in the coding module allows you to make additional corrective changes as necessary directly during the recording of information, while the introduction of corrective changes in some cases may be accompanied by a record of information. As, for example, in lines 4, 13 of the given code table. Moreover, this approach allows you to save all the basic statistical characteristics of the original sequence with great accuracy, without subjecting the decoder to change.
Ð Ñ Ð¾Ð´Ðµ запиÑи инÑоÑмаÑии в один из биÑовÑÑ Ñлоев вÑе нижележаÑие Ñлои могÑÑ Ð¸ÑполÑзоваÑÑÑÑ Ð´Ð»Ñ Ð²Ð½ÐµÑÐµÐ½Ð¸Ñ ÐºÐ¾ÑÑекÑиÑÑÑÑÐ¸Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹. ÐÑи ÑÑом Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ Ð¿Ð¾Ð´Ð²ÐµÑгнÑÑÑ ÑолÑко биÑÑ, ÑооÑвеÑÑÑвÑÑÑие Ñем ÑоÑкам изобÑажениÑ, коÑоÑÑе бÑли Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ñ Ð² Ñ Ð¾Ð´Ðµ запиÑи инÑоÑмаÑии. Ðанное ÑÑловие Ð½ÐµÐ¾Ð±Ñ Ð¾Ð´Ð¸Ð¼Ð¾ Ð´Ð»Ñ ÑÐ¾Ñ ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð²Ð¸Ð·ÑалÑного каÑеÑÑва изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð¸ возможноÑÑи поÑледÑÑÑего иÑполÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¼Ð»Ð°Ð´ÑÐ¸Ñ Ñлоев Ð´Ð»Ñ Ð·Ð°Ð¿Ð¸Ñи инÑоÑмаÑии. ÐÑоме Ñого, ÑÑо позволÑÐµÑ Ð¾ÑÑÑеÑÑвлÑÑÑ Ð·Ð°Ð¿Ð¸ÑÑ Ð¸Ð½ÑоÑмаÑии и Ð½ÐµÐ¾Ð±Ñ Ð¾Ð´Ð¸Ð¼ÑÑ ÐºÐ¾ÑÑекÑÐ¸Ñ Ð² один пÑÐ¾Ñ Ð¾Ð´. Так, напÑимеÑ, иÑполÑзование Ñакого Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð° позволÑÐµÑ Ñ Ð´Ð¾ÑÑаÑоÑной ÑоÑноÑÑÑÑ ÑÐ¾Ñ ÑаниÑÑ Ð³Ð¸ÑÑогÑÐ°Ð¼Ð¼Ñ ÑаÑпÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ ÑвеÑов иÑÑ Ð¾Ð´Ð½Ð¾Ð³Ð¾ изобÑажениÑ.During the recording of information in one of the bit layers, all the underlying layers can be used to make corrective changes. In this case, only bits corresponding to those image points that were changed during the recording of information can be subjected to change. This condition is necessary to maintain the visual quality of the image and the possibility of subsequent use of the lower layers for recording information. In addition, it allows you to record information and the necessary correction in one pass. So, for example, the use of this approach allows you to accurately preserve the histogram of the color distribution of the original image.
Ðак оÑмеÑалоÑÑ Ð²ÑÑе, базовÑй код позволÑÐµÑ Ð¸ÑполÑзоваÑÑ Ð´Ð»Ñ Ð·Ð°Ð¿Ð¸Ñи инÑоÑмаÑии до ÑеÑÑи биÑовÑÑ Ñлоев. Ð Ñоже вÑемÑ, еÑли Ð´Ð»Ñ Ð·Ð°Ð¿Ð¸Ñи инÑоÑмаÑии иÑполÑзÑеÑÑÑ ÑеÑно-белое изобÑажение, Ñо благодаÑÑ Ð²Ð½ÐµÑÐµÐ½Ð¸Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑнÑÑ ÐºÐ¾Ð¼Ð¿ÐµÐ½ÑиÑÑÑÑÐ¸Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹ в нижележаÑие Ñлои, в ÑÑде ÑлÑÑаев Ð´Ð»Ñ Ð·Ð°Ð¿Ð¸Ñи инÑоÑмаÑии ÑÑановиÑÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ñм иÑполÑзование и ÑÑаÑÑÐ¸Ñ Ñлоев. Ð ÑлÑÑае ÑвеÑного изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑно ÑÑебÑеÑÑÑ ÑоглаÑование вÑÐµÑ ÑвеÑовÑÑ ÑоÑÑавлÑÑÑÐ¸Ñ .As noted above, the basic code allows the use of up to six bit layers for recording information. At the same time, if a black-and-white image is used to record information, then due to the introduction of additional compensating changes in the underlying layers, in some cases it is possible to use higher layers to record information. In the case of a color image, matching of all color components is additionally required.
ÐÑоведеннÑе иÑпÑÑÐ°Ð½Ð¸Ñ Ð¿Ð¾ÐºÐ°Ð·Ð°Ð»Ð¸ вÑÑокÑÑ ÑÑойкоÑÑÑ Ð±Ð°Ð·Ð¾Ð²Ð¾Ð³Ð¾ ÑпоÑоба внеÑÐµÐ½Ð¸Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑной инÑоÑмаÑии в изобÑажении пÑоÑив визÑалÑного анализа, ÑÑда ÑÑаÑиÑÑиÑеÑÐºÐ¸Ñ Ð¼ÐµÑодов анализа изобÑажений, а Ñакже анализа гиÑÑогÑаммÑ. Ð Ñ Ð¾Ð´Ðµ иÑпÑÑаний оÑноÑиÑелÑнÑй обÑем внедÑеннÑÑ Ð´Ð°Ð½Ð½ÑÑ Ð² ÑÑде ÑлÑÑаев ÑоÑÑавлÑл 1/3-1/2 Ð¾Ñ Ð¾Ð±Ñема даннÑÑ Ñамого изобÑажениÑ, пÑи ÑÐ¾Ñ Ñанении визÑалÑного каÑеÑÑва поÑледнего. Ð Ñоже вÑÐµÐ¼Ñ Ð¸ÑполÑзование пÑедложеннÑÑ Ð¼Ð¾Ð´Ð¸ÑикаÑий позволÑÐµÑ ÐµÑе болÑÑе повÑÑиÑÑ ÑÑегоÑÑойкоÑÑÑ ÑпоÑоба и задейÑÑвоваÑÑ Ð´Ð»Ñ Ð·Ð°Ð¿Ð¸Ñи инÑоÑмаÑии дополниÑелÑнÑе биÑовÑе Ñлои. ÐÐ»Ñ Ð¾Ð±ÐµÑпеÑÐµÐ½Ð¸Ñ Ð½Ð°Ð¸Ð±Ð¾Ð»ÑÑей ÑÑойкоÑÑи инÑоÑмаÑÐ¸Ð¾Ð½Ð½Ð°Ñ Ð±Ð¸ÑÐ¾Ð²Ð°Ñ Ð¿Ð¾ÑледоваÑелÑноÑÑÑ Ð´Ð¾Ð»Ð¶Ð½Ð° имеÑÑ ÑавномеÑное ÑаÑпÑеделение. Ðаиболее ÑÑÑекÑивнÑм ÑвлÑеÑÑÑ Ð¸ÑполÑзование пÑедложенного ÑпоÑоба ÑокÑÑÑÐ¸Ñ Ð¸Ð½ÑоÑмаÑии ÑовмеÑÑно Ñ Ð°Ð»Ð³Ð¾ÑиÑмами ÑжаÑÐ¸Ñ Ð¸ блоÑного ÑиÑÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÑименÑемÑми поÑледоваÑелÑно к ÑкÑÑÐ²Ð°ÐµÐ¼Ð¾Ð¼Ñ ÑообÑениÑ.The tests performed showed the high stability of the basic method of introducing additional information in the image against visual analysis, a number of statistical methods for image analysis, as well as histogram analysis. During the tests, the relative amount of embedded data in some cases was 1 / 3-1 / 2 of the data volume of the image itself, while maintaining the visual quality of the latter. At the same time, the use of the proposed modifications makes it possible to further increase the steg resistance of the method and use additional bit layers for recording information. To ensure maximum persistence, the information bit sequence must have a uniform distribution. The most effective is the use of the proposed method of hiding information in conjunction with the compression and block encryption algorithms applied sequentially to a hidden message.
ÐеÑеÑÐµÐ½Ñ ÑигÑÑ:List of figures:
1. Фиг.1: ÐÑÐ¸Ð¼ÐµÑ Ð¾Ð±ÑабоÑки поÑледоваÑелÑноÑÑи биÑов изобÑÐ°Ð¶ÐµÐ½Ð¸Ñ ÐºÐ¾Ð´ÐµÑом и декодеÑом.1. FIG. 1: An example of processing a sequence of image bits by an encoder and a decoder.
2. Фиг.2: ÐоÑÑдок полÑÑÐµÐ½Ð¸Ñ Ð±Ð¸Ñовой поÑледоваÑелÑноÑÑи из ÑвеÑного изобÑажениÑ, пÑедÑÑавленного в ÑиÑÑовом виде.2. Figure 2: The procedure for obtaining the bit sequence from a color image presented in digital form.
ÐÑÑоÑники инÑоÑмаÑииInformation sources
1. Bender W., Gruhl D., Morimoto N., Lu A., Techniques for data hiding, IBM systems journal, VOL 35, NOS 3&4, 1996.1. Bender W., Gruhl D., Morimoto N., Lu A., Techniques for data hiding, IBM systems journal, VOL 35, NOS 3 & 4, 1996.
2. ÐаÑÐµÐ½Ñ RU 2002135272, 10.07.2004.2. Patent RU 2002135272, 07/10/2004.
3. Andreas W., Andreas P., Attacks on Steganographic Systems. Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools - and Some Lessons Learned, Proceedings of the Workshop on Information Hiding, 1999.3. Andreas W., Andreas P., Attacks on Steganographic Systems. Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools - and Some Lessons Learned, Proceedings of the Workshop on Information Hiding, 1999.
4. Niels Proves, Defending Against Statistical Steganalysis, Proceeding of the 10 USENIX Security Symposium, 2001, P.323-335.4. Niels Proves, Defending Against Statistical Steganalysis, Proceeding of the 10 USENIX Security Symposium, 2001, P.323-335.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4