Steganographic combination algorithm of embedding the confidential information into the jpeg digital images
Author(s): S.V. Radaev, Federal state military educational institution of higher professional education "Academy of the Federal security service of the Russian Federation", Orel, Russia, radik0782@mail.ruD.V. Orlov, Federal state military educational institution of higher professional education "Academy of the Federal security service of the Russian Federation", Orel, Russia, dimaorlov56@gmail.com
O.O. Basov, Federal state military educational institution of higher professional education "Academy of the Federal security service of the Russian Federation", Orel, Russia, oobasov@mail.ru
Issue: Volume 44, №23
Rubric: Infocommunication technologies
Annotation: The analysis of organization of file structure of JPEG format from the point of view of steganographic container is presented. The peculiarity of the organization of the file structure is that JPEG can be considered from the point of view of embedding information in format and non-format methods based on the steganographic software product JPHide and, directly, adding non-main markers of the digital JPEG image, including artificially in the absence thereof. In the format part, it is advisable to embed a hash code, in turn, the non-format part is more suitable for embedding information. The proposed approach, which consists in the combination of formatted and unformatted methods of steganography to implement the authentication procedure of information to be transmitted. Thus, as a result of information interaction will not only hidden transfer of confidential information, but it is possible to check the integrity of the steganographic message by comparing the extracted hash and computed hash from the received hidden message
Keywords: steganography, embedding, information protection, confidential information
Full text (PDF): Download
Downloads count: 716