Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.

A method of authentication of digital images for the evidence base of the judicial system and developed the appropriate software has been proposed. The stability of existing steganographic methods for ensuring the authenticity of images is analyzed and the possibility of modifying the method is exam...

Full description

Saved in:
Bibliographic Details
Date:2019
Main Authors: Pavlenko, B. V., Prysiazhnyi, D. P., Karpinets, V. V., Yaremchuk, Y. Y.
Format: Article
Language:Ukrainian
Published: Інститут проблем реєстрації інформації НАН України 2019
Subjects:
Online Access:http://drsp.ipri.kiev.ua/article/view/179058
Tags: Add Tag
No Tags, Be the first to tag this record!
Journal Title:Data Recording, Storage & Processing

Institution

Data Recording, Storage & Processing
id drspiprikievua-article-179058
record_format ojs
spelling drspiprikievua-article-1790582019-12-10T11:54:19Z Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access. Підвищення стійкості методу захисту забезпечення автентичності растрових зображень доказової бази від несанкціонованого доступу Pavlenko, B. V. Prysiazhnyi, D. P. Karpinets, V. V. Yaremchuk, Y. Y. захист інформації стеганографія цифрові водяні знаки метод заміни найменш значущого біта метод Куттера-Джор-дана-Боссена метод Ленгелаара метод Коха-Жао information security steganography digital watermarks the least significant bit rep-lacement method Kutter-Jordan-Bossen method Lengelaar method Koch-Zhao method A method of authentication of digital images for the evidence base of the judicial system and developed the appropriate software has been proposed. The stability of existing steganographic methods for ensuring the authenticity of images is analyzed and the possibility of modifying the method is examined. As a result, the method of embedding CEH based on the Koch-Zhao method is chosen for modification. After analysing the proposed method to the set of attacks, it can be noted that the method has a high resistance to passive attacks and, unlike most methods, has high resistance to active attacks by the attacker, which is shown in the results of filter testing, cropping, rotation of the image.The obtained improved method of embedding a CEH allowed to significantly increase the resistance to unauthorized modifications, the results indicate a high level of resistance. An algorithm for the implementation of an improved method has been developed, and its software implementation has been implemented. A study of the stability of the proposed method to unauthorized modifications of digital images has been conducted. Overall, the results indicate a high level of stability, the modified method of embedding generates high-quality images with a high PSNR of 39 to 47,7 decibels when testing conventional images, and 40,6 to 51 decibels when using document shots. The worst results have been obtained by using the «salt and pepper» noise attack, which led to 14,28 % of mistakenly read bits. Tabl.: 1. Fig.: 4. Refs: 13 titles. Запропоновано метод на основі комбінації і модифікації існуючих стеганографічних методів. Визначено критерії і метрики оцінювання, за якими досліджено його стійкість до несанкціонованих модифікацій при низькому рівні спотворення. Запропонований комбінований метод увібрав у себе сильні сторони існуючих методів і показав значно вищу вказану стійкість. Метод удосконалено шляхом вбудовування цифро-вих водяних знаків за методом Коха-Жао. Цей метод представлено у формалізованій формі, розроблено алгоритм, здійснено його опис і практичну реалізацію у вигляді програмного продукту, наведено результат роботи програми. Інститут проблем реєстрації інформації НАН України 2019-11-04 Article Article application/pdf http://drsp.ipri.kiev.ua/article/view/179058 10.35681/1560-9189.2018.20.4.179058 Data Recording, Storage & Processing; Vol. 20 No. 4 (2018); 85-99 Регистрация, хранение и обработка данных; Том 20 № 4 (2018); 85-99 Реєстрація, зберігання і обробка даних; Том 20 № 4 (2018); 85-99 1560-9189 uk http://drsp.ipri.kiev.ua/article/view/179058/182519 Авторське право (c) 2021 Реєстрація, зберігання і обробка даних
institution Data Recording, Storage & Processing
baseUrl_str
datestamp_date 2019-12-10T11:54:19Z
collection OJS
language Ukrainian
topic information security
steganography
digital watermarks
the least significant bit rep-lacement method
Kutter-Jordan-Bossen method
Lengelaar method
Koch-Zhao method
spellingShingle information security
steganography
digital watermarks
the least significant bit rep-lacement method
Kutter-Jordan-Bossen method
Lengelaar method
Koch-Zhao method
Pavlenko, B. V.
Prysiazhnyi, D. P.
Karpinets, V. V.
Yaremchuk, Y. Y.
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
topic_facet захист інформації
стеганографія
цифрові водяні знаки
метод заміни найменш значущого біта
метод Куттера-Джор-дана-Боссена
метод Ленгелаара
метод Коха-Жао
information security
steganography
digital watermarks
the least significant bit rep-lacement method
Kutter-Jordan-Bossen method
Lengelaar method
Koch-Zhao method
format Article
author Pavlenko, B. V.
Prysiazhnyi, D. P.
Karpinets, V. V.
Yaremchuk, Y. Y.
author_facet Pavlenko, B. V.
Prysiazhnyi, D. P.
Karpinets, V. V.
Yaremchuk, Y. Y.
author_sort Pavlenko, B. V.
title Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
title_short Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
title_full Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
title_fullStr Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
title_full_unstemmed Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
title_sort increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
title_alt Підвищення стійкості методу захисту забезпечення автентичності растрових зображень доказової бази від несанкціонованого доступу
description A method of authentication of digital images for the evidence base of the judicial system and developed the appropriate software has been proposed. The stability of existing steganographic methods for ensuring the authenticity of images is analyzed and the possibility of modifying the method is examined. As a result, the method of embedding CEH based on the Koch-Zhao method is chosen for modification. After analysing the proposed method to the set of attacks, it can be noted that the method has a high resistance to passive attacks and, unlike most methods, has high resistance to active attacks by the attacker, which is shown in the results of filter testing, cropping, rotation of the image.The obtained improved method of embedding a CEH allowed to significantly increase the resistance to unauthorized modifications, the results indicate a high level of resistance. An algorithm for the implementation of an improved method has been developed, and its software implementation has been implemented. A study of the stability of the proposed method to unauthorized modifications of digital images has been conducted. Overall, the results indicate a high level of stability, the modified method of embedding generates high-quality images with a high PSNR of 39 to 47,7 decibels when testing conventional images, and 40,6 to 51 decibels when using document shots. The worst results have been obtained by using the «salt and pepper» noise attack, which led to 14,28 % of mistakenly read bits. Tabl.: 1. Fig.: 4. Refs: 13 titles.
publisher Інститут проблем реєстрації інформації НАН України
publishDate 2019
url http://drsp.ipri.kiev.ua/article/view/179058
work_keys_str_mv AT pavlenkobv increasingtheresilienceofthemethodofprotectiontoensuretheauthenticityofrasterimagesoftheevidencebasefromunauthorizedaccess
AT prysiazhnyidp increasingtheresilienceofthemethodofprotectiontoensuretheauthenticityofrasterimagesoftheevidencebasefromunauthorizedaccess
AT karpinetsvv increasingtheresilienceofthemethodofprotectiontoensuretheauthenticityofrasterimagesoftheevidencebasefromunauthorizedaccess
AT yaremchukyy increasingtheresilienceofthemethodofprotectiontoensuretheauthenticityofrasterimagesoftheevidencebasefromunauthorizedaccess
AT pavlenkobv pídviŝennâstíjkostímetoduzahistuzabezpečennâavtentičnostírastrovihzobraženʹdokazovoíbazivídnesankcíonovanogodostupu
AT prysiazhnyidp pídviŝennâstíjkostímetoduzahistuzabezpečennâavtentičnostírastrovihzobraženʹdokazovoíbazivídnesankcíonovanogodostupu
AT karpinetsvv pídviŝennâstíjkostímetoduzahistuzabezpečennâavtentičnostírastrovihzobraženʹdokazovoíbazivídnesankcíonovanogodostupu
AT yaremchukyy pídviŝennâstíjkostímetoduzahistuzabezpečennâavtentičnostírastrovihzobraženʹdokazovoíbazivídnesankcíonovanogodostupu
first_indexed 2025-07-17T10:57:29Z
last_indexed 2025-07-17T10:57:29Z
_version_ 1850411335058194432