Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
A method of authentication of digital images for the evidence base of the judicial system and developed the appropriate software has been proposed. The stability of existing steganographic methods for ensuring the authenticity of images is analyzed and the possibility of modifying the method is exam...
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | , , , |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2019
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/179058 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & Processing| id |
drspiprikievua-article-179058 |
|---|---|
| record_format |
ojs |
| spelling |
drspiprikievua-article-1790582019-12-10T11:54:19Z Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access. Підвищення стійкості методу захисту забезпечення автентичності растрових зображень доказової бази від несанкціонованого доступу Pavlenko, B. V. Prysiazhnyi, D. P. Karpinets, V. V. Yaremchuk, Y. Y. захист інформації стеганографія цифрові водяні знаки метод заміни найменш значущого біта метод Куттера-Джор-дана-Боссена метод Ленгелаара метод Коха-Жао information security steganography digital watermarks the least significant bit rep-lacement method Kutter-Jordan-Bossen method Lengelaar method Koch-Zhao method A method of authentication of digital images for the evidence base of the judicial system and developed the appropriate software has been proposed. The stability of existing steganographic methods for ensuring the authenticity of images is analyzed and the possibility of modifying the method is examined. As a result, the method of embedding CEH based on the Koch-Zhao method is chosen for modification. After analysing the proposed method to the set of attacks, it can be noted that the method has a high resistance to passive attacks and, unlike most methods, has high resistance to active attacks by the attacker, which is shown in the results of filter testing, cropping, rotation of the image.The obtained improved method of embedding a CEH allowed to significantly increase the resistance to unauthorized modifications, the results indicate a high level of resistance. An algorithm for the implementation of an improved method has been developed, and its software implementation has been implemented. A study of the stability of the proposed method to unauthorized modifications of digital images has been conducted. Overall, the results indicate a high level of stability, the modified method of embedding generates high-quality images with a high PSNR of 39 to 47,7 decibels when testing conventional images, and 40,6 to 51 decibels when using document shots. The worst results have been obtained by using the «salt and pepper» noise attack, which led to 14,28 % of mistakenly read bits. Tabl.: 1. Fig.: 4. Refs: 13 titles. Запропоновано метод на основі комбінації і модифікації існуючих стеганографічних методів. Визначено критерії і метрики оцінювання, за якими досліджено його стійкість до несанкціонованих модифікацій при низькому рівні спотворення. Запропонований комбінований метод увібрав у себе сильні сторони існуючих методів і показав значно вищу вказану стійкість. Метод удосконалено шляхом вбудовування цифро-вих водяних знаків за методом Коха-Жао. Цей метод представлено у формалізованій формі, розроблено алгоритм, здійснено його опис і практичну реалізацію у вигляді програмного продукту, наведено результат роботи програми. Інститут проблем реєстрації інформації НАН України 2019-11-04 Article Article application/pdf http://drsp.ipri.kiev.ua/article/view/179058 10.35681/1560-9189.2018.20.4.179058 Data Recording, Storage & Processing; Vol. 20 No. 4 (2018); 85-99 Регистрация, хранение и обработка данных; Том 20 № 4 (2018); 85-99 Реєстрація, зберігання і обробка даних; Том 20 № 4 (2018); 85-99 1560-9189 uk http://drsp.ipri.kiev.ua/article/view/179058/182519 Авторське право (c) 2021 Реєстрація, зберігання і обробка даних |
| institution |
Data Recording, Storage & Processing |
| baseUrl_str |
|
| datestamp_date |
2019-12-10T11:54:19Z |
| collection |
OJS |
| language |
Ukrainian |
| topic |
information security steganography digital watermarks the least significant bit rep-lacement method Kutter-Jordan-Bossen method Lengelaar method Koch-Zhao method |
| spellingShingle |
information security steganography digital watermarks the least significant bit rep-lacement method Kutter-Jordan-Bossen method Lengelaar method Koch-Zhao method Pavlenko, B. V. Prysiazhnyi, D. P. Karpinets, V. V. Yaremchuk, Y. Y. Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access. |
| topic_facet |
захист інформації стеганографія цифрові водяні знаки метод заміни найменш значущого біта метод Куттера-Джор-дана-Боссена метод Ленгелаара метод Коха-Жао information security steganography digital watermarks the least significant bit rep-lacement method Kutter-Jordan-Bossen method Lengelaar method Koch-Zhao method |
| format |
Article |
| author |
Pavlenko, B. V. Prysiazhnyi, D. P. Karpinets, V. V. Yaremchuk, Y. Y. |
| author_facet |
Pavlenko, B. V. Prysiazhnyi, D. P. Karpinets, V. V. Yaremchuk, Y. Y. |
| author_sort |
Pavlenko, B. V. |
| title |
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access. |
| title_short |
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access. |
| title_full |
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access. |
| title_fullStr |
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access. |
| title_full_unstemmed |
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access. |
| title_sort |
increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access. |
| title_alt |
Підвищення стійкості методу захисту забезпечення автентичності растрових зображень доказової бази від несанкціонованого доступу |
| description |
A method of authentication of digital images for the evidence base of the judicial system and developed the appropriate software has been proposed. The stability of existing steganographic methods for ensuring the authenticity of images is analyzed and the possibility of modifying the method is examined. As a result, the method of embedding CEH based on the Koch-Zhao method is chosen for modification. After analysing the proposed method to the set of attacks, it can be noted that the method has a high resistance to passive attacks and, unlike most methods, has high resistance to active attacks by the attacker, which is shown in the results of filter testing, cropping, rotation of the image.The obtained improved method of embedding a CEH allowed to significantly increase the resistance to unauthorized modifications, the results indicate a high level of resistance. An algorithm for the implementation of an improved method has been developed, and its software implementation has been implemented. A study of the stability of the proposed method to unauthorized modifications of digital images has been conducted. Overall, the results indicate a high level of stability, the modified method of embedding generates high-quality images with a high PSNR of 39 to 47,7 decibels when testing conventional images, and 40,6 to 51 decibels when using document shots. The worst results have been obtained by using the «salt and pepper» noise attack, which led to 14,28 % of mistakenly read bits. Tabl.: 1. Fig.: 4. Refs: 13 titles. |
| publisher |
Інститут проблем реєстрації інформації НАН України |
| publishDate |
2019 |
| url |
http://drsp.ipri.kiev.ua/article/view/179058 |
| work_keys_str_mv |
AT pavlenkobv increasingtheresilienceofthemethodofprotectiontoensuretheauthenticityofrasterimagesoftheevidencebasefromunauthorizedaccess AT prysiazhnyidp increasingtheresilienceofthemethodofprotectiontoensuretheauthenticityofrasterimagesoftheevidencebasefromunauthorizedaccess AT karpinetsvv increasingtheresilienceofthemethodofprotectiontoensuretheauthenticityofrasterimagesoftheevidencebasefromunauthorizedaccess AT yaremchukyy increasingtheresilienceofthemethodofprotectiontoensuretheauthenticityofrasterimagesoftheevidencebasefromunauthorizedaccess AT pavlenkobv pídviŝennâstíjkostímetoduzahistuzabezpečennâavtentičnostírastrovihzobraženʹdokazovoíbazivídnesankcíonovanogodostupu AT prysiazhnyidp pídviŝennâstíjkostímetoduzahistuzabezpečennâavtentičnostírastrovihzobraženʹdokazovoíbazivídnesankcíonovanogodostupu AT karpinetsvv pídviŝennâstíjkostímetoduzahistuzabezpečennâavtentičnostírastrovihzobraženʹdokazovoíbazivídnesankcíonovanogodostupu AT yaremchukyy pídviŝennâstíjkostímetoduzahistuzabezpečennâavtentičnostírastrovihzobraženʹdokazovoíbazivídnesankcíonovanogodostupu |
| first_indexed |
2025-07-17T10:57:29Z |
| last_indexed |
2025-07-17T10:57:29Z |
| _version_ |
1850411335058194432 |