Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Editorial collegium > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Copyright & Licensing Policy > Publication in 72 hours: How do we do it? > Digital archiving policy > Open Access Policy > Open access publishing costs > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

Публикация за 72 часа - теперь это реальность!
При необходимости издательство предоставляет авторам услугу сверхсрочной полноценной публикации. Уже через 72 часа статья появляется в числе опубликованных на сайте издательства с DOI и номерами страниц.
По первому требованию предоставляем все подтверждающие публикацию документы!
MAIN PAGE > Back to contents
Security Issues

The algorithm of data embedding and retrieving from stationary digital images, resistant to passive steganoanalytic attacks
Baltaev Rodion Khamzaevich

PhD in Technical Science

Senior Lecturer, Department of Radio Electronics and Information Protection, Perm State National Research University

614990, Russia, Permskii krai, g. Perm', ul. Bukireva, 15

Другие публикации этого автора

Lunegov Igor' Vladimirovich

PhD in Physics and Mathematics

Associate Professor at the Department of Radioelectronics and Information Protection of Perm State University

614990, Russia, Perm, ul. Bukireva, 15

Другие публикации этого автора



The research subject is the steganographic methods of information protection. There are two key ways to protect information – cryptographic and steganographic. Cryptographic methods conceal only the contents of the transmitted information. At that, the fact of transmission of the codified data can draw the attention of an intruder who can use the successful cryptographic attacks, aimed at the loss of confidentiality. Steganographic methods hide not only the contents of the information sent, but also the very fact of sending. Steganography and cryptography are complementary methods, which, used together, can significantly increase the safety of the transmitted data. Therefore, it is necessary to develop not only cryptographic, but also steganographic methods of data protection, which should be resistant to the detection of the process of sending. The research methodology contains the passive methods of analysis of detection of the information, embedded in the image, including statistical and visual methods. The novelty of the study consists in the development of the steganographic system of data protection on the base of the proposed original algorithm of embedding the information by the coverage of the image block in lines and columns. The authors demonstrate that this steganographic system maintains its resistance to passive steganoanalytic attacks when the blocks up to 24x24 pixels are covered, and with this coverage degree it is more resistant than the standard and the advanced steganographic methods based on the direct spectrum broadening. 

Keywords: LDPC code, CIEDE2000, digital images, information embedding algorithm, direct spectrum broadening, virtual steganalysis, statistical steganalysis, passive steganalysis, steganography, data protection



Article was received:


Review date:


Publish date:


This article written in Russian. You can find full text of article in Russian here .

Baltaev R. Kh., Lunegov I. V. Model' avtoregressii v steganograficheskom metode na osnove pryamogo rasshireniya spektra // Voprosy zashchity informatsii. 2015. №3. S. 73-78.
Baltaev R. Kh., Lunegov I. V. Dvumernyi avtoregressionnyi protsess v steganograficheskom metode na osnove pryamogo rasshireniya spektra // Bezopasnost' informatsionnykh tekhnologii. 2016. №2. S. 5-11.
Baltaev R. Kh., Lunegov I. V. Uvelichenie kolichestva peredavaemoi informatsii v steganograficheskoi sisteme na osnove metoda pryamogo rasshireniya spektra // Izv. vuzov. Priborostroenie. 2016. T. 59, № 9. S. 717-722.
Manveer K., Gagandeep K. Review of Various Steganalysis Techniques // International Journal of Computer Science and Information Technologies, 2014. vol. 5. pp. 1744-1747.
Mandal, P. C., Poddar B.P. An extensive review of current trends in steganalysis // International Journal of Advanced Research in Computer Engineering and Technology, 2012. vol. 1. pp. 215-220.
Nissar A., Mir A.H. Classification of steganalysis techniques: A study // Digital Signal Processing, 2010. vol. 20. pp. 1758-1770.
Narimanova E. V., Trifonova E. A., Kilin A. E., Kuchma M. S. Metodika kolichestvennoi otsenki nadezhnosti vospriyatiya tsifrovogo izobrazheniya // Іnformatika ta matematichnі metodi v modelyuvannі.-2014.-T. 4, № 4.-S. 332-336.
Gribunin V. G., Okov I. N., Turintsev I. V. Tsifrovaya steganografiya. – M.: SOLON-PRESS, 2009. – 272 s.
Sharma G. Digital Color Imaging Handbook. N. Y.: CRC Press, 2003. 592 p.
Sharma G., Wu W., Dalal E. N. The CIEDE2000 color-difference formula: Implementation notes, supplementary test data, and mathematical observations // Color Research and Application. 2005. Vol. 30, N 1. P. 21—30.
He L., Gao X., Lu W., Li X., Tao D. Image quality assessment based on S-CIELAB model // Signal, Image and Video Processing. 2011. Vol. 5, N 3. P. 283—290.
Gerling E. Yu. Issledovanie i razrabotka metodov obnaruzheniya stegovlozhenii v nepodvizhnykh izobrazheniyakh. Diss. na soisk. uch. st. kand. tekhn. nauk po spets. 05.12.13. Sankt-Peterburg, 2014.-211 s.
Schaefer G., Stich M. UCID – An uncompressed colour image database // Proc. SPIE, storage and retrieval methods and applications for multimedia. – 2004. – P. 472-480.
Fawcett T. An introduction to ROC analysis // Pattern Recognition Letters, 2006. vol. 27, № 8, pp. 861-874.
Powers D. M. W. Evaluation: From Precision, Recall and F-Factor to ROC, Informedness, Markedness and Correlation, 2011. vol. 2, № 1, pp. 37-63.
Nissar A., Mir A.H. Classification of steganalysis techniques: A study // Digital Signal Processing, 2010. vol. 20. pp. 1758-1770.
Dong J., Tan T. Blind image steganalysis based on run-length histogram analysis // 15th IEEE International Conference on Image Processing, 2008. pp. 2064-2067.
Cachin C. An information theoretic model for steganography // Proc. of 2nd workshop on information hiding-N. Y.: Springer-Verlag, 1998.-V. 1525.-P. 306-318
Link to this article

You can simply select and copy link from below text field.

Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website