Introduction. The paper is devoted to analysis the correlation and fractal properties of bright¬n... more Introduction. The paper is devoted to analysis the correlation and fractal properties of bright¬ness fluctuation the steganograms. The case of multistage embedding the modified stegodata in transformation domain of digital images is considered. Data hiding in transformation domain of digital images. The Gunjal method of message hiding in digital images is investigated. The method is based on usage of Arnold transform for mangling the stegodata. Embedding of modified message is carried out by applying of two-dimensional discrete wavelet transform and block two-dimensional discrete cosine transform. Multifractal detrended fluctuation analysis of digital images. The correlation and fractal characteristics of the digital images noise components are consider. It is shown the advanta¬ges of multifractal detrended fluctuation analysis over classic detrended fluctuation analysis – the representation of signal fluctuation as set of monofractal aggregates with corresponding generalized Hurst ...
Early detection of sensitive data leakage during message transmission in communication systems is... more Early detection of sensitive data leakage during message transmission in communication systems is topical task today. This is complicated by applying of attackers to advanced steganographic methods. Feature of such methods is sensitive information embedding into innocuous (cover) files, such as digital images. This drastically reduces effectiveness of modern stegdetectors based on applying of signature and statistical steganalysis methods. There are proposed several approaches for improving detection accuracy of stegdetectors that are based on image pre-processing(calibration). These methods are aimed at estimation parameters either of stego, or coverimages from current analysed image.The first group of calibration methods requires prior information about features of used embedding methods to minimize detection error. In most cases, this information is limited that decrease effectiveness of such calibration methods. The second group of calibration methodsis of special interest today...
Reliable protection of confidential data processed in critical information infrastructure element... more Reliable protection of confidential data processed in critical information infrastructure elements of public institutions and private organizations is topical task today. Of particular interest are methods to prevent the leakage of confidential data by localizing informative (dangerous) signals that both carry an informative component, and have a signal level higher than predefined threshold. The increase in signal energy from personal computers is caused by increasing of its transistors switching speed. Modern passive shielding methods for secured computers, similar to the well-known program TEMPEST, require either costly and large shielding units or technological simplification by using of low-cost fragmentary shielding of computer’s individual elements. Therefore, localization of side electromagnetic radiation produced by personal computer is needed. The paper presents a cost-effective approach to reducing the level of computer’s electromagnetic radiation by passive method. The r...
Counteraction to sensitive data leakage in cyber-physical systems is topical task today. Solving ... more Counteraction to sensitive data leakage in cyber-physical systems is topical task today. Solving of the task is complicated to widely usage by attackers of novel steganographic methods for sensitive data embeddinginto innocuous (cover)files, such as digital images. Feature of these embedding methods isminimization of cover image’s parameters alterations during message hiding. This negatively affectsdetection accuracy of formed stego images bystate-of-the-art statistical stegdetectors. Therefore, advanced methods for detection and amplification of cover image’s parameters abnormal changes caused by data embedding are needed.The novel approach for solving of mentioned task is applying of image pre-processing (calibration) methods. These methods are aimed at estimation parameters either of cover, or stego images from current analysed image.The majority of known calibration methods are based on cover image content suppression by utilization of extensive set of high-pass filters. This ma...
The paper is devoted to comparative analysis of performance the modern methods of statistical ste... more The paper is devoted to comparative analysis of performance the modern methods of statistical steganalysis in case of message hiding in digital images with usage of multidomain and multistage embedding methods. It is considered the case of applying of statistical models of cover images in spatial (SPAM model) and frequency (CC-PEV model) domains, as well as universal CDF model for revealing the stego image with messages, embedded with usage of standard (Discrete Cosine and Wavelet Transforms) and special (Singular Value Decomposition) transforms of cover images and stegodata. It is shown that applying of modern methods of statistical steganalysis allows reliably revealing stego images, formed according to multistage embedding methods. Usage special transforms of cover images, for instance Singular Value Decomposition, allows significantly decrease the performance of statistical steganalysis, which requires development of new statistical models of cover images for steganogram detection.
Ensuring the effective protection of personal and corporate sensitive data is topical task today.... more Ensuring the effective protection of personal and corporate sensitive data is topical task today. The special interest is taken at sensitive data leakage prevention during files transmission in communication systems. In most cases, these leakages are conducted by usage of advance adaptive steganographic methods. These methods are aimed at minimizing distortions of cover files, such as digital images, during data hiding that negatively impact on detection accuracy of formed stego images. For overcoming this shortcoming, it was proposed to pre-process (calibrate) analyzed images for increasing stego- to-cover ratio. The modern paradigm of image calibration is based on usage of enormous set of high-pass filters. However, selection of filter(s) that maximizes the probability of stego images detection is non-trivial task, especially in case of limited a prior knowledge about embedding methods. For solving this task, we proposed to use component analysis methods for image calibration, nam...
2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020
Today special interest is taken to early detection and counteraction to hidden (steganographic) c... more Today special interest is taken to early detection and counteraction to hidden (steganographic) communication between intruders. Such communication based on message embedding into files, for instance digital images, that are processed and transmitted in a communication system. The wide range of steganalysis methods for revealing of formed stego images was developed. Proposed stegdetectors allows achieving high detection accuracy (more than 95%) for most steganographic methods when steganalyst has access to the embedding algorithm. In case of limited a priori information about used steganographic method, when steganalyst can use only a small amount of stego images during stegdetector tuning, detection accuracy may decreases drastically. The paper is devoted to the performance analysis of state-of-the-art stegdetector based on maxSRMd2 statistical model of cover image by limited quantity of available stego images. The case of adaptive embedding of stegodata in cover image according to...
Вступ Низька ефективність проведення пасивного та активного стегоаналізу цифрових зображень (ЦЗ) ... more Вступ Низька ефективність проведення пасивного та активного стегоаналізу цифрових зображень (ЦЗ) у випадку застосування складних сучасних стег-анографічних систем обумовлює важливість та актуальність розробки но-вих методів виявлення прихованих повідомлень для запобігання несанкці-онованому витоку конфіденційної інформації з локальних обчислювальних мереж приватних підприємств та держаних установ, а також обміну інфо-рмацією між злочинними елементами [1±3]. Відомі методи вбудовування стегоданих в ЦЗ можливо розділити на два основні класи [4]: приховання повідомлень в просторовій області (Least Significant Bits (LSB) методи) та в області перетворення контейнеру (ОПК). Перевагою LSB-методів є відносна простота алгоритмів прихован-ня/екстракції повідомлень, що дозволяє проводити вбудовування стегода-них в потоковому режимі. Вагомим недоліком таких методів є значні зміни статистичних характеристик контейнеру (наприклад, гістограми яскравості ЦЗ), а також відносно низька робастність сфор...
Conceptual models of overall telecommunication system are developed and used for definition of sc... more Conceptual models of overall telecommunication system are developed and used for definition of scalable Quality of Service (QoS) Indicators towards better QoS monitoring, prediction and management. The telecom system, including calling (A), called (B)-users and terminals and Trusted Third Parties, is considered consisting of ten service stages. Each service stage, including Information Security Stage, has own characteristics of service. The QoS of the overall network and system are presented as compositions of the service stages' QoS indicators.
Creation of advanced steganalysis methods for reliably detection of hidden messages in widespread... more Creation of advanced steganalysis methods for reliably detection of hidden messages in widespread multimedia files, such as digital images, is topical task today. One of the key requirements to such methods is ability to reveal the stego files even in case of limited or absent information relating to used embedding methods. For solving this task there was proposed the multiclass stegdetector, based on applying the powerful methods of digital image structural analysis. Obtained earlier results confirmed the high efficiency of proposed stegdetector by message hiding in cover image’s transformation domain. There is conducted analysis of stegdetector performance in case of message hiding according to advanced adaptive steganogaphic methods, such as HILL, MiPOD and Synch algorithms. It is shown that usage the “extended” cover image model, includes not only statistical, but also correlation and fractal features, gives opportunity to improve the detection accuracy of stegdetector in most d...
2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2020
Nowadays, special interest is taken on transparent and reliable user authentication on mobile dev... more Nowadays, special interest is taken on transparent and reliable user authentication on mobile devices. Variety of proposed authentication methods allows developers to choose flexibly authentication methods according to predefined accuracy, usability and software (hardware) requirements. Nevertheless, implementation of these methods in real devices requires tedious performance analysis of proposed solutions in real situations. The analysis is complicated due to lack of open implementation of proposed authentication methods and results of preliminary testing on different datasets under various metrics.In this work we propose the universal system for evaluation of user authentication methods. The case of authentication on mobile devices, such as smartphones, is considered. The proposed system admits smooth processing of various user features databases without usage of specific importer modules. Imported features are analyzed for reconstruction of multimodal (behavioral) user models tha...
Counteraction to confidential information leakage in commercial and public communication systems ... more Counteraction to confidential information leakage in commercial and public communication systems is topical problem today. There is taken special interest on early detection of messages that are embedded in widespread digital media, such as audio, images, videos etc. One of the most complex cases is connected with situation of limitation or even absence of a priory information of embedding method’s features. Detection of hidden messages (stego files) requires search of cover parameters (features) that is sensitive to cover’s weak alteration during message hiding. As such features we propose to use the information-theoretic based estimation of the cover elements distribution distortion, such as Kullback-Leibler divergence, Hellinger distance etc. The paper is devoted to performance analysis of these estimations usage for revealing the stego files, formed according to advanced embedding method, such UNIWARD, MG and MiPOD algorithms. It is shown that taking into account special-purpose...
Counteraction against sensitive information leakage with usage of hidden (steganographic) communi... more Counteraction against sensitive information leakage with usage of hidden (steganographic) communication channels is topical issue today. Development of advanced side-informed message embedding methods lead to significantly increasing the robustness of formed stego files, in particular stego images, to known steganalysis methods. Providing the high accuracy of stego image detection in such case requires obtaining additional information about precover (higher-quality representation of the cover), which does not available in most cases. For increasing the accuracy of stego image detection there was proposed to use the multilevel image model. Performance analysis of multiclass stegdetector, based on mentioned model, as well as advanced statistical stegdetectors was provided. It was shown that applying the proposed multilevel image model allows significantly decrease the detection time in comparison with known statistical stegdetector by preserving the fixed accuracy of stego image detec...
The paper is devoted to analysis of effectiveness the usage of modern statistical model of digita... more The paper is devoted to analysis of effectiveness the usage of modern statistical model of digital image for revealing the stego images with data, embedded in transformation domain of cover images. It is considered the case of applying of standard Subtractive Pixel Adjacency Matrix model for detection the presence of stegodata, hidden with usage of various type the cover image transformation - Discrete Cosine Transform, Discrete Wavelets Transform, Singular Value Decomposition. It is established that accuracy of stego image detection by usage of the model rises by increasing the amount of stage the cover image processing and significantly depends on type of embedded stegodata.
Introduction. The paper is devoted to analysis the correlation and fractal properties of bright¬n... more Introduction. The paper is devoted to analysis the correlation and fractal properties of bright¬ness fluctuation the steganograms. The case of multistage embedding the modified stegodata in transformation domain of digital images is considered. Data hiding in transformation domain of digital images. The Gunjal method of message hiding in digital images is investigated. The method is based on usage of Arnold transform for mangling the stegodata. Embedding of modified message is carried out by applying of two-dimensional discrete wavelet transform and block two-dimensional discrete cosine transform. Multifractal detrended fluctuation analysis of digital images. The correlation and fractal characteristics of the digital images noise components are consider. It is shown the advanta¬ges of multifractal detrended fluctuation analysis over classic detrended fluctuation analysis – the representation of signal fluctuation as set of monofractal aggregates with corresponding generalized Hurst ...
Early detection of sensitive data leakage during message transmission in communication systems is... more Early detection of sensitive data leakage during message transmission in communication systems is topical task today. This is complicated by applying of attackers to advanced steganographic methods. Feature of such methods is sensitive information embedding into innocuous (cover) files, such as digital images. This drastically reduces effectiveness of modern stegdetectors based on applying of signature and statistical steganalysis methods. There are proposed several approaches for improving detection accuracy of stegdetectors that are based on image pre-processing(calibration). These methods are aimed at estimation parameters either of stego, or coverimages from current analysed image.The first group of calibration methods requires prior information about features of used embedding methods to minimize detection error. In most cases, this information is limited that decrease effectiveness of such calibration methods. The second group of calibration methodsis of special interest today...
Reliable protection of confidential data processed in critical information infrastructure element... more Reliable protection of confidential data processed in critical information infrastructure elements of public institutions and private organizations is topical task today. Of particular interest are methods to prevent the leakage of confidential data by localizing informative (dangerous) signals that both carry an informative component, and have a signal level higher than predefined threshold. The increase in signal energy from personal computers is caused by increasing of its transistors switching speed. Modern passive shielding methods for secured computers, similar to the well-known program TEMPEST, require either costly and large shielding units or technological simplification by using of low-cost fragmentary shielding of computer’s individual elements. Therefore, localization of side electromagnetic radiation produced by personal computer is needed. The paper presents a cost-effective approach to reducing the level of computer’s electromagnetic radiation by passive method. The r...
Counteraction to sensitive data leakage in cyber-physical systems is topical task today. Solving ... more Counteraction to sensitive data leakage in cyber-physical systems is topical task today. Solving of the task is complicated to widely usage by attackers of novel steganographic methods for sensitive data embeddinginto innocuous (cover)files, such as digital images. Feature of these embedding methods isminimization of cover image’s parameters alterations during message hiding. This negatively affectsdetection accuracy of formed stego images bystate-of-the-art statistical stegdetectors. Therefore, advanced methods for detection and amplification of cover image’s parameters abnormal changes caused by data embedding are needed.The novel approach for solving of mentioned task is applying of image pre-processing (calibration) methods. These methods are aimed at estimation parameters either of cover, or stego images from current analysed image.The majority of known calibration methods are based on cover image content suppression by utilization of extensive set of high-pass filters. This ma...
The paper is devoted to comparative analysis of performance the modern methods of statistical ste... more The paper is devoted to comparative analysis of performance the modern methods of statistical steganalysis in case of message hiding in digital images with usage of multidomain and multistage embedding methods. It is considered the case of applying of statistical models of cover images in spatial (SPAM model) and frequency (CC-PEV model) domains, as well as universal CDF model for revealing the stego image with messages, embedded with usage of standard (Discrete Cosine and Wavelet Transforms) and special (Singular Value Decomposition) transforms of cover images and stegodata. It is shown that applying of modern methods of statistical steganalysis allows reliably revealing stego images, formed according to multistage embedding methods. Usage special transforms of cover images, for instance Singular Value Decomposition, allows significantly decrease the performance of statistical steganalysis, which requires development of new statistical models of cover images for steganogram detection.
Ensuring the effective protection of personal and corporate sensitive data is topical task today.... more Ensuring the effective protection of personal and corporate sensitive data is topical task today. The special interest is taken at sensitive data leakage prevention during files transmission in communication systems. In most cases, these leakages are conducted by usage of advance adaptive steganographic methods. These methods are aimed at minimizing distortions of cover files, such as digital images, during data hiding that negatively impact on detection accuracy of formed stego images. For overcoming this shortcoming, it was proposed to pre-process (calibrate) analyzed images for increasing stego- to-cover ratio. The modern paradigm of image calibration is based on usage of enormous set of high-pass filters. However, selection of filter(s) that maximizes the probability of stego images detection is non-trivial task, especially in case of limited a prior knowledge about embedding methods. For solving this task, we proposed to use component analysis methods for image calibration, nam...
2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020
Today special interest is taken to early detection and counteraction to hidden (steganographic) c... more Today special interest is taken to early detection and counteraction to hidden (steganographic) communication between intruders. Such communication based on message embedding into files, for instance digital images, that are processed and transmitted in a communication system. The wide range of steganalysis methods for revealing of formed stego images was developed. Proposed stegdetectors allows achieving high detection accuracy (more than 95%) for most steganographic methods when steganalyst has access to the embedding algorithm. In case of limited a priori information about used steganographic method, when steganalyst can use only a small amount of stego images during stegdetector tuning, detection accuracy may decreases drastically. The paper is devoted to the performance analysis of state-of-the-art stegdetector based on maxSRMd2 statistical model of cover image by limited quantity of available stego images. The case of adaptive embedding of stegodata in cover image according to...
Вступ Низька ефективність проведення пасивного та активного стегоаналізу цифрових зображень (ЦЗ) ... more Вступ Низька ефективність проведення пасивного та активного стегоаналізу цифрових зображень (ЦЗ) у випадку застосування складних сучасних стег-анографічних систем обумовлює важливість та актуальність розробки но-вих методів виявлення прихованих повідомлень для запобігання несанкці-онованому витоку конфіденційної інформації з локальних обчислювальних мереж приватних підприємств та держаних установ, а також обміну інфо-рмацією між злочинними елементами [1±3]. Відомі методи вбудовування стегоданих в ЦЗ можливо розділити на два основні класи [4]: приховання повідомлень в просторовій області (Least Significant Bits (LSB) методи) та в області перетворення контейнеру (ОПК). Перевагою LSB-методів є відносна простота алгоритмів прихован-ня/екстракції повідомлень, що дозволяє проводити вбудовування стегода-них в потоковому режимі. Вагомим недоліком таких методів є значні зміни статистичних характеристик контейнеру (наприклад, гістограми яскравості ЦЗ), а також відносно низька робастність сфор...
Conceptual models of overall telecommunication system are developed and used for definition of sc... more Conceptual models of overall telecommunication system are developed and used for definition of scalable Quality of Service (QoS) Indicators towards better QoS monitoring, prediction and management. The telecom system, including calling (A), called (B)-users and terminals and Trusted Third Parties, is considered consisting of ten service stages. Each service stage, including Information Security Stage, has own characteristics of service. The QoS of the overall network and system are presented as compositions of the service stages' QoS indicators.
Creation of advanced steganalysis methods for reliably detection of hidden messages in widespread... more Creation of advanced steganalysis methods for reliably detection of hidden messages in widespread multimedia files, such as digital images, is topical task today. One of the key requirements to such methods is ability to reveal the stego files even in case of limited or absent information relating to used embedding methods. For solving this task there was proposed the multiclass stegdetector, based on applying the powerful methods of digital image structural analysis. Obtained earlier results confirmed the high efficiency of proposed stegdetector by message hiding in cover image’s transformation domain. There is conducted analysis of stegdetector performance in case of message hiding according to advanced adaptive steganogaphic methods, such as HILL, MiPOD and Synch algorithms. It is shown that usage the “extended” cover image model, includes not only statistical, but also correlation and fractal features, gives opportunity to improve the detection accuracy of stegdetector in most d...
2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2020
Nowadays, special interest is taken on transparent and reliable user authentication on mobile dev... more Nowadays, special interest is taken on transparent and reliable user authentication on mobile devices. Variety of proposed authentication methods allows developers to choose flexibly authentication methods according to predefined accuracy, usability and software (hardware) requirements. Nevertheless, implementation of these methods in real devices requires tedious performance analysis of proposed solutions in real situations. The analysis is complicated due to lack of open implementation of proposed authentication methods and results of preliminary testing on different datasets under various metrics.In this work we propose the universal system for evaluation of user authentication methods. The case of authentication on mobile devices, such as smartphones, is considered. The proposed system admits smooth processing of various user features databases without usage of specific importer modules. Imported features are analyzed for reconstruction of multimodal (behavioral) user models tha...
Counteraction to confidential information leakage in commercial and public communication systems ... more Counteraction to confidential information leakage in commercial and public communication systems is topical problem today. There is taken special interest on early detection of messages that are embedded in widespread digital media, such as audio, images, videos etc. One of the most complex cases is connected with situation of limitation or even absence of a priory information of embedding method’s features. Detection of hidden messages (stego files) requires search of cover parameters (features) that is sensitive to cover’s weak alteration during message hiding. As such features we propose to use the information-theoretic based estimation of the cover elements distribution distortion, such as Kullback-Leibler divergence, Hellinger distance etc. The paper is devoted to performance analysis of these estimations usage for revealing the stego files, formed according to advanced embedding method, such UNIWARD, MG and MiPOD algorithms. It is shown that taking into account special-purpose...
Counteraction against sensitive information leakage with usage of hidden (steganographic) communi... more Counteraction against sensitive information leakage with usage of hidden (steganographic) communication channels is topical issue today. Development of advanced side-informed message embedding methods lead to significantly increasing the robustness of formed stego files, in particular stego images, to known steganalysis methods. Providing the high accuracy of stego image detection in such case requires obtaining additional information about precover (higher-quality representation of the cover), which does not available in most cases. For increasing the accuracy of stego image detection there was proposed to use the multilevel image model. Performance analysis of multiclass stegdetector, based on mentioned model, as well as advanced statistical stegdetectors was provided. It was shown that applying the proposed multilevel image model allows significantly decrease the detection time in comparison with known statistical stegdetector by preserving the fixed accuracy of stego image detec...
The paper is devoted to analysis of effectiveness the usage of modern statistical model of digita... more The paper is devoted to analysis of effectiveness the usage of modern statistical model of digital image for revealing the stego images with data, embedded in transformation domain of cover images. It is considered the case of applying of standard Subtractive Pixel Adjacency Matrix model for detection the presence of stegodata, hidden with usage of various type the cover image transformation - Discrete Cosine Transform, Discrete Wavelets Transform, Singular Value Decomposition. It is established that accuracy of stego image detection by usage of the model rises by increasing the amount of stage the cover image processing and significantly depends on type of embedded stegodata.
Uploads
Papers by Dmytro Progonov