MULTIMEDIA DATA STEGANOGRAPHIC PROTECTION METHOD BASED ON PSEUDORANDOM EMBEDDING PROCEDURE
Keywords:Data protection, Steganography, Pseudo-random sequences, Logical operations
Background. Classical steganographic data protection is based on hiding the fact of secret data existence. Until this fact is disclosed, the data remains protected. However, in most of the cases, such protection is insufficient for ensuring data security. Therefore, it is common practice to combine data encryption and steganographic embedding. Recently, this approach has been used in many fields of application, including the protection of e-commerce transactions. Thus, the task of developing new, more complex methods of crypto-steganographic data protection remains topical.
Objective. The main goal is to protect the user's multimedia data by using a composite private key to limit access to this data. To achieve this goal, the research objective is to develop a steganographic method for protecting multimedia data by embedding it in pseudo-random samples of an audio file.
Methods. The proposed method is a method of combined crypto-steganographic data protection. It is based on the use of a composite private key. The method uses two pseudo-random number generators. The first generator is used in the procedure of secret data block mixing. The second generator is used in the steganographic embedding procedure to select the next sample for embedding secret data. The steganographic embedding of secret data is carried out according to the principle of bits correspondence using the result of logical operations. The method uses the natural properties of audio data, namely, their redundancy.
Results. A method for steganographic protection of multimedia data based on the pseudo-random embedding procedure has been developed. It includes three main stages. At the first stage, preliminary data preparation is fulfilled. At the second stage, the secret data block arrangement order is formed to be used while embedding. At the third stage, the steganographic embedding of secret data into the container is carried out. The proposed data processing procedures enable increasing the level of protection due to pseudo-random mixing and embedding the data.Conclusions. The developed steganographic method for protecting multimedia data uses audio data as a container for secret data steganographic embedding. It includes data processing procedures based on pseudo-random number generation algorithms. An analysis of the proposed method resistance to unauthorized access to hidden data has shown that the probability of the steganographic scheme guessing is small. The proposed method can be used in cases where steganographic protection is considered as more appropriate than cryptographic protection.
M.S. Taha et al., “Combination of steganography and cryptography: A short survey”, Inform. Technol. Commun., vol. 518, pp. 1–13, 2019. doi: 10.1088/1757-899X/518/5/052003
M. Douglas et al., “An overview of steganography techniques applied to the protection of biometric data”, Multimedia Tools and Applications, vol. 77, no. 13, pp. 17333–17373, 2018. doi: 10.1007/s11042-017-5308-3
M. Hashim et al., “An extensive analysis and conduct comparative based on statistical attach of LSB substitution and LSB matching”, Int. J. Eng. Technol., vol. 7, no. 4, pp. 4008–4023, 2018. doi: 10.14419/ijet.v7i4.16004
N. Devadiga et al., “E-banking security using cryptography, steganography and data mining”, Int. J. Comp. Appl., vol. 164, no. 9, pp. 26–30, 2017. doi: 10.5120/ijca2017913746
S. Mishra et al., “Audio steganography techniques: A survey”, Adv. Comp. Comput. Sci., vol. 554, pp. 581–589, 2018. doi: 10.1007/978-981-10-3773-3_56
M. Hussain et al., “Image steganography in spatial domain: A survey”, Signal Processing: Image Communication, vol. 65, pp. 46–66, 2018. doi: 10.1016/j.image.2018.03.012
A. Kumar and K. Pooja, “Steganography – A data hiding technique”, Int. J. Comp. Appl., vol. 9, no. 7, pp. 19–23, 2010.
M. Matsumoto and T. Nishimura, “Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator”, ACM Trans. Model. Comput. Simul., vol. 8, no. 1, pp. 3–30, 1998. doi: 10.1145/272991.272995
P. L’ecuyer, “Maximally equidistributed combined tausworthe generators”, Math. Comput., vol. 65, no. 213, pp. 203–213, 1996. doi: 10.1090/s0025-5718-96-00696-5
Z. Hu et al., “Graphical data steganographic protection method based on bits correspondence scheme”, Int. J. Intell. Syst. Appl., vol. 9, no 8, pp. 34–40, 2017. doi: 10.5815/ijisa.2017.08.04
Ye. Sulema, “Image protection method based on binary operations”, in Proc. XXIII IEEE Int. Conf. Systems, Signals and Image Processing, IWSSIP2016, Bratislava, Slovakia, 2016, pp. 295–298. doi: 10.1109/IWSSIP.2016.7502760
WAVE PCM Soundfile Format [Online]. Available: http://soundfile.sapp.org/doc/WaveFormat/
Free Lossless Audio Codec [Online]. Available: https://xiph.org/flac/
Ye. Radchenko et al., “Steganographic protection method based on Huffman tree”, Advances in Artificial Systems for Medicine and Education, vol. 902, pp. 283–292, 2019. doi: 10.1007/978-3-030-12082-5_26
Copyright (c) 2020 The Author(s)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under CC BY 4.0 that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work