Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search

New method for secret message embedding in alphabetical menu

Abstract

In this article, we present a new method of steganography which allows you to embed hidden messages in the alphabetical menu. The main idea of this method consists in modification earlier known methods of automatic construction of a hierarchical menu. Here the modification implies changing the menu tree by transferring boundary elements from one submenu to another one in accordance with the hidden message. In the course of the experimental analysis it was shown that the average height of the menu tree increased by less than one. This steganography method can be used for embedding digital fingerprints or watermarks in the hierarchy of items having an alphabetical order.

About the Author

I. .. Nechta
СибГУТИ
Russian Federation


References

1. Kerckhoffs A. La cryptographie militaire // Journal des sciences militaires. 1893. V. 9. P. 5-83.

2. Qin J., Xiang X., Wang M. A Review on Detection of LSB Matching Steganography // Information Technology Journal. 2010. V. 9. P. 1725-1738.

3. Nechta I., Fionov A. Applying stat methods to text steganography // Applied Methods of Statistical Analysis. Simulations and Statistical Inference. NSTU. 20-22 September 2011. P. 278-284.

4. Hamilton J., Danicic S. A survey of static software watermarking // IEEE World Congress on Internet Security (WorldCIS). 2011. P. 100-107.

5. Schaathun H. G. On watermarking/fingerprinting for copyright protection // IEEE First International Conference on Innovative Computing, Information and Control. 2006. V. 3. P. 50-53.

6. Nechta I. Steganography in Social Networks // IEEE Siberian Symposium on Data Science and Engineering (SSDSE), Technopark of Novosibirsk Akademgorodok, Russia. 12-13 Apr. 2017. P. 33-35.

7. Нечта И. В. Алгоритм построения алфавитного меню полиномиальной сложности // Вестник СибГУТИ. 2017. № 1. С. 90-95.

8. Нечта И. В., Рябко Б. Я., Савина H. Н. Применение алфавитного кодирования для оптимизации интерфейса // Вычислительные технологии. 2015. Т. 20, № 5. С. 97-104.

9. Нечта И. В. Построение меню при помощи алфавитного кода // Вестник СибГУТИ. 2015. № 4. С. 40-46.

10. Рябко Б. Я., Фионов А. Н. Криптографические методы защиты информации: учебное пособие для вузов. М.: Горячая линия - Телеком, 2012. 229 с.

11. Zaphiris P. G. Depth vs Breath in the Arrangement of Web Links // Proceedings of the Human Factors and Ergonomics Society Annual Meeting. SAGE Publications, 2000. V. 44, № 4. P. 453-456.

12. Hick W E. On the rate of gain of information // Quarterly Journal of Experimental Psychology. 1952. V. 4. P. 11-26.

13. Fitts P. M. The information capacity of the human motor system in controlling the amplitude of movement // Journal of Experimental Psychology. 1954. V. 47 (6). P. 381-391.

14. Witten I. H., Cleary J. G., Greenberg S. On frequency-based menu-splitting algorithms // International Journal of Man-Machine Studies. 1984. V. 21, № 2. P. 135-148.

15. Newman M. E. J. Power laws, Pareto distributions and Zipfs law // Contemporary physics. 2005. V. 46, № 5. P. 323-351.

16. Winstein K. Tyrannosaurus lex 1999. [Электронный ресурс]. URL: http://web.mit.edu/keithw/tlex/ (дата обращения: 22.10.2017).


Review

For citations:


Nechta I... New method for secret message embedding in alphabetical menu. The Herald of the Siberian State University of Telecommunications and Information Science. 2018;(2):64-70. (In Russ.)

Views: 179


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)