Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search

Development of the method for embedding information into raster images using Lagrange interpolation and Bezier curves

https://doi.org/10.55648/1998-6920-2023-17-3-12-22

Abstract

The article is devoted to the actual direction – steganography of digital images using interpolation. The review of embedding messages methods in raster files is carried out, the steganographic method of embedding in bitmap images using Lagrange interpolation and the Bezier curve formula for five points is developed. In this paper, the protocol of the developed BCES stegosystem is considered in detail, special cases and limitations of the method are analyzed, the result of RS analysis is obtained showing the stability of the BSEC method.

About the Author

E. Y. Merzlyakova
Siberian State University of Telecommunications and Information Science (SibSUTIS)
Russian Federation

Ekaterina Y. Merzlyakova - PhD (Engineering), Docent; Docent of the Department of Applied Mathematics and Cybernetics.

630102, Novosibirsk, Kirov St. 86, phone: +7 383 2698 272



References

1. Cachin C. An information-theoretic model of steganography. Lecture Notes in Computer Science (Proc. 2nd Information Hiding Workshop). Springer Verlag, 1998, vol. 1525, pp. 306-318.

2. Kohanovich G.F., Puzyrenko A.Ju. Komp'juternaja steganografija. Teorija i praktika [Computer steganography. Theory and practice]. K., MK-Press, 2006. 288 p.

3. Sejedi S. A., Sadyhov R. H. Sravnenie metodov steganografii v izobrazhenijah [Comparison of steganography methods in images]. Informatika, 2012, no.1, pp. 66–75.

4. Gribunin V. G., Okov I. N., Turincev I. V. Cifrovaja steganografija [Digital steganography]. Moscow, SOLON-PRESS, 2017. 262 p.

5. Eltysheva E. Ju., Fionov A. N. Postroenie stegosistemy na baze rastrovyh izobrazhenij s uchetom statistiki mladshih bit [Building a stegosystem based on bitmap images, taking into account the statistics of the lower bits]. Vestnik SibGUTI, 2009, no 1, pp. 67-84.

6. Eltysheva E. Ju., Postroenie stegosistemy dlja rastrovyh izobrazhenij na osnove stohasticheskoj moduljacii s uchetom statistiki mladshih bit [Construction of the stegosystem for bitmap images based on stochastic modulation taking into account the statistics of the lower bits]. Vestnik SibGUTI, 2011, no 2, pp. 63-75.

7. Goljan M. Digital Image Steganography Using Stochastic Modulation. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, vol. 5020, Santa Clara, California, 2003, pp. 191-202.

8. Chowdhury N., Manna P. An Efficient Method of Steganography using Matrix Approach. I.J. Intelligent Systems and Applications, 2012, vol. 1, pp. 32–38.

9. Abduallah W. M., Rahma A. M. S., Pathan A.-S. K. Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach. Computers and Electrical Engineering, 2014, vol. 40, pp. 1390–1404.

10. Jung K. H., Yoo K. Y. Data hiding method using image interpolation. Comput Stand Interfaces, 2009, no. 31, iss.2, pp. 465-470.

11. Lee C-F, Huang Y-L. An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl, 2012, no. 39(8), pp. 6712-6719.

12. Ahmad A. M., Ali A. H., Mahmoud F. An improved capacity data hiding technique based on image interpolation. Multimed Tools Appl, 2019, no. 78(6), pp. 7181-7205.

13. Nagieva A. F., Verdiev S. G. Reversivnyj steganograficheskij metod sokrytija informacii, osnovannyj na interpoljacii izobrazhenij [Reversible steganographic method of information concealment based on image interpolation]. Komp'juternaja optika, 2022, vol. 46, no. 3, pp. 465-472.

14. Mahasree M. Improved Reversible Data Hiding in Medical images using Interpolation and Threshold based Embedding Strategy. International Journal of Emerging Trends in Engineering Research, vol. 8, 2020, pp. 3495-3501

15. Lu Tzu-Chuen, Huang Shi-Ru, Huang Shu-Wen Reversible hiding method for interpolation images featuring a multilayer center folding strategy. Soft Computing, vol. 25(7), 2021, pp. 161-180.

16. Evsjutin O. O., Kokurina A. S., Meshherjakov R. V. Algoritmy vstraivanija informacii v cifrovye izobrazhenija s primeneniem interpoljacii [Algorithms for embedding information into digital images using interpolation]. Doklady Tomskogo gosudarstvennogo universiteta sistem upravlenija i radiojelektroniki, 2015, no. 4(38), pp. 108-112.

17. Daiyrbayeva E., Yerimbetova A., Nechta I., Merzlyakova E., Toigozhinova A., Turganbayev A. A Study of the Information Embedding Method into Raster Image Based on Interpolation. Journal of Imaging, vol. 8(10), 2022, p. 288.

18. Fridrich J., Goljan M., Du R. Reliable Detection of LSB Steganography in Grayscale and Color Images. Special Session on Multimedia Security and Watermarking, Ottawa, Canada, 2001, pp. 27-30.

19. Gribunin V. G., Kostjukov V. E., Martynov A. P., Nikolaev D. B., Fomchenko V. N. Prikladnaja steganografija: dlja studentov, aspirantov, nauchnyh rabotnikov, izuchajushhih voprosy obespechenija bezopasnosti informacii. [Applied steganography: for students, postgraduates, researchers studying information security issues]. Sarov, Rossijskij Federal'nyj jadernyj centr, Vserossijskij nauchno-issledovatel'skij institut jeksperimental'noj fiziki, 2021. 484 p.

20. Bézier P.E. Numerical Control-Mathematics and applications. London, J. Wiley and Sons, 1972. 240 p.

21. Ntoko N.-M. A formulation for Bézier-type curves, Computers in Industry, 1990, vol. 15, iss. 4, pp. 363-368.

22. Kajla A., Acar T. Bézier–Bernstein–Durrmeyer type operators // Revista de la Real Academia de Ciencias Exactas, Fisicas y Naturales, Serie A: Matematicas, 2019, vol. 114, no. 1, pp. 1-11.

23. Wu Y., Li Xin. Curve intersection based on cubic hybrid clipping // Visual Computing for Industry, Biomedicine, and Art, 2022, vol. 5, iss.1, no. 17, pp. 1-13.


Review

For citations:


Merzlyakova E.Y. Development of the method for embedding information into raster images using Lagrange interpolation and Bezier curves. The Herald of the Siberian State University of Telecommunications and Information Science. 2023;17(3):12-22. (In Russ.) https://doi.org/10.55648/1998-6920-2023-17-3-12-22

Views: 201


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)