{"title":"隐写问题中的容噪编码","authors":"V. Kustov, A. Krasnov","doi":"10.1109/TELSIKS52058.2021.9606363","DOIUrl":null,"url":null,"abstract":"The article deals with the problem of masking hidden messages under natural noise in highly undetectable stegosystems ±1HUGO and ⊕HUGO. According to the Arnold cat map algorithm, a preliminary discrete chaotic transformation of the hidden message ensures high resistance of stegosystems from hacking. Further, in their research, the authors effectively apply noise-tolerant coding for the covering object and stego using a self-orthogonal code. The model of a binary synchronous communication channel with interference is used to model the data transmission channel. The article also presents simulation modeling results, confirming the high resistance of the proposed stegosystems to hacking.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Noise-tolerant Coding in Steganography Problems\",\"authors\":\"V. Kustov, A. Krasnov\",\"doi\":\"10.1109/TELSIKS52058.2021.9606363\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article deals with the problem of masking hidden messages under natural noise in highly undetectable stegosystems ±1HUGO and ⊕HUGO. According to the Arnold cat map algorithm, a preliminary discrete chaotic transformation of the hidden message ensures high resistance of stegosystems from hacking. Further, in their research, the authors effectively apply noise-tolerant coding for the covering object and stego using a self-orthogonal code. The model of a binary synchronous communication channel with interference is used to model the data transmission channel. The article also presents simulation modeling results, confirming the high resistance of the proposed stegosystems to hacking.\",\"PeriodicalId\":228464,\"journal\":{\"name\":\"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TELSIKS52058.2021.9606363\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TELSIKS52058.2021.9606363","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The article deals with the problem of masking hidden messages under natural noise in highly undetectable stegosystems ±1HUGO and ⊕HUGO. According to the Arnold cat map algorithm, a preliminary discrete chaotic transformation of the hidden message ensures high resistance of stegosystems from hacking. Further, in their research, the authors effectively apply noise-tolerant coding for the covering object and stego using a self-orthogonal code. The model of a binary synchronous communication channel with interference is used to model the data transmission channel. The article also presents simulation modeling results, confirming the high resistance of the proposed stegosystems to hacking.