V. Barannik, Oleg Shatun, D. Barannik, V. Kobtseva
{"title":"集装箱图像轮廓中间接隐写数据隐藏方法的研究","authors":"V. Barannik, Oleg Shatun, D. Barannik, V. Kobtseva","doi":"10.5604/01.3001.0012.8016","DOIUrl":null,"url":null,"abstract":"The article discusses issues related to the use of methods of digital steganography for information security in systems of critical appointment. The advantages of using data embedding in an image container are shown. The main disadvantages of the existing methods of embedding in the image container are given. The issues of JPEG image compression for digital steganography are described. The allocation of stable regions in the attacking effects on the basis of the moving mask is proposed. The mathematical apparatus for masking images by the Sobel method is shown. The indirect steganography method of hiding data in blocks which contain information about the circuit is developed.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DEVELOPMENT OF THE METHOD OF INDIRECT STEGANOGRAPHIC DATA HIDING IN THE CONTAINER IMAGE CONTOUR\",\"authors\":\"V. Barannik, Oleg Shatun, D. Barannik, V. Kobtseva\",\"doi\":\"10.5604/01.3001.0012.8016\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article discusses issues related to the use of methods of digital steganography for information security in systems of critical appointment. The advantages of using data embedding in an image container are shown. The main disadvantages of the existing methods of embedding in the image container are given. The issues of JPEG image compression for digital steganography are described. The allocation of stable regions in the attacking effects on the basis of the moving mask is proposed. The mathematical apparatus for masking images by the Sobel method is shown. The indirect steganography method of hiding data in blocks which contain information about the circuit is developed.\",\"PeriodicalId\":53131,\"journal\":{\"name\":\"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5604/01.3001.0012.8016\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5604/01.3001.0012.8016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
DEVELOPMENT OF THE METHOD OF INDIRECT STEGANOGRAPHIC DATA HIDING IN THE CONTAINER IMAGE CONTOUR
The article discusses issues related to the use of methods of digital steganography for information security in systems of critical appointment. The advantages of using data embedding in an image container are shown. The main disadvantages of the existing methods of embedding in the image container are given. The issues of JPEG image compression for digital steganography are described. The allocation of stable regions in the attacking effects on the basis of the moving mask is proposed. The mathematical apparatus for masking images by the Sobel method is shown. The indirect steganography method of hiding data in blocks which contain information about the circuit is developed.