Skip to main content
Log in

An Approach to Assessing Information Security Effectiveness in Control Systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In this paper, we propose two block cipher modification methods that can be used for preliminary encryption of messages embedded in stego objects. These modifications preserve the cryptographic strength of the ciphers, but violate the pseudorandomness of the cryptograms, which protects the stegosystems from detection by the NIST tests. Experimental results of detection effectiveness for the stegosystems after cipher modification depending on the rate of information embedding are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. Konoplev, A.S. and Busygin, A.G., Steganographic methods of communications in distributed computing networks, ACM International Conference Proceeding Series, 2015. https://doi.org/10.1145/2799979.2800024

  2. Fridrich, J., Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge: Cambridge Univ. Press, 2009.

    Book  Google Scholar 

  3. Korzhik, V.I., et al., Tsifrovaya steganografiya i tsifrovye vodyanye znaki. Chast’ 1. Tsifrovaya steganografiya (Digital Steganography and Digital Watermarks. Part 1. Digital Steganography), St. Petersburg: SPbGUT, 2016.

  4. Korzhik, V., Fedyanin, I., Godlewski, A., and Morales-Luna, G., Steganalysis based on statistical properties at the encrypted message, Lect. Notes Comput. Sci., 2017, vol. 10446, pp. 288–299.

    Article  Google Scholar 

  5. Oswal, S., Singh, A., and Kumari, K., Deflate compression algorithm, Int. J. Eng. Res. Gen. Sci., 2016, vol. 4, no. 1, pp. 430–436.

    Google Scholar 

  6. Korzhik, V.I., et al., Osnovy kriptografii (Fundamentals of cryptography), St. Petersburg: ITs Intermediya, 2016.

  7. Bassham, L.E., et al., A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, SP 800-22 rev. 1a, Gaithersburg, MD, 2010.

  8. Korzhik, V.I., et al., Assessment of stegokeys for stegosystems using strong encryption of nested messages Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 3, pp. 26–36.

  9. Sayood, K., Introduction to Data Compression, Morgan Kaufmann, Newnes, 2012.

  10. Afsari, F., Eslami, E., and Eslami, P., Interval-valued intuitionistic fuzzy generators: Application to edge detection, J. Intell. Fuzzy Syst., 2014, vol. 27, no. 3, pp. 1309–1324.

    Article  MathSciNet  Google Scholar 

  11. Sallee, P., Model-based steganography, International Workshop on Digital Watermarking, Berlin–Heidelberg, 2003, pp. 154–167.

  12. Nechta, I.V., A method for steganalysis of text data based on the use of statistical analysis, Vestn. Sib. Gos. Univ. Telekommun. Inf., 2011, no. 3, pp. 27–34.

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to V. I. Korzhik, D. C. Nguyen or K. A. Akhrameeva.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by Yu. Kornienko

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Korzhik, V.I., Nguyen, D.C. & Akhrameeva, K.A. An Approach to Assessing Information Security Effectiveness in Control Systems. Aut. Control Comp. Sci. 54, 879–887 (2020). https://doi.org/10.3103/S0146411620080167

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411620080167

Keywords:

Navigation