Abstract
In this paper, we propose two block cipher modification methods that can be used for preliminary encryption of messages embedded in stego objects. These modifications preserve the cryptographic strength of the ciphers, but violate the pseudorandomness of the cryptograms, which protects the stegosystems from detection by the NIST tests. Experimental results of detection effectiveness for the stegosystems after cipher modification depending on the rate of information embedding are presented.
Similar content being viewed by others
REFERENCES
Konoplev, A.S. and Busygin, A.G., Steganographic methods of communications in distributed computing networks, ACM International Conference Proceeding Series, 2015. https://doi.org/10.1145/2799979.2800024
Fridrich, J., Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge: Cambridge Univ. Press, 2009.
Korzhik, V.I., et al., Tsifrovaya steganografiya i tsifrovye vodyanye znaki. Chast’ 1. Tsifrovaya steganografiya (Digital Steganography and Digital Watermarks. Part 1. Digital Steganography), St. Petersburg: SPbGUT, 2016.
Korzhik, V., Fedyanin, I., Godlewski, A., and Morales-Luna, G., Steganalysis based on statistical properties at the encrypted message, Lect. Notes Comput. Sci., 2017, vol. 10446, pp. 288–299.
Oswal, S., Singh, A., and Kumari, K., Deflate compression algorithm, Int. J. Eng. Res. Gen. Sci., 2016, vol. 4, no. 1, pp. 430–436.
Korzhik, V.I., et al., Osnovy kriptografii (Fundamentals of cryptography), St. Petersburg: ITs Intermediya, 2016.
Bassham, L.E., et al., A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, SP 800-22 rev. 1a, Gaithersburg, MD, 2010.
Korzhik, V.I., et al., Assessment of stegokeys for stegosystems using strong encryption of nested messages Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 3, pp. 26–36.
Sayood, K., Introduction to Data Compression, Morgan Kaufmann, Newnes, 2012.
Afsari, F., Eslami, E., and Eslami, P., Interval-valued intuitionistic fuzzy generators: Application to edge detection, J. Intell. Fuzzy Syst., 2014, vol. 27, no. 3, pp. 1309–1324.
Sallee, P., Model-based steganography, International Workshop on Digital Watermarking, Berlin–Heidelberg, 2003, pp. 154–167.
Nechta, I.V., A method for steganalysis of text data based on the use of statistical analysis, Vestn. Sib. Gos. Univ. Telekommun. Inf., 2011, no. 3, pp. 27–34.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by Yu. Kornienko
About this article
Cite this article
Korzhik, V.I., Nguyen, D.C. & Akhrameeva, K.A. An Approach to Assessing Information Security Effectiveness in Control Systems. Aut. Control Comp. Sci. 54, 879–887 (2020). https://doi.org/10.3103/S0146411620080167
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411620080167