Embedding of Stego–Messages in Monochrome Images on the Base of Rank Filtering

  • Larisa Dobryakova
  • Orest Popov
Conference paper


In this article the embedding of stego–messages in media data is analyzed. Least Significant Bits of samples of data are modified on the base of a double rank filtering. The experimental inspection of algorithms correctness and the calculation of magnitude of container distortion are carried out. It is shown, that the average size of deviation decreases twice


Mean Square Error Media Data Secret Message Digital Watermark Monochrome Image 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Matsiu K., Tanaka K., Nakamura Y. Digital signature on a facsimile document by recursive MH coding// Symposium On Cryptography and Information Security, 1989.Google Scholar
  2. [2]
    Gribunin V.G., Okov I. N., Turintsev I.V. Digital steganography// Moscow. SOLON–PRESS. 2002.(in Russian)Google Scholar
  3. [3]
    Petitcolas F., Anderson R. Information Hiding – A Survey// Proceedings IEEE, Special Issue on Identification and Protection of Multimedia Information. 1999, #7.Google Scholar
  4. [4]
    Dobryakova L., Ochin E. Embedding of digital watermarks in media data on base a median filtering// Works of VI International conference ,, The Analysis, prediction and management in difficult systems”//Saint Petersburg// Publishing house ,,System”, 2005. (in Russian)Google Scholar
  5. [5]
    E. Ochin, L. Dobryakova. Architecture of processors a median filtering in steganography systems on a base of media data// Methods of computer science of management // Poland, Szczecin, 2005. (in Polish)Google Scholar
  6. [6]
    Bender W., Gruhl B., Morimoto N., Lu A. Techniques for data hiding // IBM systems journal. 1996, vol.35, # 3.Google Scholar
  7. [7]
    Kornatowski E, Kowalski J., Algorithms of digital processing of signals// Electric faculty The Technical University of Szczecin, Szczecin, 2000. (in Polish)Google Scholar
  8. [8]
    Konahovich G., Puzyrenko A., A komputer steganography. The theory and practice// MK–Press, Kiev, 2006. (in Russian)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Larisa Dobryakova
    • 1
  • Orest Popov
    • 1
  1. 1.Faculty of computer science Szczecin University of TechnologyPoland

Personalised recommendations