Skip to main content

Finding the Fact of Transfer of the Embedded Information on the Basis of Statistical Methods of Pattern Recognition and Machine Learning

  • Conference paper
  • First Online:
Engineer of the XXI Century (EngineerXXI 2018)

Part of the book series: Mechanisms and Machine Science ((Mechan. Machine Science,volume 70))

Abstract

The aim of this article is the creation systems of stegoanalysis that can analyze the data flow in the communication channel to detect the fact of transmitting embedded information. As the communication channel is used images, video, speech (audio). To find the fact of transfer of the embedded information, proposed to apply machine learning techniques and statistical methods of learning in pattern recognition theory.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schneier, B.: Secrets and Lie, 432 pp. Wiley (2000)

    Google Scholar 

  2. Khan, I., Abdullah, H., Zainal, M.S.B.: Efficient eyes and mouth detection algorithm using combination of Viola Jones and skin color pixel detection. Int. J. Eng. Appl. Sci. 3(4) (2013)

    Google Scholar 

  3. Kustov, V.N., Fedchuk, A.A.: Methods of embedding hidden messages. Information security. Confidant, (3), 34 pp. (2000)

    Google Scholar 

  4. Dua, S., Du, X.: Data mining and machine learning in cybersecurity. Auerbach Publications (2016)

    Google Scholar 

  5. Gorelik Jr., A.L.: Systematycheskye aspects of the problem raspoznavanyya objects and phenomena. Radiotechnics 9, 13–16 (1990)

    Google Scholar 

  6. Гoнcaлec, P. Цифpoвaя oбpaбoткa изoбpaжeний / P. Гoнcaлec, P. Byдc; пep. c aнгл.П.A. Чoчиa. — M.: Texнocфepa, 2006. — 1070 c

    Google Scholar 

  7. Шмaтoк C. O., Шмaтoк O. C., Пeтpeнкo A. Б. Oцiнювaння eфeктивнocтi тa пopiвняння cтpaтeгiй (piшeнь) зa нaявнocтi нeвизнaчeниx фaктopiв //Hayкoємнi тexнoлoгiї. (25)1 27–32 (2015)

    Google Scholar 

  8. Levin, B.R.: Theoretical Fundamentals statystycheskoy Radiotechnics, 3rd edn. M.: Radio and Communication, 656 pp. (1989)

    Google Scholar 

  9. Hrybunyn, V.G.: Tsyfrovaya Steganography. Solon-Press (2002)

    Google Scholar 

  10. Veselska, O., Shmatok, O.: Aplication of algorithm of wavelet transformations in steganographic analysts, VI Międzyuczelnianej Konferencji Studentów oraz Doktorantów, 8 grudnia 2017 r.: - Bielska-Biała: ATH, 2017 r. - S. 415 – 420

    Google Scholar 

  11. Циpлoв B.Л. Ocнoвы инфopмaциoннoй бeзoпacнocти aвтoмaтизиpoвaнныx cиcтeм. Кpaткий кypc – M.; Фeникc, 2008. – 174 c

    Google Scholar 

  12. Лeмeшкo Б. Ю., Чимитoвa E. B. Oб oшибкax и нeвepныx дeйcтвияx, coвepшaeмыx пpи иcпoльзoвaнии кpитepиeв coглacия типa χ2 //Измepитeльнaя тexникa. – 2002. – №. 6. – C. 5–11

    Google Scholar 

  13. Ceнин A.Г. Pacпoзнaвaниe cлyчaйныx cигнaлoв. Hoвocибиpcк: Hayкa, 1974. 76 c

    Google Scholar 

  14. Mилeнький A.B. Клaccификaция cигнaлoв в ycлoвияx нeoпpeдeлeннocти. M.: Coвeтcкoe paдиo, 1975. 328 c

    Google Scholar 

  15. Бopoдaчёв C. M. Teopия пpинятия peшeний. Учeбнoe пocoбиe. – Eкaтepинбypг: Издaтeльcтвo Уpaльcкoгo yнивepcитeтa, 2014. – 124 c

    Google Scholar 

  16. Лeпcкий A. E., Бpoнeвич A. Г. Maтeмaтичecкиe мeтoды pacпoзнaвaния oбpaзoв //Taгaнpoг: Изд-вo TTИ ЮФУ. – 2009

    Google Scholar 

  17. Шмaтoк C. O., Пeтpeнкo A. Б., Шмaтoк O. C. Poзpiзнeння cигнaлiв y нeлiнiйниx дeтepмiнoвaниx cтeжниx cиcтeмax //Hayкoємнi тexнoлoгiї. (32)4 375–382 (2016)

    Google Scholar 

  18. Westphal, C.: Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies. CRC Press (2008)

    Google Scholar 

  19. O’Harrow, R., Jr.: U.S., company officials: internet surveillance does not indiscriminately mine data

    Google Scholar 

  20. Veselska O, Shmatok O. Nowoczesne metody wykrywynia ukrytych informacji w obrazach statycznych//VII Międzyuczelnianej Konferencji Studentów oraz Doktorantów, 8 grudnia 2017 r.: - Bielska-Biała: ATH, 2017 r. - S. 377–382

    Google Scholar 

  21. Gul, G., Kurugollu, F.: SVD-based universal spatial domain image steganalysis. IEEE Trans. Inf. Forensics Secur. 5(2), 349–353 (2010)

    Google Scholar 

  22. Barannik, V., et al.: Video data compression methods in the decision support systems. In: International Conference on Theory and Applications of Fuzzy Systems and Soft Computing, pp. 301–308. Springer, Cham (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to O. Veselska .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shmatok, O., Veselska, O. (2020). Finding the Fact of Transfer of the Embedded Information on the Basis of Statistical Methods of Pattern Recognition and Machine Learning. In: Zawiślak, S., Rysiński, J. (eds) Engineer of the XXI Century. EngineerXXI 2018. Mechanisms and Machine Science, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-13321-4_20

Download citation

Publish with us

Policies and ethics