Abstract
In this paper the authors propose steganographic method of bitwise information hiding, which allows embedding information in vector images by splitting point-defined curves into segments. Due to the invariance property of the curves of this type (B-splines, NURB curves, Bezier curves, Hermite curves), the proposed method will provide resistance to active attacks based on affine transformations. On the basis of the proposed method and the properties of the Bezier curves, StegoBIT algorithm was realized. This algorithm allows to embed information in the Bezier curves of the third degree and provides resistance to active attacks based on affine transformations. An experimental study of the stability of proposed algorithm for affine transformations was carried out. 30 arbitrary SVG images were selected for the experiment. Their structural configuration contained parameters for constructing Bezier curves. The information of different sizes was hidden in the curves, by way of its gradual division into visually identical sets of segments. The affine transformations such as transfer, rotation, almost rotation, biasing for the abscissa and ordinate axis and proportional and disproportional scaling was gradually carried out with the obtained steganocontainer. The obtained results of the experiment demonstrate the effectiveness and stability of the proposed StegoBIT algorithm to various transformations that are based on affine transformations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agranovsky, A.V., Derevyanin, P.N., Hady, R.A.: Basics of computer steganography, Radio and connection, Moscow, Russia (2003)
Azhbaev, T.G., Azhmukhamedov, I.M.: The analysis of resistance of modern steganos algorithms, pp. 56–61 (2008)
Bakhrushina, G.I.: Modeling geometric attacks based on affine transformations. Sci. Notes PNU 4(4), 1291–1297 (2013)
Danik, Yu., Hryschuk, R., Gnatyuk, S.: Synergistic effects of information and cybernetic interaction in civil aviation. Aviation 20(3), 137–144 (2016)
Hu, Z., Gnatyuk, S., Koval, O., Gnatyuk, V., Bondarovets, S.: Anomaly detection system in secure cloud computing environment. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(4), 10–21 (2017). https://doi.org/10.5815/ijcnis.2017.04.02
Hu, Z., Gnatyuk, V., Sydorenko, V., Odarchenko, R., Gnatyuk, S.: Method for cyberincidents network-centric monitoring in critical information infrastructure. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(6), 30–43 (2017). https://doi.org/10.5815/ijcnis.2017.06.04
Golovanov, N.N.: Geometric Modeling. Publishing House of Physicomathematical Literature, Moscow (2002)
Kinzeryavyy, O.M.: Steganographic methods of hiding data in vector images that are resisted to active attacks based on affine transformations, National Aviation University, Kyiv (2015)
Matsenko, V.G.: Computer Graphics, Ruta, Chernovtsy, Ukraine (2002)
Niu, X., Shao, C., Wang, X.: A survey of digital vector map watermarking. Int. J. Innov. Comput. Inf. Control ICIC Int. 2(6), 1301–1316 (2006)
Rodjers, D., Adams, J.: Mathematical Foundations of Computer Graphics, Mir, Moscow, Russia (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Kinzeryavyy, O., Kinzeriava, I., Olenyuk, A., Sulkowsky, K. (2019). Steganographic Method of Bitwise Information Hiding in Point-Defined Curves of Vector Images. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education. ICCSEEA 2018. Advances in Intelligent Systems and Computing, vol 754. Springer, Cham. https://doi.org/10.1007/978-3-319-91008-6_48
Download citation
DOI: https://doi.org/10.1007/978-3-319-91008-6_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91007-9
Online ISBN: 978-3-319-91008-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)