Chapter

Steganographic Method of Bitwise Information Hiding in Point-Defined Curves of Vector Images

Authors:
Chapter

Steganographic Method of Bitwise Information Hiding in Point-Defined Curves of Vector Images

If you want to read the PDF, try requesting it from the authors.

Abstract

In this paper the authors propose steganographic method of bitwise information hiding, which allows embedding information in vector images by splitting point-defined curves into segments. Due to the invariance property of the curves of this type (B-splines, NURB curves, Bezier curves, Hermite curves), the proposed method will provide resistance to active attacks based on affine transformations. On the basis of the proposed method and the properties of the Bezier curves, StegoBIT algorithm was realized. This algorithm allows to embed information in the Bezier curves of the third degree and provides resistance to active attacks based on affine transformations. An experimental study of the stability of proposed algorithm for affine transformations was carried out. 30 arbitrary SVG images were selected for the experiment. Their structural configuration contained parameters for constructing Bezier curves. The information of different sizes was hidden in the curves, by way of its gradual division into visually identical sets of segments. The affine transformations such as transfer, rotation, almost rotation, biasing for the abscissa and ordinate axis and proportional and disproportional scaling was gradually carried out with the obtained steganocontainer. The obtained results of the experiment demonstrate the effectiveness and stability of the proposed StegoBIT algorithm to various transformations that are based on affine transformations.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... So an interesting area of research is the development of methods of hiding information in the objects of vector graphics. Known results in this direction are given in [10,15,20,25,28]. ...
... One of the latest works in the field of hiding information in vector images is an article [15] and a dissertation [14]. The authors thoroughly investigate different options for concealment, in particular, proposed two new methods (bitwise and pattern-based). ...
... These techniques can be applied to a wide range of mathematical vector graphics objects. The most interesting and useful developments in [14,15] are a certain protection against active attacks based on affine transformations. Indeed, the proposed techniques are based on the division of point curves (Bsplines, NURB curves, Bezier curves, Hermitian curves) into segments. ...
Article
Full-text available
In recent years, new steganographic methods have emerged to hide information in various multimedia files, such as images, videos, audio, text, and more. Such cover files, which are also called media or containers, are freely transmitted via the Internet, so they do not arouse any suspicion. An authorized person who has a secret steganographic key can restore the hidden message. This article discusses techniques for hiding data in vector images. Individual elements of vector graphics are represented through special mathematical objects (points, lines, curves, nodes, tangents, control points, etc.). These objects are used to hide information. But there is a problem, which lays in the fact, that affine vector image transformations can destroy a hidden message. In addition, hiding algorithms usually increase the size of vector image files, which is a certain unmasking feature. The main purpose of our study is to examine these problems. To do this, it is programmatically implemented data hiding and conducted a series of experiments. In particular, it is investigated various concealment techniques (bit method and pattern-based method). For different initial conditions, it is evaluated the resistance of hidden data to affine transformations, resizing of vector graphics files, performance, and so on. Based on the results of numerical experiments, it is substantiated the advantages and conditions of using the studied algorithms. To conduct the research, we have developed a cross-platform software implementation (JavaScript programming language), i.e. our scripts can be run on different types of platforms and browsers. Thus, the developed implementation can be used as a framework for individual web client applications, as well as for writing a backend of complex and professional tasks.
... The unit of a vector graphic is a geometrical element (points, lines, curves of first and second order, Bezier curves, nodes, tangent lines, control points, etc.) [14][15][16]. Thus, concealing and extraction of secret data are implemented in those mathematical objects [13]. ...
... The reports of data concealing methods in the vector images are provided in the works [9][10][11][12][13]. ...
... The most substantial latest work in the research of technologies of data hiding in the vector images is [13] and corresponding dissertation by O. Kinzeryavyy [19]. In those works specificity of vector graphics is considered, different methods of data concealing examined and compared. ...
... This article discusses methods for hiding information in vector graphics [14], [15]. We programmatically implement computational algorithms for hiding and restoring messages, as well as investigate their capabilities. ...
... Thus, a concept of De Casteljau's algorithm lays in a recursive calculation of the interim position of each segment, which is created in the way of conditional connection of the neighbor points, with the usage of linear interpolation of the control points for the current parameter t [3], [14], [15]. ...
Article
Full-text available
All the existing computers are able to execute arithmetical operations only with finite numerals. Operations with infinite and infinitesimal quantities could not be realized. The paper describes a new positional system with infinite radix allowing us to write down finite, infinite, and infinitesimal numbers as particular cases of a unique framework. The new approach both gives possibilities to execute calculations of a new type and simplifies fields of mathematics where usage of infinity and/or infinitesimals is required. Usage of the numeral system described in the paper gives possibility to introduce a new type of computer – Infinity Computer – able to operate not only with finite numbers but also with infinite and infinitesimal ones.
Article
Scientific research on information and cybernetic influence on citizens, society and the whole state is a hot topic of many famous worldwide scientific publications. These studies have become particularly relevant in critical spheres from the viewpoint of security. Civil aviation is one of the most critical spheres. Information and cybernetic actions in civil aviation have been studied separately to date. Known approaches did not allow considering the synergistic effects of information and cybernetic interaction. This factor has adversely affected preventive and countermeasures for minimizing the effects of information and cybernetic threats to aviation subjects. Taking this into account, in the paper, the essence of synergistic effects of information and cybernetic interaction on civil aviation are presented. Also, the methodology for the early detection, assessment and prediction of these effects was developed. The analysis revealed that the study of synergistic effects in civil aviation is an effective controller of nonlinear processes, which can occur as the result of information and cybernetic interaction.
Article
The application of digital vector maps faces some unsolved issues such as digital copyright protecting, data authenticating, and data source tracing, etc. These issues could be obstacles restricting the further usage of digital vector maps. The tech-nique of watermarking provides potential solutions for the problem. Comparing with the watermarking schemes designed for general multimedia data, watermarking a 2D vector map has some distinct features due to the special data structures and application envi-ronments of vector maps. These distinct features will be summarized in this paper by analyzing the characters of vector map data. Furthermore, an overview of the existing typical algorithms will be presented to show the state of the art of the study.
The analysis of resistance of modern steganos algorithms
  • T G Azhbaev
  • I M Azhmukhamedov
Steganographic methods of hiding data in vector images that are resisted to active attacks based on affine transformations
  • O M Kinzeryavyy
Basics of computer steganography, Radio and connection
  • A V Agranovsky
  • P N Derevyanin
  • R A Hady
Modeling geometric attacks based on affine transformations
  • G I Bakhrushina
  • GI Bakhrushina
Geometric Modeling. Publishing House of Physicomathematical Literature
  • N N Golovanov
  • NN Golovanov
Mathematical Foundations of Computer Graphics
  • D Rodjers
  • J Adams