Steganographic method of acoustic information protection in critical applications systems

Authors

DOI:

https://doi.org/10.30837/ITSSI.2023.25.052

Keywords:

acoustic information; technical protection; cryptographic protection; steganographic (steganophonic) protection; modification; computer system languages

Abstract

The subject of the study is the process of protecting acoustic information in critical computer systems to ensure the required level of system security. The purpose of the article is to study the method of protecting acoustic information in critical computer systems by means of masking to ensure the impossibility of unauthorized access to the system. The paper outlines the following tasks: to analyze the software and hardware masking of speech; to study the masking of speech messages in order to introduce unrecognizability; to consider the features of speech message compression; to investigate methods of covert transmission of acoustic information. The results of the work, which were obtained using mathematical methods of information transformation in computer systems, are potentially possible methods of masking speech messages to ensure the impossibility of unauthorized access to the system. The analysis of the functioning of the proposed methods made it possible to formulate specific conclusions. The research has shown that the use of direct expansion of the spectrum of discrete signals for steganographic purposes helps to covertly embed information messages in still images. The task of extracting a message on the receiving side of a steganography system is equivalent to the task of detecting information from a mixture of a useful signal and an interference in a broadband communication system.  The research revealed certain disadvantages of steganographic systems with an expanded spectrum of discrete signals: the probability of correct extraction of embedded data depends on the amount of distortion introduced, which depends on the provided bandwidth of the steganographic channel. Further research is desirable to analyze the possible use of methods for synthesizing large ensembles of quasi-orthogonal discrete signals with improved ensemble, structural, and correlation properties to ensure higher security of acoustic channels in computer systems for critical applications.

Author Biographies

Oleksandr Mozhaiev, Kharkiv National University of Internal Affairs

Doctor of Sciences (Engineering), Professor, Professor at the Department of Cyber Security and DATA-Technologies

Yurii Gnusov, Kharkiv National University of Internal Affairs

PhD (Engineering Sciences), Associate Professor, Head at the Department of Cyber Security and DATA-Technologies

Oleksandr Manzhai, Kharkiv National University of Internal Affairs

PhD (Juridical Sciences), Professor, Head at the Department  of Combating Cybercrime

Volodymyr Strukov, Kharkiv National University of Internal Affairs

PhD (Engineering Sciences), Associate Professor, Professor at the Department of Cyber Security and DATA-Technologies

Vitalii Nosov, Kharkiv National University of Internal Affairs

PhD (Engineering Sciences), Associate Professor, Professor at the Department of Combating Cybercrime

Valery Radchenko, Kharkiv National University of Internal Affairs

PhD (Physical and Mathematical Sciences), Associate Professor, Associate Professor at the Department of Cyber Security and DATA-Technologies

Serhii Yenhalychev, Simon Kuznets Kharkiv National University of Economics

Graduate Student at the Department of Cybersecurity and Information Technologies

References

References

Kosenko, V. (2017), "Principles and structure of the methodology of risk-adaptive management of parameters of information and telecommunication networks of critical application systems", Innovative technologies and scientific solutions for industries, No 1 (1), Р. 75–81. DOI: https://doi.org/10.30837/2522-9818.2017.1.046

Kosenko, V. (2017), "Mathematical model of optimal distribution of applied problems of safety-critical systems over the nodes of the information and telecommunication network", Advanced Information Systems, Vol. 1, No. 2, P. 4–9. DOI: https://doi.org/10.20998/2522-9052.2017.2.01

Ivanchenko, S., Havrylenko, O., Lipskyi, O., Shevtsov, A. "Technical channels of information leakage. Procedure for creating complexes of technical information protection". ["Tekhnichni kanaly vytoku informatsii. Poriadok stvorennia kompleksiv tekhnichnoho zakhystu informatsii"], Study guide K.: ISZZI NTUU "KPI", 2016. 104 р. available at: https://ela.kpi.ua/bitstream/123456789/15155/1/NP_Tekhnichni_kanaly_vytku_inf.pdf

Oleynikov, А. "Methods and means of information protection: Study guide for students of higher educational institutions". ["Metody ta zasoby zakhystu informatsii"]. Kharkiv. NTMT, 2014. 298 р. available at: https://ref.nure.ua/navchalna-laboratorija-tehnichnogo-zahistu-informacii

Nuzhny, S. M. (2018). "Improved technology for assessing the degree of protection of language information". Modern information protection. ["Udoskonalena tekhnolohiia otsinky stupenia zakhystu movnoi informatsii"]. Vol. 1 (33). Р. 66–73. available at: http://journals.dut.edu.ua/index.php/dataprotect/article/view/1796

Blintsov, V., Nuzhniy, S., Parkhuts, L., Kasianov, Y. (2018), "The objectified procedure and a technology for assessing the state of complex noise speech information protection". Eastern-European Journal of Enterprise Technologies, Vol. 5 (9 (95)). Р. 26–34. DOI: https://doi.org/10.15587/1729-4061.2018.144146

Hrystak, A., Kinzeryavyy, V., Prysiazhnyi, D., Burmak, Y., Samoylik, Y. "High-speed and hash function for blockchain security mechanisms". Scientific and practical cyber security journal (SPCSJ). Vol. 4(1). 2020. Р. 65–70. available at: https://journal.scsa.ge/ru/papers/high-speed-and-secure-hash-function-for-blockchain-security-mechanisms-3/

Mozhaiev, O., Semenov, S., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Y., Yevstrat, D., Chyrva, Y., Kuchuk, H. (2022), "Development of a method for determining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples". Eastern-European Journal of Enterprise Technologies, Vol. 6 (4 (120)), P. 40–49. DOI: https://doi.org/10.15587/1729-4061.2022.269128

Mozhaiev, O., Klimushyn, P., Solianyk, T., Gnusov, Y., Manzhai, O., Svitlychnyi, V. (2022), "Crypto-resistant methods and random number generators in internet of things (iot) devices". Innovative technologies and scientific solutions for industries. № 2 (20), P. 22–34 DOI: https://doi.org/10.30837/ITSSI.2022.20.022

Mozhaiev, O, Klimushyn, P., Solianyk, T., Kolisnyk, T. (2021), "Potential application of hardware protected symmetric authentication microcircuits to ensure the security of internet of things". Advanced Information Systems. Vol. 5, No 3 P. 103–111. DOI: https://doi.org/10.20998/2522-9052.2021.3.14

Smith, J., Comiskey, B., (1996), "Modulation and information hiding in images", Lecture Notes in Computer Science. 1996. Р. 207–226. DOI:10.1007/3-540-61996-8_42.

Klimushyn, P., Solianyk, T., Mozhaev, O., Nosov, V., Kolisnyk, T., Yanov, V. (2021), "Hardware support procedures for asymmetric authentication of the internet of things". Innovative Technologies and Scientific Solutions for Industries, No. 4 (18). P. 31–39. DOI: 10.30837/ITSSI.2021.18.031

Friedrich, J., Miroslav, G., Du., R. (2021), "Reliable Detection of LSB Steganography in Color and Grayscale Images". Binghampton, New York: SUNY. Р. 27-30. DOI:10.1145/1232454.1232466

Fridrich, J., Du., R. and Long, М. (2000), "Steganalysis of LSB Encoding in Color Images", ICME 2000, New York City. DOI:10.1109/ICME.2000.871000

Brock, W., Dechert. W., Scheinkman, J. "A test for independence based on the correlation dimension", Working Paper, University of Wisconsin, 1987. available at: https://www.academia.edu/5825079/A_test_for_independence_based_on_the_correlation_dimension

Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S. (2005), "Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods". IEEE Transactions on Image and Signal Processing. № 5. P. 611615. DOI:10.1049/ip-vis:20059022

Downloads

Published

2023-09-30

How to Cite

Mozhaiev, O., Gnusov, Y., Manzhai, O., Strukov, V., Nosov, V., Radchenko, V., & Yenhalychev, S. (2023). Steganographic method of acoustic information protection in critical applications systems. INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, (3(25), 52–63. https://doi.org/10.30837/ITSSI.2023.25.052