Steganographic method of acoustic information protection in critical applications systems
DOI:
https://doi.org/10.30837/ITSSI.2023.25.052Keywords:
acoustic information; technical protection; cryptographic protection; steganographic (steganophonic) protection; modification; computer system languagesAbstract
The subject of the study is the process of protecting acoustic information in critical computer systems to ensure the required level of system security. The purpose of the article is to study the method of protecting acoustic information in critical computer systems by means of masking to ensure the impossibility of unauthorized access to the system. The paper outlines the following tasks: to analyze the software and hardware masking of speech; to study the masking of speech messages in order to introduce unrecognizability; to consider the features of speech message compression; to investigate methods of covert transmission of acoustic information. The results of the work, which were obtained using mathematical methods of information transformation in computer systems, are potentially possible methods of masking speech messages to ensure the impossibility of unauthorized access to the system. The analysis of the functioning of the proposed methods made it possible to formulate specific conclusions. The research has shown that the use of direct expansion of the spectrum of discrete signals for steganographic purposes helps to covertly embed information messages in still images. The task of extracting a message on the receiving side of a steganography system is equivalent to the task of detecting information from a mixture of a useful signal and an interference in a broadband communication system. The research revealed certain disadvantages of steganographic systems with an expanded spectrum of discrete signals: the probability of correct extraction of embedded data depends on the amount of distortion introduced, which depends on the provided bandwidth of the steganographic channel. Further research is desirable to analyze the possible use of methods for synthesizing large ensembles of quasi-orthogonal discrete signals with improved ensemble, structural, and correlation properties to ensure higher security of acoustic channels in computer systems for critical applications.
References
References
Kosenko, V. (2017), "Principles and structure of the methodology of risk-adaptive management of parameters of information and telecommunication networks of critical application systems", Innovative technologies and scientific solutions for industries, No 1 (1), Р. 75–81. DOI: https://doi.org/10.30837/2522-9818.2017.1.046
Kosenko, V. (2017), "Mathematical model of optimal distribution of applied problems of safety-critical systems over the nodes of the information and telecommunication network", Advanced Information Systems, Vol. 1, No. 2, P. 4–9. DOI: https://doi.org/10.20998/2522-9052.2017.2.01
Ivanchenko, S., Havrylenko, O., Lipskyi, O., Shevtsov, A. "Technical channels of information leakage. Procedure for creating complexes of technical information protection". ["Tekhnichni kanaly vytoku informatsii. Poriadok stvorennia kompleksiv tekhnichnoho zakhystu informatsii"], Study guide K.: ISZZI NTUU "KPI", 2016. 104 р. available at: https://ela.kpi.ua/bitstream/123456789/15155/1/NP_Tekhnichni_kanaly_vytku_inf.pdf
Oleynikov, А. "Methods and means of information protection: Study guide for students of higher educational institutions". ["Metody ta zasoby zakhystu informatsii"]. Kharkiv. NTMT, 2014. 298 р. available at: https://ref.nure.ua/navchalna-laboratorija-tehnichnogo-zahistu-informacii
Nuzhny, S. M. (2018). "Improved technology for assessing the degree of protection of language information". Modern information protection. ["Udoskonalena tekhnolohiia otsinky stupenia zakhystu movnoi informatsii"]. Vol. 1 (33). Р. 66–73. available at: http://journals.dut.edu.ua/index.php/dataprotect/article/view/1796
Blintsov, V., Nuzhniy, S., Parkhuts, L., Kasianov, Y. (2018), "The objectified procedure and a technology for assessing the state of complex noise speech information protection". Eastern-European Journal of Enterprise Technologies, Vol. 5 (9 (95)). Р. 26–34. DOI: https://doi.org/10.15587/1729-4061.2018.144146
Hrystak, A., Kinzeryavyy, V., Prysiazhnyi, D., Burmak, Y., Samoylik, Y. "High-speed and hash function for blockchain security mechanisms". Scientific and practical cyber security journal (SPCSJ). Vol. 4(1). 2020. Р. 65–70. available at: https://journal.scsa.ge/ru/papers/high-speed-and-secure-hash-function-for-blockchain-security-mechanisms-3/
Mozhaiev, O., Semenov, S., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Y., Yevstrat, D., Chyrva, Y., Kuchuk, H. (2022), "Development of a method for determining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples". Eastern-European Journal of Enterprise Technologies, Vol. 6 (4 (120)), P. 40–49. DOI: https://doi.org/10.15587/1729-4061.2022.269128
Mozhaiev, O., Klimushyn, P., Solianyk, T., Gnusov, Y., Manzhai, O., Svitlychnyi, V. (2022), "Crypto-resistant methods and random number generators in internet of things (iot) devices". Innovative technologies and scientific solutions for industries. № 2 (20), P. 22–34 DOI: https://doi.org/10.30837/ITSSI.2022.20.022
Mozhaiev, O, Klimushyn, P., Solianyk, T., Kolisnyk, T. (2021), "Potential application of hardware protected symmetric authentication microcircuits to ensure the security of internet of things". Advanced Information Systems. Vol. 5, No 3 P. 103–111. DOI: https://doi.org/10.20998/2522-9052.2021.3.14
Smith, J., Comiskey, B., (1996), "Modulation and information hiding in images", Lecture Notes in Computer Science. 1996. Р. 207–226. DOI:10.1007/3-540-61996-8_42.
Klimushyn, P., Solianyk, T., Mozhaev, O., Nosov, V., Kolisnyk, T., Yanov, V. (2021), "Hardware support procedures for asymmetric authentication of the internet of things". Innovative Technologies and Scientific Solutions for Industries, No. 4 (18). P. 31–39. DOI: 10.30837/ITSSI.2021.18.031
Friedrich, J., Miroslav, G., Du., R. (2021), "Reliable Detection of LSB Steganography in Color and Grayscale Images". Binghampton, New York: SUNY. Р. 27-30. DOI:10.1145/1232454.1232466
Fridrich, J., Du., R. and Long, М. (2000), "Steganalysis of LSB Encoding in Color Images", ICME 2000, New York City. DOI:10.1109/ICME.2000.871000
Brock, W., Dechert. W., Scheinkman, J. "A test for independence based on the correlation dimension", Working Paper, University of Wisconsin, 1987. available at: https://www.academia.edu/5825079/A_test_for_independence_based_on_the_correlation_dimension
Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S. (2005), "Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods". IEEE Transactions on Image and Signal Processing. № 5. P. 611615. DOI:10.1049/ip-vis:20059022
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.