Is there a perfect steganographic hiding of information exchange?

Abstract

We consider the classical problem of steganography – organization of maximal hidden (secret) information transmission via insecure channels. There is a fundamentally important aspect in this task,i.e.protection from identification of hidden messages in a transmitted container. Existing steganalysis methods provide analysts with sufficiently effective tools to identify hidden embedding in different file types, therefore protection from detection of steg-message transmission is primary and most urgent. Some hypothetical (but easily realized in practice) script for the transmission of hidden message,which in principle cannot be detected, is proposed. The script is based on the need for prior coordination of key information between subscribers on the basis of the so-called "book cipher" and the transmission of hidden messages is realized using an empty container, so that it cannot be detected.

Authors and Affiliations

Yurii Butsenko, Yulii Savchenko

Keywords

Related Articles

HE DEVELOPMENT OF THE METHOD OF MODELLING AND FORECASTING OF NONLINEAR HETEROSCEDASTIC PROCESSE

The article is dedicated to the analysis of methods of estimation of the parameters of nonlinear stochastic models of volatility using Monte Carlo method for mark chains on the basis of Gibs algorithms and its modificati...

CONTROL AND NAVIGATION OF WATER TRANSPORT RESOURCE USING A PASSIVE RADIO ENGINEERING COMPLEX

The questions of development of high-precision complexes of two- and three-dimensional mapping of objects, in particular, complexes of coastal water areas, in particular, complexes of coastal water areas, have been consi...

Modern mechanisms of cloud technologies construction as a priority to improve distributed data processing system

The modern mechanisms of development of cloud technologies as a priority direction of improvement of distributed data processing systems are considered. There are three main types of cloud computing. The advantages and d...

МЕТОДИКА ОЦІНКИ ЩІЛЬНОСТІ РАДІОВУЗЛІВ В САМООРГАНІЗОВАНИХ МЕРЕЖАХ

The peculiarities of the modern self-organizing radio networks are analyzed. The method of the planning of such networks is considered. It implies that the three low-level-protocols of open system models interaction, nam...

INCREASE IN ENERGY EFFICIENCY OF MILLIMETRES SYSTEMS BY THE METHOD OF CHANNEL GAIN DUE TO DIFFRACTION AND REFLECTION

The paper analyses the millimetre-wave channel budget model, taking into account the radiation characteristics of a narrow-beam antenna. The proposed multi-beam model takes into account the overall gain and the millimetr...

Download PDF file
  • EP ID EP262067
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

Yurii Butsenko, Yulii Savchenko (2017). Is there a perfect steganographic hiding of information exchange?. Телекомунікаційні та інформаційні технології, 124(1), 91-93. https://www.europub.co.uk/articles/-A-262067