Is there a perfect steganographic hiding of information exchange?

Abstract

We consider the classical problem of steganography – organization of maximal hidden (secret) information transmission via insecure channels. There is a fundamentally important aspect in this task,i.e.protection from identification of hidden messages in a transmitted container. Existing steganalysis methods provide analysts with sufficiently effective tools to identify hidden embedding in different file types, therefore protection from detection of steg-message transmission is primary and most urgent. Some hypothetical (but easily realized in practice) script for the transmission of hidden message,which in principle cannot be detected, is proposed. The script is based on the need for prior coordination of key information between subscribers on the basis of the so-called "book cipher" and the transmission of hidden messages is realized using an empty container, so that it cannot be detected.

Authors and Affiliations

Yurii Butsenko, Yulii Savchenko

Keywords

Related Articles

SIMULATION MODEL OF THE GENERATION AND IMPLEMENTATION OF THE MEANS OF «PENETRATION TESTING»

During simulation of the process generation of cyberattacks of various formats was performed using the specialized IxChariot 9 package and software developed during the research. The collection of incoming information ab...

Is there a perfect steganographic hiding of information exchange?

We consider the classical problem of steganography – organization of maximal hidden (secret) information transmission via insecure channels. There is a fundamentally important aspect in this task,i.e.protection from iden...

Modern mechanisms of cloud technologies construction as a priority to improve distributed data processing system

The modern mechanisms of development of cloud technologies as a priority direction of improvement of distributed data processing systems are considered. There are three main types of cloud computing. The advantages and d...

ALGORITHM OF THE DETECTION OF THE OUTDATED INFORMATION ON THE BASIS OF ANALYSIS OF DATA SITES

The paper proposes an algorithm for implementing the method of identifying outdated information on the basis of the analysis of text data of the pages of the site. The algorithm of the software application for the search...

Need to use converged for billing systems

The possibilities for billing systems, and the relevance of their using at present are analyzed. The basic function and purpose of convergence for billing systems are considered. It is determined the role of intelligent...

Download PDF file
  • EP ID EP262067
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

Yurii Butsenko, Yulii Savchenko (2017). Is there a perfect steganographic hiding of information exchange?. Телекомунікаційні та інформаційні технології, 124(1), 91-93. https://europub.co.uk/articles/-A-262067