Scalable software system for internet user’s multimedia data steganographic protection

Authors

  • Yevhen Radchenko
  • Yevgeniya Sulema

DOI:

https://doi.org/10.34185/1562-9945-6-131-2020-05

Keywords:

архітектура програмної системи, захист мультимедійних даних, стеганографія

Abstract

The universal object-oriented architecture for the programmatic system was designed for steganographic protection of multimedia data. The architecture is based on the usage of polymorphism in order to minimize the amount of work needed to scale and support the ste-ganographic system. All software implementations of steganographic methods of multimedia data protection have the same interface for use, which allows you to quickly add new ste-ganographic methods for embedding stegodata and for restoring confidential user data. However, the proposed universal architecture allows the replacement of one steganographic method to another while using the software product by replacing the pointers to the necessary objects of implementation of steganographic methods of multimedia data protection. Unified interface for working with implemented steganographic methods in the software system through a single object in the software product, which allows you to adapt the software application to supply input necessary for the correct operation of steganographic methods of multimedia data protection, not only through the main software window, but also through Internet services, mobile applications and other ways of providing input data for the usage of steganographic methods in other software environments. The key format (array of bytes) was unified for the possibility of using keys of different structures and types of data (number, text, file, image, etc.) in the universal architecture of the software system of steganographic protection of multimedia data of users. The usage of structural, concurrency and behavioral design templates in a universal architecture can minimize the development time of the programmer, facilitate the maintenance, scalability and optimization of the software system.

References

Shyrochyn S.S. Methods of combined steganographic protection of multimedia data in cloud storage : dis. PhD : 05.13.05 / Shyrochyn S. S. – 2015.

Steganographic Protection Method Based on Huffman Tree / [Y. Radchenko, I. Dychka, Y. Sulema та ін.]. // Springer. – 2019. – № 902. – P. 283–292.

Johnson N.F. Steganalysis of Images Created Using Current Steganography Software / N.F. Johnson, S. Jajodia. // Information Hiding, LNCS 1525, Springer-Verlag Berlin Heidelberg. – 1998. – P. 32–47.

Lypka T. B. Modification of the steganography method using the Sudoku matrix / Lypka T. B. // st., Faculty of Applied Mathematics, National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute". – 2018.

E-Banking Security using Cryptography, Steganography and Data Mining / [N.Devadiga, H. Kothari, H. Jain, S. Sankheта ін.] // International Journal of Computer Applications. – 2017. – №164. – P. 26–30.

Combination of Steganography and Cryptography: A short Survey / [M. Taha, M. Rahim, S. Lafta та ін.]. // Information Technology and Communication. – 2019. – №518. – P. 1–13.

Borovsky A. N. Qt 4.7+ Practical programming / Borovsky A. N. // St. Petersburg, Russia: BHV-Petersburg. – 2012.

Roy S. Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization / [Roy S. та ін.] // Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology. – 2017. – P. 372-376.

Hu Z. Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme / Z. Hu, I. Dychka, Y. Sulema, Y. Radchenko. // China : Hong Kong MECS Press.. – 2017. – P. 34–40.

Sulema Y. S. Method of steganographic protection of multimedia data based on the procedure of pseudo-random embedding / Sulema Y. S., Radchenko Y. O. // KPI Science News. – 2020. – №1. – С. 40–47.

Pikus F. G. Hands-On Design Patterns with C++: Solve common C++ problems with modern design patterns and build robust applications / Pikus F. G. // Birmingham, UK: Packt Publishing Ltd. – 2019. – P. 328.

Published

2021-03-01