METHOD AND MATHEMATICAL MODEL OF STEGANOGRAPHIC INFORMATION CONVERSION BASED ON MODIFICATION OF CONTOUR OF TEXT-CONTAINER SYMBOLS

UDC [004.056 + 003.26](075.8)

  • Nistyuk Olga Alexandrovna − Master’s degree student, the Department of Information Systems and Technologies. Belarusian State Technological University (13a, Sverdlova str., 220006, Minsk, Republic of Belarus). E-mail: nistyuk@belstu.by

  • Urbanovich Pavel Pavlovich − DSc (Engineering), Professor, Professor of the Department of Information Systems and Technologies. Belarusian State Technological University (13a, Sverdlova str., 220006, Minsk, Republic of Belarus). E-mail: p.urbanovich@belstu.by

Key words: steganography, document, .docx, method, hiding.

For citation: Nistyuk O. A., Urbanovich P. P. Method and mathematical model of steganographic information conversion based on modification of contour of text-container symbols. Proceedings of BSTU, issue 3, Physics and Mathematics. Informatics, 2022, no. 2 (260), pp. 92–98 (In Russian). DOI: https://doi.org/10.52065/2520-6141-2022-260-2-92-98.

Abstract

Text steganography is one of the areas of research and development, which allows to solve the problem of secret transmission or storage of information quite effectively. The article describes a steganographic method based on the use of text parameters, in which a .doc or .docx document is used as a container. The novelty of the considered method lies in the placement of a secret message based on the modification of such a parameter of text characters as a contour. The features of the use of the steganographic method in electronic publications are outlined in order to protect container documents from unauthorized copying or distribution. The developed software tool demonstrating the operation of the steganographic method is presented: the user interface of the application, the development technology, as well as the main structural elements of its architecture are described.

References

  1. Brassil J., Low S., Maxemchuk N. F., O’Gorman L. Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal on Sel. Areas in Commun., 13, 1995, no. 8, pp. 1495–1504.
  2. Shutko N. P. Algorithms for the implementation of text steganography methods based on the modification of spatial-geometric and color parameters of the text. Trudy BGTU [Proceedings of BSTU]. 2016, no. 6 (188): Physics and Mathematics. Informatics. pp. 160–165 (In Russian).
  3. Shutko N. The use of aprosh and kerning in text steganography. PrzeglądElektrotechniczny. 2016. no. 10, pp. 222–225.
  4. Shutko N., Urbanovich P., Zukowski P. A method of syntactic text steganography based on modification of the document-container aprosh. PrzeglądElektrotechniczny. 2018. R. 94, NR 6, pp. 82–85.
  5. Sushchenya A. A., Blinova E. A., Urbanovich P. P. Modification of the steganographic method of changing the line spacing of an electronic document. Tekhnicheskie sredstva zashchity informacii: tezisy dokladov XVI Belorussko-rossijskoj nauchno-tekhnicheskoj konferencii [Technical means of information protection: abstracts of reports of the XVI Belarusian-Russian scientific-technical conference]. Minsk, BGUIR, 2018, p. 90 (In Russian).
  6. Agarwal M. Text steganographic approaches: a comparison. International Journal of Network Security & Its Applications (IJNSA), 2013, Vol. 5, no. 1, pp. 91–103.
  7. Sushchenya A. A., Urbanovich P. P. The use of electronic book formats in the transmission of confidential information using computer steganography methods. Informacionnye tekhnologii: materialy 83-j nauchno-tekhnicheskoj konferencii professorsko-prepodavatel'skogo sostava, nauchnyh sotrudnikov i aspirantov (s mezhdunarodnym uchastiem) [Information technologies: materials of the 83rd scientific and technical conference of professors teaching staff, researchers and graduate students (with international participation)]. Minsk, BSTU, 2019. pp. 39–40. (In Russian).
  8. Urbanovich P. P., Yurashevich D. E. Using system properties and parameters of text files in steganographic applications. Teoreticheskaya i prikladnaya kriptografiya: materialy mezhdunarodnoj nauchnoj konferencii [Theoretical and applied cryptography: materials of the international scientific conference]. Minsk, 2020, pp. 68–73. (In Russian).
  9. Urbanovich P. P. Zashchita informatsii metodami kriptografii, steganografii i obfuskatsii: ucheb.- metod. posobiye [Protection of information by cryptography, steganography and obfuscation methods: textbook. allowance]. Minsk: BGTU, 2016. 220 p. (In Russian).
07.09.2022