Steganographic method for protection the objects of intellectual properties and intellectual rights
DOI:
https://doi.org/10.18372/2410-7840.19.12207Keywords:
information security system, intellectual property, intellectual rights law, decomposition on the bitplane, dynamic graphic objects, computing environment MATLABAbstract
The protection of information, marked as intellectual property or copyrights, is a very special technical task, because often it is difficult to define, if this information is legally protected or the protection of information is not of-fered as an option. This task can be partly solved by using the “Copyright Demonstration” script, or by script named as “No Copy” script. In the most cases this method of pro-tection is known as information hiding. As a result, the modification of cryptographic embedded type of LSB–algorithm with keys was developed. The strength of algo-rithm has been improved in comparison with classical ste-gano – LSB–algorithms. The main point of proposed ste-ganographic method is the embedding of full-colored im-ages into dynamic full-colored information objects. This way, if the image pixel intensity level changes from 0 to 255, it means that this image can be represented in eight bit-planes. Accordingly, this method is based on LSB–methodology of information hiding. The article deals with the methodology of system development for protecting and transferring graphic, text data to dynamic graphic objects.The modeling was made in the MATLAB application environment and thus the time depending results were ob-tained. On the basis of the developed LSB–method modi-fication one can improve the protection of intellectual property rights in animated and video graphic objects by embedding the various full-colored digital watermarks. Also, the proposed method may have also a versatile usage.References
M. Khosrow-Pour, "Encyclopedia of E-Commerce, E-Government and Mobile Commerce", Resources Management Association. Idea Group Reference, pp. 480-487, 2006.
M. Barni, F. Bartolini, Watermarking Systems Engineering, NewYork: Marcel Dekker, inc., 2004, 485 p.
Цивільний кодекс України. Стаття 505. Поняття комерційної таємниці: [Електронний ресурс]. Режим доступу: http:// radnuk. info / komentar / chky / chky-knuga4/140-kn4-glava46/2214--505-.html.
F. Shih, Watermarking, Steganography, and Forensics, New York: CRC Press, 2012, 424 p.
К. Защелкин, А. Ищенко, Е. Иванова, "Решение проблемы классификации блоков контейнера при JPEG-атаке на стеганографический метод Бенгана-Мемона-Эо-Юнг", Радіоелектронні і комп’ютерні системи, №6(70), С. 164-168, 2014.
J. Fridrich, Steganography in Digital Media, New York: Cambridge University. Press, 2010, 448 p.
I. Cox, M. Miller, J. Bloom, J. Fridrich, Digital Watermarking and Steganography, Burlington: Morgan Kaufmann Publishers, 2008, 592 p.
В. Федосеев, Цифровые водяные знаки и стеганография, Самара. Издательство СГАУ, 2015, 128 с.
F. Hartung, B. Girod, "Watermarking of Uncom-pressed and Compressed Video", Signal Processing, vol. 66, no. 3, pp. 283–301, 1998.
T. Kalker, A.J.E.M. Janssen, "Analysis of Watermark Detection using SPOMF", Proceedings of ICIP, vol. 1, pp. 316-319, 1999.
H.J. Wang, P.C. Su, C.C.J. Kuo, "Wavelet-based digital image watermarking", Optics Express, vol. 3, no. 12, pp. 491–496, 1998.
R. Wang, Introduction to Orthogonal Transforms: with Applications in Data Processing and Analysis, Cambridge University Press, 2011.
Н. Глумов, В. Митекин, "Алгоритм встраивания полухрупких цифровых водяных знаков для задач аутентификации изображений и скрытой передачи информации", Компьютерная оптика, Т. 35, С. 262–267, 2011.
Цивільний кодекс України. ч. 2 ст. 433. [Електронний ресурс]. Режим доступу: Закон України "Про авторське право і суміжні права". Ст. 11. [Електронний ресурс]. Режим доступу: http://zakon2. rada.gov.ua/laws/show/3792-12/page.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.