You are here

Improving the cybersecurity of telecommunication systems by methods of digital images complex steganalysis


Work number - M 19 FILED

Author:ProgonovD.O.

 

Proposed by National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”.

Series of work consist of 8 articles, which have been published during 5 years.

There are established fundamental results in the area of passive and forensic steganalysis of digital images, to be exact the the application limits for known statistical and universal stegdetectors have been established.

A series of work contain the priority results for area of multimedia steganalysis, namely digital images and video data. Author proposed the original representation of stegodata embedding process as introducing the distortion into image’s components such as intrinsic noises, object’s contours and textures. The digital images steganalysis methodology developed, which is based on integrated applying of well-known statistic­al analysis’ methods as well as powerful methods of structural analysis, particularly variograms analysis, detrended fluctuation analysis and multifractal analysis. It is shown that conduct of digital images forensic steganalysis according to proposed methodology allows not only revealing the steganograms with high accuracy, but also estimating theirs parameters (cover image payload, energy of embedding messages) and determining the peculiarities of used steganographic algorithm (embedding domain, number and types of cover image and stegodata transformations). For support the proposed methodology the program complex developed, which can be integrated into modern telecommu­nica­tion network’s management systems.

Results of series of work matter for cybersecurity and national security fields. Applying of developed program complex leads to appreciably inc­reasing the information protection level for state institution’s as well as private corporation’s tele­communication systems even in case of limitation or absence the a priory information about the steganographic algorithms used by violators.

Research results have been published in 8 articles (including 2 in inter­national scientific journals), 36 theses in proceedings of international and all-Ukraine conferences. Results are cited in more than 4 scientific journals, total number of references to author’s publications come to 13 (according to Google Scholar database), h-index is equal to 2.

Total number of author’s publications is equal to 59.

n/a