Научная статья на тему 'THE SUFFICIENT CONDITION FOR ENSURING THE RELIABILITY OF PERCEPTION OF THE STEGANOGRAPHIC MESSAGE IN THE WALSH-HADAMARD TRANSFORM DOMAIN'

THE SUFFICIENT CONDITION FOR ENSURING THE RELIABILITY OF PERCEPTION OF THE STEGANOGRAPHIC MESSAGE IN THE WALSH-HADAMARD TRANSFORM DOMAIN Текст научной статьи по специальности «Компьютерные и информационные науки»

CC BY
30
10
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
STEGANOGRAPHIC COMMUNICATION CHANNEL / STEGANOGRAPHIC MESSAGE PERCEPTION RELIABILITY / DIGITAL IMAGE / WALSH-HADAMARD TRANSFORM / SEQUENCE / DISCRETE COSINE TRANSFORM / SINGULAR VALUE DECOMPOSITION OF A MATRIX

Аннотация научной статьи по компьютерным и информационным наукам, автор научной работы — Kobozeva A.A., Sokolov A.V.

In view of the high compatibility of the Walsh-Hadamard transform to the architecture of modern computing facilities, it is sensible to use it in methods of steganography and steganalysis. Now, there are some efficient steganographic methods that use the Walsh-Hadamard transform domain for information embedding presented in the literature. It is known that to ensure the reliability of the steganographic message perception, information should be embedded in its high-frequency components; nevertheless, the issues of the correspondence of the Walsh-Hadamard transformants to the frequency components of the original matrix of the cover image are poorly researched. The purpose of this paper is to develop a formal sufficient condition for ensuring the reliability of perception of steganographic messages in the Walsh-Hadamard transform domain. This purpose was achieved by establishing the relationship between the Walsh-Hadamard transformants and the discrete cosine transform transformants, which was theoretically substantiated in two ways, and experimentally confirmed. Based on the established relationship between the Walsh-Hadamard transform and the discrete cosine transform, as well as the components of the singular value decomposition of the corresponding matrices, a sufficient condition has been developed to ensure the reliability of the perception of steganographic messages in the Walsh-Hadamard transform domain. The sufficient condition consists in the fact that after embedding of additional information using any steganographic method, those Walsh-Hadamard transformants that correspond to the singular triples of the matrix corresponding to small (smallest) in value singular numbers, should change.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «THE SUFFICIENT CONDITION FOR ENSURING THE RELIABILITY OF PERCEPTION OF THE STEGANOGRAPHIC MESSAGE IN THE WALSH-HADAMARD TRANSFORM DOMAIN»

The Sufficient Condition for Ensuring the Reliability of Perception of the Steganographic Message in the Walsh-Hadamard Transform Domain

Kobozeva A.A., Sokolov A.V.

Odessa Polytechnic National University, Odessa, Ukraine

Abstract. In view of the high compatibility of the Walsh-Hadamard transform to the architecture of modern computing facilities, it is sensible to use it in methods of steganography and steganalysis. Now, there are some efficient steganographic methods that use the Walsh-Hadamard transform domain for information embedding presented in the literature. It is known that to ensure the reliability of the steganographic message perception, information should be embedded in its high-frequency components; nevertheless, the issues of the correspondence of the Walsh-Hadamard transformants to the frequency components of the original matrix of the cover image are poorly researched. The purpose of this paper is to develop a formal sufficient condition for ensuring the reliability of perception of ste-ganographic messages in the Walsh-Hadamard transform domain. This purpose was achieved by establishing the relationship between the Walsh-Hadamard transformants and the discrete cosine transform transformants, which was theoretically substantiated in two ways, and also experimentally confirmed. Based on the established relationship between the Walsh-Hadamard transform and the discrete cosine transform, as well as the components of the singular value decomposition of the corresponding matrices, a sufficient condition has been developed to ensure the reliability of the perception of ste-ganographic messages in the Walsh-Hadamard transform domain. The sufficient condition consists in the fact that after embedding of additional information using any steganographic method, those Walsh-Hadamard transformants that correspond to the singular triples of the matrix corresponding to small (smallest) in value singular numbers, should change.

Keywords: steganographic communication channel, steganographic message perception reliability, digital image, Walsh-Hadamard transform, sequence, discrete cosine transform, singular value decomposition of a matrix.

DOI: https://doi.org/10.52254/1857-0070.2022.2-54.08 UDC: 004.056

Conditie suficienta pentru asigurarea unei perceptii fiabile a mesajului stegano în domeniul transformârii

Walsh-Adamar Kobozeva A.A., Sokolov A.V.

Universitatea Nationalâ "Odesika Politehnika" Odessa, Ucraina

Rezumat. Având în vedere corespunderea înaltâ a transformârii Walsh-Adamar cu arhitectura instalatiilor de calcul moderne, un interes practic prezintâ utilizarea acesteia în metodele moderne de steganografie si steganoanalizâ. Actualmente, literatura de specialitate prezintâ metode steganografice eficiente care utilizeazâ domeniul transformârii Walsh-Adamar pentru încorporarea informatiilor. Este cunoscut faptul câ, pentru o perceptie fiabilâ a unui mesaj de tip stegano, încorporarea informatiilor ar trebui sâ aibâ loc în componentele de înaltâ frecventâ ale acestuia, dar problemele legate de potrivirea transformârilor Walsh-Adamar cu componentele de frecventâ ale matricei originale sunt slab investigate. Scopul acestei lucrâri este de a formula o conditie formalâ suficientâ pentru fiabilitatea perceptiei mesajelor de tip stegano în domeniul transformârii WalshAdamar. Acest obiectiv a fost atins prin stabilirea relatiei dintre transformârile Walsh-Adamar si transformârile discrete ale cosinusului, care a fost argumentatâ teoretic în douâ moduri si, de asemenea, verificatâ experimental. Pe baza relatiei stabilite între transformata Walsh-Adamar si transformata discretâ a cosinusului, precum si a componentelor descompunerii singulare a matricelor corespunzâtoare, a fost formatâ o conditie suficientâ pentru fiabilitatea perceptiei mesajelor steganografice în regiunea transformârii Walsh-Adamar, care constâ în faptul câ, dupâ introducerea de informatii suplimentare prin orice metodâ steganograficâ, acele transformâri WalshAdamar, care corespund triplurilor singulare ale matricei corespunzâtoare matricelor mici. Cuvinte-cheie: canal de comunicare steganograficâ, fiabilitatea perceptiei mesajului steganografic, imagine digitalâ, transformatâ Walsh-Adamar, frecventâ, transformatâ cosinus discretâ, descompunerea matricei singulare.

© A.A. Kobozeva, A.V. Sokolov, 2022

Достаточное условие обеспечения надежности восприятия стеганосообщения в области

преобразования Уолша-Адамара Кобозева А. А., Соколов А.В.

Национальный университет «Одесская политехника» Одесса, Украина

Аннотация. В виду высокого соответствия преобразования Уолша-Адамара архитектуре современных вычислительных средств практический интерес представляет его использование в современных методах стеганографии и стеганоанализа. В настоящий момент в литературе представлены эффективные стеганографические методы, использующие область преобразований Уолша-Адамара для внедрения информации. Известно, что для обеспечения надежности восприятия стеганосообщения, внедрение информации должно происходить в его высокочастотные составляющие, тем не менее вопросы соответствия трансформант Уолша-Адамара частотным составляющим исходной матрицы являются малоисследованными. Целью настоящей статьи является формирование формального достаточного условия обеспечения надежности восприятия стеганосообщений в области преобразования Уолша-Адамара. Поставленная цель была достигнута за счет установления взаимосвязи между трансформантами Уолша-Адамара и трансформантами дискретного косинусного преобразования, которая была теоретически обоснована двумя способами, а также подтверждена экспериментально. На основе установленной взаимосвязи преобразования Уолша-Адамара и дискретного косинусного преобразования, а также составляющих сингулярного разложения соответствующих матриц сформировано достаточное условие обеспечения надежности восприятия стеганосообщений в области преобразования Уолша-Адамара, которое состоит в том, что после внедрения дополнительной информации с помощью любого стеганографического метода, изменению должны подвергнуться те трансформанты Уолша-Адамара, которые соответствуют сингулярным тройкам матрицы, отвечающим малым (наименьшим) по значению сингулярным числам. Полученные в работе результаты могут служить основой разработки новых стеганоалагоритмов, а также методов стеганоанализа, основанных на применении свойств области преобразования Уолша-Адамара, при этом стеганопреобразование возможно проводить в любой области контейнера (пространственной, преобразования). Ключевые слова: стеганографический канал связи, надежность восприятия стеганосообщения, цифровое изображение, преобразование Уолша-Адамара, частость, дискретное косинусное преобразование, сингулярное разложение матрицы.

I. INTRODUCTION AND STATEMENT OF THE PROBLEM

In modern complex information security systems, steganographic methods are increasingly used, which can not only protect information from possible reading by intruders, but also hide the very fact of its transfer from unauthenticated users. At present, the theory and practice of steganography are rapidly developing [1], as well as many steganographic methods for protecting information are being developed and improved. These methods are based on a wide variety of mathematical constructions, starting from the classical LSB (Least Significant Bit) method, which ensures the effective embedding of additional information into a container, most often in the spatial / temporal domain [2], ending with methods using the container transform domains [3-7] (discrete cosine transform (DCT), discrete wavelet transform, Fourier transform, domains of various matrix decompositions (singular value, spectral, etc.)), as well as the Walsh-Hadamard transform [8-9]) for the embedding of additional information.

The development of steganography is accompanied by the development of steganalysis methods, the main task of which is to reveal the presence of embedded information in information content [10], which makes it very difficult in modern conditions to meet the requirement of reliable concealment of the fact of organizing a covert communication channel. Because of this, for modern steganographic methods, the relevance of the requirement for the reliability of perception of the steganographic message (ensuring the absence of visual differences between the container and the steganographic message) increases when organizing a covert communication channel [11]. Today, we are talking not only about the appearance of obvious artifacts in the steganographic message but also about the appearance of any differences that may not be perceived as changes in the original image without container availability: a change in brightness, color shades, slight smoothing of contours, etc., however, become definable by direct comparison with the container. It should be noted that exactly the guaranteed reliability of

the steganographic message perception makes the LSB method so "tenacious" and widely used, despite its well-known shortcomings, in particular, its vulnerability to attacks against an embedded message.

Quantitative estimation of the reliability of steganographic message perception today is carried out using standard differential distortion indicators [12]: MSE (Mean Square Error), SNR (Signal to Noise Ratio), PSNR (Peak Signal to Noise Ratio), although they are often biased since they cannot fully consider the features of human vision. This possible bias is especially pronounced in cases when changes in digital content occur in its local (small in size) areas. Here, a formal quantitative assessment of

distortion can be acceptable in the conditions of artifacts presence (Fig. 1, b)), while the values of the differential indicators in the absence of obvious visual distortions can be low (Fig. 1, c)). As a container in this paper, we consider a digital image (DI) or a digital video frame, which, under the conditions of the considered problem, do not fundamentally differ in anything in the sense that the formal representation of each is one (image in grayscale) or several (color image) two-dimensional matrices, and any changes to the original content, including the steganographic transformation, can be considered as a perturbation of the corresponding matrix or matrices.

a) b) c)

Fig. 1 Illustration of the imperfection of the differential indicators for assessing the visual distortions of the DI: a) initial DI; b) distorted DI (PSNR = 52 dB); c) distorted using Gaussian

noise DI (PSNR = 28 dB)

In the existing steganographic methods, the restrictions on the area of their applicability often occur precisely because for some DI containers the reliability of perception of the generated steganographic message can be violated. This most often occurs due to the fact that when developing a steganographic algorithm, sufficient formal conditions for the reliability of perception are not considered (or such formal conditions have not been found in the used domain of the container), and the assessment of the reliability of perception is done "a posteriori". This situation does not fully allow the use of a random container and that is a drawback of the corresponding methods. It should be noted that the formal mathematical apparatus for ensuring the reliability of perception of steganographic messages have been developed in relation to steganography not so long ago [13], before that everything was limited to considering the peculiarities of human vision: changes are more strongly perceived in areas of digital insight with small differences in brightness values, or background, which

corresponds to low-frequency components. In [13], using the mathematical apparatus of the perturbation theory and matrix analysis, sufficient conditions were obtained to ensure the reliability of perception of the generated steganographic message, the use of which made it possible to "a priori" ensure/check the fulfillment of this property in the domain of the singular value (or spectral) decomposition of the corresponding matrix. Considering the possible provision of the uniqueness of such decompositions, the obtained sufficient conditions can be applied regardless of the chosen steganographic transformation domain (spatial, frequency, various decompositions); however, in practice, it is still advisable to obtain such sufficient conditions in each of the domains of the DI, where it is possible to carry out the steganographic transformation which will make it possible to avoid the transformation to the domain of the singular value (spectral) decomposition of the matrix, in order to analyze the degree of ensuring the reliability of perception of the steganographic message if the

steganographic transformation is performed in another domain of the container.

In view of the high computational efficiency, as well as compliance with the architectural features of modern processors, steganographic methods based on the use of the Walsh-Hadamard transform domain are promising for modern information security systems. In particular, in [8], it was proposed to embed information into a container by modifying the matrices of the two-dimensional Walsh-Hadamard transform of the original image. In this method, it is proposed to modify all the elements of the resulting matrices of the two-dimensional Walsh-Hadamard transform of the original image, except for the elements of their first column, which in the general case does not guarantee the reliability of perception of the steganographic message, which will be shown below in this paper. Today in the literature there is no rigorous substantiation of the influence of modification of one or another two-dimensional Walsh-Hadamard transformant on the distortions that arise in the container image. This circumstance significantly complicates the development of promising steganographic methods based on the use of the properties of the Walsh-Hadamard transform.

The purpose of this paper is to obtain a formal sufficient condition for ensuring the reliability of perception of steganographic messages in the Walsh-Hadamard transform domain.

To achieve this purpose, it is necessary to solve the following tasks:

1. Finding the relationship between the Walsh-Hadamard transform domain and the frequency domain of a DI.

2. Finding the relationship between the Walsh-Hadamard transform and the components of the singular value decomposition of the corresponding matrix.

3. Experimental confirmation of the obtained theoretical results.

II. RELATIONSHIP BETWEEN THE WALSH-HADAMARD TRANSFORM AND THE DISCRETE COSINE TRANSFORM

The basic transform used in many modern graphic compression algorithms, as well as steganographic algorithms, is the discrete cosine transform (DCT), which can be written in matrix form

S — CN XCN ,

(1)

where X is a fragment of the original image of size N x N, C is the N x N matrix of discrete cosine transform, the elements C(i, j), i, j = 0,1,...,N -1 of which are calculated in accordance with the formula

C(i, j) — \

1

-Jn'

S2

if i — 0;

(2)

cos(2 j +1) • i • n, if i > 0.

The resulting DCT matrix S (1) has the following distribution of frequency components, schematically shown in Fig. 2 [14].

It is well known [10] that the modification of the high-frequency components (located in the lower right corner of the DCT transformants matrix) leads to the least visual distortions of the original image, while the modification of the middle frequencies corresponds to larger distortions. The greatest distortions of the original image occur when modifying the low-frequency components (upper left corner) of the DCT transformants matrix.

Another type of transform which is often used in cryptography [15] and signal theory [16] is the discrete Walsh-Hadamard transform, which in matrix form can be written as the following matrix product

V — YH„

(3)

where is the Walsh-Hadamard matrix of order N = 2k, which can be constructed in accordance with Sylvester's construction

H t —

2k

H k 1

H

H„M -H t_i

2k 1 2k 1

(4)

where H — 1, and Y is a row vector of length N.

Expression (3) is the one-dimensional Walsh-Hadamard transform, while in graphic information processing applications, in particular, for steganography applications, the two-dimensional discrete Walsh-Hadamard transform is used, which is defined as

w—Hn XH'NN

(5)

Fig. 2. Distribution of frequency components in DCT transformants

of H,, and harmonic functions will have the

form

where H'N =

1

-H„ =

1

VN

H,, and X is the

log2 N 2 2

matrix of size N x N.

Let us find the relationship between the elements of the of the Walsh-Hadamard transformants matrix and the frequency components of the matrix X. In particular, considering the purpose of the paper, the localization of the high-frequency components of the matrix X of the DI in the Walsh-Hadamard transformants matrix is of greatest interest. Each of the Walsh functions, while not being harmonic, is characterized by a sequency [17], which is analogous to the frequency for harmonic functions, and in the case of the harmonic functions, these two characteristics coincide. In accordance with [17], if the number of sign changes in the time interval of the function f is equal to 7, then the sequency 7 of the function f is determined as 7/2 for even 7, or (7 +1)/2 for odd 7, respectively. Moreover, each of the Walsh functions has a natural correspondence with the harmonic in the time interval t e[0,l] [17], at which the higher

sequency of the Walsh function corresponds to the higher frequency of the corresponding harmonic.

Let us denote by HN (i,:) the i -th row of the matrix H . In the accepted notation, considering (4), the correspondence between the initial rows

HN (1,:) ^ sin (mt), Hr ( 2,:) ^ sin ( Nnt ),

HN (3,:) ^ sin ^N nt j , HN ( 4,0 ^ cos ^N mj,

(6)

etc.

The highest sequency among the rows of matrix (4), which are discrete Walsh functions, ordered according to Hadamard, will always have HN (2,:), for which 7 = N/2 = 2k 1; the highest frequency of all the corresponding harmonics (6) has the corresponding to HN (2,:)

harmonic sin (Nnt).

For a clearer understanding of the relationship between the frequency components and the components of the Walsh-Hadamard transformants matrix, we assume that X = E, where E is the identity matrix of the corresponding size. In this case, the result of relation (5) will not depend in any way on the image matrix, but will be determined only by the coefficients of the Walsh-Hadamard matrix

W=H'Nxh'NT = H'NHN. (7)

Relation (7) can be rewritten as

H \H N - —

H H

H/C/V,:)

■((HN (l,:))r, (HN (2,:))T (HN (N,:))T) =

N

Hn (1,:)( HN (1 :))T , HN (1,:)(Hn (2,:))r, ..., HN (1,:)(HN M)'/

HN (2,:)(HN (1,:)) , HN (2,:)H (2,:)) , ..., HN (2,:)H (N,:)) HN (N,:)(HN (1, .)f , HN (N,:)H (2,.))" . . . . , HN (N,:)(HN (N,:))T

Considering (8), as well as the relationship (6) between the Walsh functions and the corresponding harmonics, as well as the well-known formulas for transforming the product of trigonometric functions into a sum, we formulate the following hypothesis.

Condition A. In the Walsh-Hadamard transformants matrix (5), element (2,2) will correspond to the highest-frequency component of X, some of the high-frequency components will be localized within the second row and the second column of matrix (5), regardless of its size. There are no low-frequency components within the second row and second column. In general, in matrices that are the result of the Walsh-Hadamard transform, the high-frequency components will correspond to the elements at the intersection of rows and columns corresponding to discrete Walsh functions with the highest sequencies. Thus, to localize the elements corresponding to the high-frequency components of the DI block (matrix), it is

sufficient to determine the functions with the highest sequencies among the Walsh functions. So, considering the sequency of discrete Walsh functions, ordered according to Hadamard, used to transform matrices of size l x l, where l e {4,8,16}, indicated in Table 1, it can be argued that the high-frequency components of the signal in the matrix of size 4 x 4 will correspond to the elements in the matrix (5) at the positions (written in decreasing order of sequency): (2,2), (2,4), and (4,2); in the matrix of size 8 x 8 : (2,2), (2,6), and (6,2), (2,8), and (6,8), and (6,6); in the matrix of size 16 x16: (2,2), (2,10), and (10,2), (2,14), and (14,2), (2,6), and (6,2), etc. In Table 1 we can write out all the elements of the matrix in the order of frequency decreasing. Note that if the sequencies of the functions are the same, then when identifying compliance with high-frequency components, preference should be given to the one with the greater value of 7 .

Table 1

Correspondence between values 7 and 7 for Walsh functions ordered according to Hadamard for

different sizes of Walsh-Hadamard matrices

l=4 Row number 1 2 3 4

7/7 0/0 3/2 1/1 2/1

l=8 Row number 1 2 3 4 5 6 7 8

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

7/7 0/0 7/4 3/2 4/2 1/1 6/3 2/1 5/3

l=16 Row number 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

7/7 0/0 15/8 7/4 8/4 3/2 12/6 4/2 11/6 1/1 14/7 6/3 9/5 2/1 13/7 5/3 10/5

For practical confirmation of the proposed hypothesis with help of the MatLAB environment, a computational experiment was performed, in which 1000 DI were used from traditional image databases in both lossy (JPEG)

format (NRCS base [18]) and lossless (TIFF) (img_Nikon_D70s [19], 4cam_auth [20]). The considered image size was 400 x 400 pixels. During the experiment, each DI was divided in a standard way into l x l -blocks, where l e {4,8,16}

(the sizes of the blocks were chosen as the most frequently used in block steganographic methods). For each block B, the Walsh-Hadamard transform (5) (the result is a block B ) and the discrete cosine transform (the result is a block B ) were calculated. Then a certain element (i, j) in the BDCT (the same element (i, j) for all the DI blocks) was perturbed (the result is a block Bdct ), after which the perturbed block B was restored by inverse cosine transform. For the block B the Walsh-Hadamard transform was performed (the result is a block Bwh ), after which, by comparison of Bwh and BWH, the most disturbed element of the block B was found. For all the DI blocks, such an element of the block BWH was determined that more often than others had the maximum perturbation as a result of perturbation of the (i, j) element of the block BDCT, as well as a quantitative characteristic of this frequency, for which a l x l -matrix R of maximum disturbance was built for each DI, the element R, i, j = 0,1,..., l -1 of which was equal to the number of DI blocks, for which the maximum in absolute value Bwh - bm matrix element is located at position (i, j).

The experimental results, which fully correspond to the theoretical positions substantiated above, are presented in Table 2 and Fig. 3 (the localization of high-frequency components is highlighted by filling the corresponding

elements), while the values of the R matrix elements did not depend on the magnitude of the disturbing effect on the B matrix elements (during the experiment, the disturbances were ±1%; ±10%; ±100%, but depended only on their

localization in Bn

which confirms the

accuracy of the established correspondence between the elements of the frequency domain and the Walsh-Hadamard transform domain. Note that since the low-frequency components correspond not only to the elements of the first column of the matrix of the Walsh-Hadamard transformants (Fig. 3), it is obvious that the method proposed in [8], as already noted above,

cannot guarantee the reliability of perception of the generated steganographic message. Note that for some blocks of the DI, the same maximum disturbance in blocks of the form (5) was achieved simultaneously in several elements, which was considered during the experiment. The behavior of DI in different storage formats (lossy and lossless) was slightly different. So, for the majority of DI in the lossy format, the number of blocks where the maximum disturbance in the matrix (5) occurred in one single element that meets the theoretical assumptions, often coincided with the total number of blocks or differed slightly (less than 1.5%), while in other elements the disturbance maximum in blocks was not achieved at all. For DI in a lossless format, the desired element in the Walsh-Hadamard transform domain, corresponding to a specific frequency coefficient, was determined by the absolute maximum of the blocks where it underwent maximum disturbance; the same maximum was reached in other elements of the transformed block. This situation is obviously a consequence of the fact that for DI in a lossy format, the high-frequency coefficients as a result of quantization and rounding in the process of saving and subsequent image restoration become comparable to zero in value. Because of this, even with a small absolute perturbation, their relative perturbation will be significant. The consequence of this fact is that the sufficient condition obtained below will work better for DI in a lossy format. An illustration is shown in Fig. 4. The DI matrix of the size 400 x 400, originally saved in the TIFF format, and then re-saved in the JPEG format, was divided into 8 x 8 blocks, the element (8,8) in each block BXT was perturbed.

Thus, for the matrix, which is the result of the Walsh-Hadamard transform of the matrix X of an arbitrary size, it is possible to accurately set the elements corresponding to the high-frequency components of the matrix X . The steganographic transformation, which results in a perturbation of these elements in the Walsh-Hadamard transform domain, will ensure the reliability of perception of the received steganographic message.

Table 2

Correspondence between the high-frequency components of the DI block and the elements of the result of the Walsh-Hadamard transform of the block

Block

size l

Element (i, j) subjected to disturbance in BœT / element (m,n), subjected to

maximum disturbance in the B^ in maximum number of DI blocks under perturbation of the ( i, j ) element in BXT (the number of DI blocks (%), in which the B^ element ( m, n ) has subjected to the maximum disturbance)

4 (4,4)/(2,2) (97.3%) (4,3)/(2,4) (95.6%) (3,4)/(4,2) (96.1%)

8 (8,8)/(2,2) (99.4%) (8,7)/(2,6) (99.4%) (7,8)/(6,2) (99.4%)

16 (16,16)/(2,2) (99.8%) (16,15)/(2,10) (99.9%) (15,16)/(10,2) (99.9%)

a)

b)

(1-1) (1.16) (1.8) (1.9) (1.4) (1.13) (1.5) (1.12) (1.2) (1.15) (1.7) (1.10) (1.3) (1.14) (1.6) (1,11)

(16.1) (16.16) (16.8) (16.9) (16.4) (16.13) (16.5) (16.12) (16.2) (16.15) (16.7) (16.10) (16.3) (16.14) (16.6) (16.11)

(8.1) (8.16) (8.8) (8.9) (8.4) (8.13) (8.5) (8.12) (8.2) (8.15) (8.7) (8.10) (8.3) (8.14) (8.6) (8.11)

(9.1) (9.16) (9.8) (9.9) (9.4) (9.13) (9,5) (9.12) (9.2) (9.15) (9.7) (9.10) (9.3) (9.14) (9,6) (9.11)

(4.1) (4.16) (4.8) (4.9) (4.4) (4.13) (4.5) (4.12) (4.2) (4.15) (4.7) (4.10) (4.3) (4.14) (4.6) (4.11)

(13.1) (13.16) (13.8) (13.9) (13.4) (13.13) (13.5) (13.12) (13.2) (13.15) (13.7) (13.10) (13.3) (13.14) (13.6) (13.11)

(5.1) (5.16) (5.8) (5.9) (5.4) (5.13) (5.5) (5.12) (5.2) (5.15) (5.7) (5.10) (5.3) (5.14) (5,6) (5.11)

(12.1) (12.16) (12.8) (12.9) (12.4) (12.13) (12.5) (12.12) (12.2) (12.15) (12.7) (12.10) (12.3) (12.14) (12.6) (12.11)

(2.1) (2.16) (2.8) (2.9) (2.4) (2.13) (2.5) (2.12) (2.2) (2.15) (2.7) (2.10) (2.3) (2.14) (2,6) (2.11)

(15.1) (15.16) (15.8) (15.9) (15.4) (15.13) (15.5) (15.12) (15.2) (15.15) (15.7) (15.10) (15.3) (15.14) (15.6) (15.11)

(7.1) (7.16) (7.8) (7.9) (7.4) (7.13) (7.5) (7.12) (7.2) (7.15) (7.7) (7.10) (7.3) (7.14) (7.6) (7.11)

(10.1) (10.16) (10.8) (10.9) (10.4) (10.13) (10.5) (10.12) (10.2) (10.15) (10.7) (10.10) (10.3) (10.14) (10.6) (10.11)

(3.1) (3.16) (3.8) (3,9) (3,4) (3,13) (3.5) (3.12) (3.2) (3.15) (3.7) (3,10) (3.3) (3.14) (3,6) (3.11)

(14.1) (14.16) (14.8) (14.9) (14.4) (14.13) (14.5) (14.12) (14.2) (14.15) (14.7) (14.10) (14.3) (14.14) (14.6) (14.11)

(6.1) (6.16) (6.8) (6,9) (6,4) (6.13) (6,5) (6.12) (6.2) (6.15) (6.7) (6.10) (6,3) (6.14) (6,6) (6.11)

(11.1) (11.16) (11.8) (11.9) (11.4) (11.13) (11.5) (11.12) (11.2) (11.15) (11.7) (11.10) (11.3) (11.14) (11.6) (11.11)

c)

Fig. 3. Correspondence of B^ elements through BDCT

sizes l : a) l = 4 ; b) l = 8 ; c) l =16

elements for blocks of different

10 0 0 0 0 0 0 0

0 2490 0 0 0 0 0 0

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

a) b) c)

Fig. 4. a) original DI in lossless format; b) R matrix for DI in TIFF format; c) R matrix for the original DI, resaved to the JPEG format

A slightly different view on determining a To research the physical essence of the relationship between the domains of the Walsh- transformants of the two-dimensional Walsh-Hadamard transform and DCT, leading to the Hadamard transform (5) and their relationship same results, is proposed below. with the DCT transformants (1), it is convenient

to consider their representation using row vectors.

Consider row vectors V and Y of length N2 that are the result of sequential concatenation of rows of matrices W and X (5) of size N x N, respectively. In this case, the following statement takes place.

Statement 1. Transformants of two-dimensional Walsh-Hadamard transform (5) and DCT (1) when represented as a row vector can be found using the following relation

V = YA,

(9)

where A is the matrix of order N2, the elements of which are the coefficients near x elements

of the matrix X after the expansion of the product (1) or (5).

The proof of Statement 1 is obvious. Moreover, in the case of using the two-dimensional Walsh-Hadamard transform (5), the following is true.

Statement 2. In the case of the two-dimensional Walsh-Hadamard transform, the matrix A coincides with the Walsh-Hadamard

matrix H 2 of order N2, constructed in

N '

accordance with Sylvester's construction (4) up 1

to a coefficient

VN"

To prove the Statement 2, we use the definitions of the one-dimensional and two-dimensional Walsh-Hadamard transform in terms of the complete binary code b (k) of length n , where i = 0,1,...,n -1, n = log2 N, к = 0,1,...,N -1.

In this case, the one-dimensional Walsh-Hadamard transform of the vector Y is specified using the following relation

V. =Y Yx (-1)

Y ь ( Ф, (.)

(10)

where the sum Y b (x)b .) is the dot product of

i=0

the codewords of the complete code with numbers x and . .

The relation defining the two-dimensional Walsh-Hadamard transform of the matrix X has the form

1 N -1N-1

Wv = - Y Y x,

v NXi

x = 0 y = 0

Yb(x)A, (u)+b (y)b(v) (-1),=°

Let us rewrite expression (11) with respect to row vectors V and Y, obtained as a result of row-by-row concatenation of matrices W and X

Vw =

1 N2-1 z//N)b(w//N )+b (z mod N)b(w mod N) , (12)

= N S Yz • (-1)'="

N z=0

where z = 0,1,...,N2 -1, and the symbol // denotes an integer division operation.

In expression (12), the part of the expression under the sum b (z //N)b (w//N) defines the duplication of the dot product of the codewords

of the complete code with numbers z and w N times (equivalent to the low-frequency part of the complete code of length n'= log N2 = 2log N), while the part of the expression under the sum fy (z mod N)b (w mod N) leads to the formation of the dot product of the codewords of the complete code with numbers z and w each time the value of z changes (equivalent to the high-frequency part of the full code of length n' = log N2 = 2 log N).

Thus, in expression (12), the sum

Y b (z / / N )b (w / / N ) + b (z mod N )b (w mod N ) i

is

equivalent to the sum Yb (x)b (.) in expression

i =0

(10) of the one-dimensional Walsh-Hadamard transform using the complete code b (k), k = 0,1,...,N2 -1 with the codeword length n' = 2 log N, while the two-dimensional Walsh-Hadamard transform of the matrix X

corresponds, up to a coefficient -1, to the one-

dimensional Walsh-Hadamard transform of the vector Y , which is formed by a sequential concatenation of matrix X rows, which proves the Statement 2.

Let us also consider a specific example of the operation of Statement 2 using the direct expansion of the product (5), which, for example, we perform for matrices W, X, HA of order N = 4

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

i=0

x=0

T 1

W = HNXHTN = -

+ + +

- + -

+ - -

- - +

X11 X12 X13 X14

X21 X22 X23 X24

X31 X32 X33 X34

X41 X42 X43 X44

+ + + +

+

- - +

1

N

+*3i + X32 + X33 + X34 + X41 + X42 + X43 + X44

X11 X12 + X13 X14 + X21 X22 + X23 X24 +

+- 31 - 32 + - 33 - 34 + - 41 - 42 + - 43 - 44

- - - - +- +- +- +-

X11 X12 X13 + X14 '

+X31 X32 X33 + X3

X11 X12 X13 + X14

+ X31 X32 X33 + X3

X11 X12 X13 + X14

X31 + X32 + X33 X3

(13)

Performing sequential concatenation of the rows of matrices W and X, as well as writing down the coefficients near the elements x in the

resulting matrix of expression (13), it is not difficult to rewrite expression (5) with respect to vectors V and Y of length N2

V =

- r- t

W11 x11

W12 x12

W13 X13

X14

W21 X21

W21 X22

W23 X23

W24 = ya = X24

W31 X31

W32 X32

W33 X33

W34 X34

W41 X41

W42 X42

W43 X43

W44 _ X44 _

++++++++++++++++

+ + — + + — + + — + + —

+ — + + — + + — + + — +

+ + + +----+ + + +----

+ - + — + - + + - + — + - +

+ +----+ + + +----+ +

+ — + - + + - + — + - + + -

+ + + + + + + +--------

+ - + - + - + — + - + - + - +

+ + — + +----+ + — + +

+ — + + — + - + + — + + -

+ + + +--------+ + + +

+ - + — + - + - + - + + - + -

+ +----+ + — + + + + —

+ — + - + + — + + - + — +

(14)

Analyzing expressions (13) and (14), we can conclude that each coefficient wt] of the matrix

of Walsh-Hadamard transformants shows the degree of "presence" in the X matrix of one or another frequency component, which represent all possible superpositions of rows of the original Walsh-Hadamard matrix H4. In this case, in view of the structural features of the Walsh-Hadamard matrices, these superpositions coincide with the rows of the Walsh-Hadamard matrix of order N2, i.e. in our case H16. This is not true for DCT matrices, i.e. for a given matrix C,, the matrix A does not correspond to

the DCT matrix of order N2, in other words A ^ Cr2. However, performing calculations

similar to those performed in (13), it is not difficult to find a matrix A for DCT as well.

Thus, as in the case of the Walsh-Hadamard

transform, expression (1) can be rewritten with

respect to row vectors P and Y of length N2

obtained by sequential concatenation of the rows

of matrices S and X, respectively.

Next, consider a specific example based on the

DCT matrix of order N = 4 constructed in

accordance with (2)

" 0.5 0.5 0.5 0.5 " 0.65 0.27 -0.27 -0.65 0.5 -0.5 -0.5 0.5 0.27 -0.65 0.65 -0.27

for which we find a matrix A , after which we rewrite expression (1) with respect to row vectors P and Y

Q =

(15)

+- 31 + - 32 + - 33 + - 34 - 41 - 42 - 43 - 44

+- 31 - 32 + - 33 - 34 - 41 + - 42 - 43 + - 44

- 11 + - 12 + - 13 + - 14 + - 21 + - 22 + - 23 + - 24

- 11 - 12 + - 13 - 14 + - 21 - 22 + - 23 - 24

- 31 + - 32 - 33 + - 34 - 41 + - 42 - 43 + - 44

X31 X32 x33 X34 X41 X42 X43 X44

X11 X12 + X13 X14 X21 + X22 X23 + X24

X31 + X32 X33 + X34 + X41 X42 + X43 X44

X11 + X12 X13 X14 + X21 + X22 X23 X24 +

+X31 + X32 X33 X34 + X41 + X42 X43 X44

34

41

42

43

44

X11 + X12 X13 X14 X21 X22 + X23 + X24 +

+ X31 + X32 X33 X34 X41 X42 + X43 + X44

34

41

42

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

43

44

X31 X32 + X33 + X34 X41 X42 + X43 + X44

34

41

42

43

44

X11 + X12 X13 X14 X21 X22 + X23 + X24

X11 X12 X13 + X14 X21 + X22 + X23 X24

X31 X32 + X33 + X34 + X41 + X42 X43 X44

X31 + X32 + X33 X34 + X41 X42 X43 + X44

P =

r- -, ,- -n T

S11 X11

su X12

S13 X13

S14 X14

S21 X21

S22 X22

S23 X23

S24 = YA1 = X24

S31 X31

S32 X32

S33 X33

S34 X34

S41 X41

S42 X42

S43 X43

_S44 _ _ X44 _

25 25 25 25 25 25 25 25 25 25 25 25 25 25 25 25

0.33 0.14 -0.14 -0.33 0.33 0.14 -0.14 -0.33 0.33 0.14 -0.14 -0.33 0.33 0.14 -0.14 -0.33

0.25 -0.25 -0.25 0.25 0.25 -0.25 -0.25 0.25 0.25 -0.25 -0.25 0.25 0.25 -0.25 -0.25 0.25

0.14

-0.33 0.33 -0.14 0.14 -0.33 0.33 -0.14 0.14 -0.33 0.33 -0.14 0.14 -0.33 0.33 -0.14

0.33 0.33 0.33 0.33 0.14 0.14 0.14 0.14 -0.14 -0.14 -0.14 -0.14 -0.33 -0.33 -0.33 -0.33

0.43 0.18 -0.18 -0.43 0.18 0.07 -0.07 -0.18 -0.18 -0.07 0.07 0.18 -0.43 -0.18 0.18 0.43

0.33 -0.33 -0.33 0.33 0.14 -0.14 -0.14 0.14 -0.14 0.14 0.14 -0.14 -0.33 0.33 0.33 -0.33

0.18 -0.43 0.43 -0.18 0.07 -0.18 0.18 -0.07 -0.07 0.18 -0.18 0.07 -0.18 0.43 -0.43 0.18

0.25 0.33 0.25 0.14 0.14 0.18 0.14 0.07

0.25 0.14 -0.25 -0.33 0.14 0.07 -0.14 -0.18

0.25 -0.14 -0.25 0.33 0.14 -0.07 -0.14 0.18

0.25 -0.33 0.25 -0.14 0.14 -0.18 0.14 -0.07

-0.25 -0.33 -0.25 -0.14 -0.33 -0.43 -0.33 -0.18

-0.25 -0.14 0.25 0.33 -0.33 -0.18 0.33 0.43

-0.25 0.14 0.25 -0.33 -0.33 0.18 0.33 -0.43

-0.25 0.33 -0.25 0.14 -0.33 0.43 -0.33 0.18

-0.25 -0.33 -0.25 -0.14 0.33 0.43 0.33 0.18

-0.25 -0.14 0.25 0.33 0.33 0.18 -0.33 -0.43

-0.25 0.14 0.25 -0.33 0.33 -0.18 -0.33 0.43

-0.25 0.33 -0.25 0.14 0.33 -0.43 0.33 -0.18

0.25 0.33 0.25 0.14 -0.14 -0.18 -0.14 -0.07

0.25 0.14 -0.25 -0.33 -0.14 -0.07 0.14 0.18

0.25 -0.14 -0.25 0.33 -0.14 0.07 0.14 -0.18

0.25 -0.33 0.25 -0.14 -0.14 0.18 -0.14 0.07

(16)

Using the obtained one-dimensional representation of the DCT, as well as the two-dimensional Walsh-Hadamard transform, we can establish a relationship between the transformants of both transforms. Note, however, that in view of the difference in the nature of the basis functions of the DCT and the Walsh-Hadamard transform, the effect of a change in one or another coefficient in the Walsh-Hadamard transform domain will affect a number of coefficients in the DCT domain, and vice versa.

Values of 77

Nevertheless, research shows that it is possible to establish the coefficients of DCT and the two-dimensional Walsh-Hadamard transform, which have the greatest influence on each other. In accordance with the definition of the sequency [17], we find the values of the number of sign changes t for each row of the matrix A (16), which we calculated for the transformants of the DCT of the matrix of order N = 4 . Data on the number of sign changes tj for rows of matrix A (16) are presented in Table 3.

Table 3

for the DCT matrix

No. of row 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

A (16) 0 7 8 15 1 6 9 14 2 5 10 13 3 4 11 12

Analyzing the data presented in the Table 3, and comparing it with the data presented in Table 1, we can establish a correspondence between the sequencies (frequencies) of the basis functions of the DCT and the Walsh-Hadamard transform, thus making a conclusion about which of the

S\2 513 S14 s21 S22 S23 $24

t z t t t 1 t t

wn wu W14 w12 w31 W33 W34 W32

transformants of the Walsh-Hadamard transform leads to the greatest change in certain transformants of the DCT. For convenience, this correspondence will be written as the following expression

s31 S32 s33 S34 S41 $42 s 43 s 44

t t z : t t : t

W41 W43 W44 W42 w21 W23 W24 w22

The obtained correspondence (17) completely coincides with the results presented in Fig. 2. Expression (17) allows us to establish a correspondence between the Walsh-Hadamard and DCT transformants, and also shows disturbance of which of the Walsh-Hadamard transformants affect the quality of the original image most of all.

III. CONNECTION BETWEEN THE WALSH-HADAMARD TRANSFORM AND THE SINGULAR VALUE

DECOMPOSITION OF A MATRIX

As already noted, formal sufficient conditions for ensuring the reliability of perception of a ste-ganographic message have already been proposed earlier in the domain of singular value (spectral) decomposition (of blocks) of the container matrix [13], according to which the reliability of perception of a steganographic message will be ensured if singular vectors of matrix (blocks of matrix) of the container (eigenvectors of a symmetric matrix), perturbed as a result of the steganographic transformation, correspond to small singular values (small in absolute value eigenvalues of a symmetric matrix (symmetric matrix blocks)) or singular values that have small gaps (eigenvalues of a symmetric matrix (symmetric matrix blocks) that have small absolute gaps). In this case, the smaller the perturbations of the singular values (eigenvalues of the symmetric matrix), gaps (absolute gaps), and the singular values (absolute values of the eigenvalues of the symmetric matrix) that correspond to the perturbed singular vectors (eigenvectors of the symmetric matrix), the greater the probability of observance of the reliability of perception of steganographic messages. Moreover, in the case of applying a sufficient condition to the blocks of the matrix, the blocks are obtained by its standard partitioning [22].

In order of definiteness let us consider a complete set of parameters, which completely determines the DI and consists of a singular values and singular vectors set of non-intersecting DI l x l -blocks [13], an arbitrary one of which is B. The sufficient condition mentioned above, considering the fact that in the DI (digital video frame) matrix, the singular values are not simply related by the ratio: a > a2 >... > a, > 0, but this ratio can be clarified

al»a2> ... >a,> 0 , (18)

in this case, the gap is calculated by the formula [21]: svdgap(i,B) = min|a—ct7|, in accordance

with which

svdgap (1,B) = a — a >> svdgap(i,B), i > 1, in

this case, the gap of the smallest singular value can be significantly less than one (up to comparability with 0), which leads to the fact that the singular values mentioned in the sufficient condition is the lowest singular value. Consider the singular value decomposition of the matrix B in the form of outer products [21] i

B =1 auvT , (19)

i=1

giving a representation of B in the form of a sum of matrices of rank equal to one, each of which corresponds to its own singular triple (a,u,vi). Taking this into account, as well as

(18), the above sufficient condition can be formulated in a slightly different form: the reliability of perception of the steganographic message will be ensured in the case when, in the formal representation of the steganographic transformation in the domain of singular value decomposition of matrix blocks, this is expressed in a perturbation in matrices of rank equal to one corresponding to the smallest singular value in (19).

It should be noted that under a sufficient condition formulated in the domain of the singular value decomposition of a matrix, we do not have such a clear separation by frequency components as in the domain of DCT or Fourier transform, since each singular triple (and the corresponding matrix of rank one) carries information about all frequencies, but in varying degrees. So, the singular triples, corresponding to the minimum / maximum / average singular values, correspond mainly to the high-frequency / low-frequency / mid-frequency components. The separation of frequencies between singular triples is "softer" than directly in the frequency domain, which gives advantages in steganography [13].

It can be assumed that the absence of a clear division into frequencies will lead to a "softer" correspondence between the singular triples of the matrix and the elements of the Walsh-Hadamard transformants, and will give an opportunity for "greater maneuver" in the process of steganographic transformation, without impairing the reliability of perception of the ste-ganographic message, expanding the possible transformation area.

For confirmation, a computational experiment was performed, in which many of the DI indicat-

ed above were involved. During the experiment, perturbations were introduced into the matrix a4uvf (for blocks of size 4x 4), into matrices au^J and agu^ (for blocks of size 8x 8), and into matrices auvT, i e {13,14,15,16} (for

blocks of size 16 x16). As a result, the area of possible disturbance of the DI blocks in the Walsh-Hadamard transform domain was expanded, which makes it possible to preserve the

reliability of perception of the steganographic message (Fig. 5).

The resulting situation is absolutely natural. An additional expansion of the area of possible disturbance without violating the reliability of perception occurs, in fact, due to the use of elements that can already be attributed to those that correspond to the mid-frequency component, which, as it is known, with a significant probability does not violate the reliability of perception.

(U)

(4.1)

(2.1)

(3.1)

(1.4) (4.4)

(2.4)

(3.4)

(1.2) (4.2)

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

(2.2)

(3.2)

(13) (4.3)

(2.3)

(3.3)

a)

b)

(1.1) (1.16) (1.8) (1.9) (1.4) (1.13) (1.5) (1.12) (1.2) (1.15) (1.7) (1.10) (1.3) (1.14) (1.6) (1.11)

(16.1) (16.16) (16.8) (16.9) (16.4) (16.13) (16.5) (16.12) (16.2) (16.15) (16.7) (16.10) (16.3) (16.14) (16.6) (16.11)

(8.1) (8.16) (8.8) (8.9) (8.4) (8.13) (8.5) (8,12) (8.2) (8.15) (8.7) (8.10) (8.3) (8,14) (8.6) (8.11)

(9.1) (9.16) (9.8) (9.9) (9.4) (9.13) (9.5) (9.12) (9.2) (9.15) (9.7) (9.10) (9,3) (9.14) (9.6) (9.11)

(4.1) (4.16) (4.8) (4.9) (4.4) (4.13) (4.5) (4.12) (4.2) (4.15) (4.7) (4.10) (4.3) (4.14) (4.6) (4.11)

(13.1) (13.16) (13.8) (13.9) (13.4) (13.13) (13.5) (13.12) (13.2) (13.15) (13.7) (13.10) (13.3) (13.14) (13.6) (13,11)

(5.1) (5.16) (5.8) (5,9) (5.4) (5.13) (5.5) (5.12) (5.2) (5.15) (5.7) (5.10) (5.3) (5.14) (5.6) (5.11)

(12.1) (12.16) (12.8) (12.9) (12.4) (12.13) (12.5) (12.12) (12.2) (12.15) (12.7) (12.10) (12.3) (12.14) (12.6) (12,11)

(2.1) (2.16) (2.8) (2.9) (2.4) (2.13) (2.5) (2.12) (2.2) (2.15) (2.7) (2.10) (2.3) (2.14) (2.6) (2.11)

(15.1) (15.16) (15.8) (15.9) (15.4) (15.13) (15.5) (15.12) (15.2) (15.15) (15.7) (15.10) (15.3) (15.14) (15.6) (15.11)

(7.1) (7.16) (7.8) (7.9) (7.4) (7.13) (7.5) (7.12) (7.2) (7.15) (7.7) (7.10) (7.3) (7.14) (7.6) (7.11)

(10.1) (10.16) (10.8) (10.9) (10.4) (10.13) (10.5) (10.12) (10.2) (10.15) (10.7) (10.10) (10.3) (10.14) (10.6) (10.11)

(3.1) (3.16) (3.8) (3.9) (3.4) (3.13) (3.5) (3.12) (3.2) (3.15) (3.7) (3.10) (3.3) (3.14) (3.6) (3.11)

(14.1) (14.16) (14.8) (14.9) (14.4) (14.13) (14.5) (14.12) (14.2) (14.15) (14.7) (14.10) (14.3) Î14.14Ï (14.6) (14.11)

(6.1) (6.16) (6.8) (6.9) (6.4) (6.13) (6.5) (6.12) (6.2) (6.15) (6.7) (6.10) (6.3) (6.14) (6.6) (6.11)

(11.1) (11.16) (11.8) (11.9) (11.4) (11.13) (11.5) (11.12) (11.2) (11.15) (11.7) (11.10) (11.3) (11.14) (11.6) (11.11)

c)

Fig. 5. Localization of the area of possible disturbance as a result of the steganographic transformation in the Walsh-Hadamard transform domain for l x l -blocks of the DI:

a) l = 4 ; b) l = 8 ; c) l = 16

IV. A SUFFICIENT CONDITION FOR ENSURING THE RELIABILITY OF PERCEPTION OF A STEGANOGRAPHIC MESSAGE

Based on the results obtained in this paper, we can formulate a sufficient condition for ensuring the reliability of perception of the steganographic message. To ensure the reliability of perception of the steganographic message, it is sufficient to embed additional information in such a way that in the Walsh-Hadamard transform domain, its result would be a disturbance of

the elements, the localization of which is shown in Fig. 5 for l x l -blocks of size l e {4,8,16},

while the embedding process itself can be implemented not only directly in the Walsh-Hadamard transform domain, but also in any other domain of the container (spatial, transformation). If it is necessary to use blocks of a different size, it is recommended to perform embedding to the DI in such a way that the result would be a perturbation of the elements in the Walsh-Hadamard transform domain within the boundaries of the second column and the second

row of the transformant matrix. For a more accurate localization of possible disturbances, it is necessary to perform additional research considering Condition A.

For practical verification of the obtained sufficient condition, a computational experiment was performed, in which DI from the previously listed bases were involved. Perturbations were introduced into the block matrix in the Walsh-

Hadamard transform domain. The perturbations of each element were taken from the set {+1, -1}, considering the fact that during organizing a covert communication channel, additional information, as a rule, is a binary sequence. The experiment was performed for blocks of size 8x 8 . The results are presented in Table 4.

Table 4

The results of the embedding of the information in the Walsh-Hadamard transform c

omain

* 1 S S

o .

o „a

<D> ^

tS ^

<D Ph

^ J * £ ^

«

<N

<N

viT

3

<N

<N ocT

<N

3

<N

<N X

OO ^ <N

oo

£

<N

Vi" vo"

00 oo"

oo oo

S 3

oo

Î

ViT

Co ^ ^ c? ^

^ s &

ÎN ^

oo ^ oo ^

<N Co

^¡r ^

<N

PSNR (dB)

48.1

45.2

45.1

45.1

39.7

48.0

48.0

42.1

37.7

The results obtained are in full agreement with the theoretical conclusions, practically confirm the effectiveness of the obtained sufficient condition for ensuring the reliability of the perception of the steganographic message.

A visual illustration is shown in Fig. 6, where the magnitude of the perturbation of the elements in the matrices, which are the result of the Walsh-Hadamard transform of the DI 8 x 8 -blocks, was ±1. Artifacts or differences of the original from the perturbed DI (Fig. 6, b)) are not detected by subjective ranking.

V. A SUFFICIENT CONDITION FOR

ENSURING THE RELIABILITY OF PERCEPTION OF A STEGANOGRAPHIC MESSAGE

Note that the obtained sufficient condition, because of the mathematical approach used, makes it possible to prevent local violations of the reliability of perception associated not only with the steganographic transformation, which was already mentioned in the introduction (Fig. 1), and where the difference indicators are often insufficient. An illustration of this is shown in Fig. 7, where the brightness value of only one pixel is changed on the original DI.

With significant DI sizes, such a change is not visually detected in the image at all, but it can be detected with a more thorough visual analysis, including the use of existing software tools. Analyzing the 8 x 8 -block B containing the changed pixel, it was found that all the elements in the Walsh-Hadamard transform domain underwent changes, the disturbances of which were « 3.1 (matrix (5) for block B , the absolute values of the elements (except for (1,1)) are less than 1, as it is shown in (20)), which does not satisfy the obtained sufficient condition and, as expected, leads to the possibility of establishing a violation of the reliability of perception. Note that such a local violation of the reliability of perception could not be detected even if the difference indicator was applied separately for each block, which is proposed, for example, in [23]. Indeed, the authors of the method for quantitatively assessing of the reliability of the perception of a digital image, taking into account the specificity of the difference indicators, recommend to first divide the DI into non-overlapping blocks, the sizes of which are comparable with size 128x128 pixels (otherwise the technique may be ineffective), and take the minimum PSNR value for all used blocks as a quantitative estimate.

a 6

Fig. 6. Effectiveness illustration of the obtained sufficient condition for ensuring the reliability of perception of the steganographic message: a) the original DI; b) DI obtained as a result of perturbation of all elements of the second column and second row in each block, which is the Walsh-Hadamard transformants of DI 8 x 8 -blocks

a) b)

Fig. 7. Local changes of the DI: a) the original image with the selected original 8 x 8-area; b) image, the integrity of which is violated within the selected 8 x 8 -area

251.0781 0.1094 0.1719 0.3281 -0.2656 0.0156 -0.0469 -0.0156

-0.0156 0.0156 -0.0469 -0.0156 -0.1094 0.0469 -0.0156 0.0156

0.0781 -0.0156 -0.0781 -0.0469 -0.3281 0.0781 0.1406 0.0469

-0.1406 0.0156 0.0781 -0.0156 -0.0469 -0.0156 0.0469 -0.0469

-0.1719 0.1094 0.2969 -0.0469 -0.3906 0.1406 0.3281 0.1094

0.0469 0.0781 0.0156 0.0469 0.0781 -0.0156 0.0469 0.0781

0.0156 0.0469 0.1094 0.0156 -0.0156 0.0156 0.0781 0.1094

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

0.1094 -0.1094 -0.0469 -0.0156 0.0781 -0.0156 -0.0781 -0.0469

W =

But in the case of very small local changes in the DI, as, for example, shown in Fig. 7, the block size makes it impossible to quantitatively indicate a local violation of the reliability of perception: here the PSNR for a block containing a disturbed pixel was 46.5 dB.

Thus, the obtained sufficient condition can be used not only to ensure the reliability of perception of the steganographic message, but also as a tool that will make it possible, even in the absence of a visual picture, to draw conclusions about the possible appearance of artifacts in the image or digital video frame with a high proba-

(20)

bility, including, in a small local area (up to one pixel change).

VI. CONCLUSIONS

Let's note the main results of the performed research:

1. The relationship between the Walsh-Hadamard transform and the Discrete Cosine Transform is established, which is theoretically substantiated in two ways: by considering the correspondence between the Walsh-Hadamard functions and harmonics, and also by establish-

ing a correspondence between the two-dimensional and one-dimensional Walsh-Hadamard transforms. Both methods gave the same results, which are confirmed by the conducted empirical research. At the same time, the specific localization of transformants, which correspond to high-frequency components for Walsh-Hadamard matrices is derived for practically valuable sizes N = 4,8,16 .

2. A connection between the transformants of the Walsh-Hadamard transform and singular triples (blocks) of the DI matrix was established, which made it possible, using the existing sufficient condition to ensure the reliability of the perception of a steganographic message in the domain of singular value decomposition of the matrix, to expand the area of possible disturbances as a result of the steganographic transformation in the Walsh-Hadamard transform domain, compared to that which was determined only by high-frequency components.

3. On the basis of the performed research, a sufficient condition was obtained to ensure the reliability of perception of the steganographic message in the Walsh-Hadamard transform domain, which can be used regardless of the domain of the container (spatial, transformation) where additional information is embedded.

4. The obtained sufficient condition allows us to draw conclusions about the possible (with a high probability) appearance of artifacts in the image, frame of digital video, including in a small local area (up to a change in one pixel), even in the case when visually these changes are not easily visualized on the DI.

The results obtained in this paper, together with the advantages of the Walsh-Hadamard transform, such as the fact that the elements of its basis vectors belong to the binary alphabet, as well as the simplicity of constructing transform matrices, determine the prospects for the development and practical application of the Walsh-Hadamard transform for estimating the effectiveness of existing steganographic methods, as well as development of new promising methods for steganography and steganalysis.

References

[1] Tao J. et al. Towards robust image steganogra-phy, IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(2), pp. 594-600. doi: 10.1109/tcsvt.2018.2881118

[2] Veena S.T., Arivazhagan S. Universal secret pay-load location identification in spatial LSB stego

images, Annals of Telecommunications, 2019, 74, pp. 273-286. doi: 10.1007/s12243-018-0676-

x

[3] Cheddad A., Condell J., Curran K., Mc.Kevitt P. Digital image steganography: Survey and analysis of current methods, Signal processing, 2010, Vol. 90, No. 3, pp. 727-752. doi: 10.1016/j.sigpro.2009.08.010

[4] Reddy H.S.M., Raja K.B. High capacity and security steganography using discrete wavelet transform, International Journal of Computer Science and Security (IJCSS), 2009, Vol. 3, No. 6, pp. 462-472.

[5] Patel H., Dave P. Steganography technique based on DCT coefficients, International Journal of Engineering Research and Applications, 2012, Vol. 2, No. 1, pp. 713-717.

[6] Soni A., Jain J., Roshan R. Image steganography using discrete fractional Fourier transform, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP), IEEE, 2013, pp. 97-100. doi: 10.1109/issp.2013.6526882

[7] Subhedar M.S., Mankar V.H. High capacity image steganography based on discrete wavelet transform and singular value decomposition, Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, 2014, pp. 1-7. doi: 10.1145/2677855.2677918

[8] Sheidaeian H., Zolfaghari B., Zobeiri M. An Efficient and Secure Approach to Multi-User Image Steganography Using CRC-Based CDMA, International Conference on Signal Acquisition and Processing. Singapore, 2011. Vol. 2. pp. 1-5.

[9] Bhattacharyya S., Mondal S., Sanyal G. A Robust Image Steganography using Hadamard Transform, International Conference on Information Technology in Signal and Image Processing, Mumbai, 2013, pp. 416-426.

[10] Karampidis K., Kavallieratou E., Papadoura-kis G. A review of image steganalysis techniques for digital forensics, Journal of Information Security and Applications, 2018, 40, pp. 217-235. doi: 10.1016/j.jisa.2018.04.005

[11] Saleh M.E., Aly A.A., Omara F.A. Data security using cryptography and steganography techniques. International Journal of Advanced Computer Science and Applications, 2016, 7(6), pp. 390-397.

[12] Konakhovich G.F., Puzyrenko A.Yu. Computer steganography. Theory and Practice, Kiev: MK-Press, 2006, 288 p.

[13] Kobozeva A.A., Khoroshko V.A. Information security analysis. Kiev: Ed. of the State University of Telecommunications, 2009, 251 p.

[14] Lu Leng, Jiashu Zhang, Jing Xu et al. Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain, International Journal of Physical

Sciences, 2010, No. 5(17), pp. 467-471. doi: 10.1109/ictc.2010.5674791

[15] Logachev O.A., Salnikov A.A., Iashchenko V.V. Boolean functionsin coding theory and cryptography, American Mathematical Soc., 2012, 241 p.

[16] Mazurkov M.I. Broadband radio communication systems, Odessa: Science and Technology, 2010, 340 p.

[17] Bazhenov A.V. Digital methods for the implementation of space-time signal processing in aviation radio-electronic complexes, Stavropol: SVVAIU, 2006, 219 p.

[18] NRCS Photo Gallery // United States Department of Agriculture. URL: https://www.nrcs.usda.gov/wps/portal/nrcs/main/ national/newsroom/multimedia/

[19] Gloe T., Böhme R. The "Dresden Image Database" for benchmarking digital image forensics,

Proceedings of the 2010 ACM Symposium on Applied Computing (SAC '10), New York, 2010, pp. 1585-1591. doi: 10.1145/1774088.1774427

[20] Hsu Y., Chang S. Detecting image splicing using geometry invariants and camera characteristics consistency, 2006 IEEE International Conference on Multimedia and Expo, Toronto, 2006, pp. 549-552. doi: 10.1109/icme.2006.262447

[21] Demmel J.W. Applied Numerical Linear Algebra, Siam, 1997, 416 p. doi: 10.1137/1.9781611971446

[22] Gonzalez R., Woods R. Digital Image Processing, Pearson; 4th edition, 2017, 1192 p.

[23] Narimanova O.V. et al. Technique of quantitative assessment of digital image perception reliability, Informatics and mathematical methods in simulation, 2014, Vol. 4, No. 4, pp. 332-336.

Information about authors.

Kobozeva Alla Anatolyevna. Odessa Polytechnic National University. Department of Cybersecurity and Software, Head of Department, Doctor of Technical Sciences, Professor. Research interests include information security, in particular, steganography, information content integrity expertise.

E-mail: alla_kobozeva@ukr.net

Sokolov Artem Viktorovich. Odessa Polytechnic National University. Department of Cybersecurity and Software, Associate Professor, Candidate of Technical Sciences. Research interests include information security methods based on perfect algebraic constructions. E-mail: radiosquid@gmail.com

i Надоели баннеры? Вы всегда можете отключить рекламу.