Запис Детальніше

SELECTING THE PREFERRED ALGORITHM FOR THE EMBEDDING OF DIGITAL WATERMARKS INTO VIDEOFILES

Науковий журнал «Радіоелектроніка, інформатика, управління»

Переглянути архів Інформація
 
 
Поле Співвідношення
 
##plugins.schemas.marc.fields.042.name## dc
 
##plugins.schemas.marc.fields.245.name## SELECTING THE PREFERRED ALGORITHM FOR THE EMBEDDING OF DIGITAL WATERMARKS INTO VIDEOFILES
 
##plugins.schemas.marc.fields.720.name## Shostak, N. V.; Kharkiv National University of radioelectronics, Kharkiv, Ukraine
Bezruk, V. M.; Kharkiv National University of radioelectronics, Kharkiv, Ukraine
Astrakhantsev, A. A.; Kharkiv National University of radioelectronics, Kharkiv, Ukraine
 
##plugins.schemas.marc.fields.653.name## steganography; video; algorithm; digital watermark; method of hierarchy analysis.
 
##plugins.schemas.marc.fields.520.name## ABSTRACT<br />Context. Recently, the number of attacks on intellectual property has increased significantly, which, according to the polls,<br />occupies a leading position in the structure of modern society. The comprehensive development of the country is impossible without<br />generating its own intellectual data and their protection, which, in the face of information wars, is the most urgent task in modern<br />society. Since intellectual data must not only be generated and stored, but also transmitted through open communication channels, the<br />importance and urgency of the study of the stability of methods for protecting intellectual data to the effect of interference in<br />channels is increasing. This work is dedicated to solving this urgent task.<br />Objective – definition of a steganographic algorithm for hiding a digital watermark in a video container optimal for performance<br />criteria, resistance to attacks, concealment and bandwidth using software simulation and hierarchy analysis method.<br />Method. The algorithms for embedding of digital watermarks in a moving image are considered. Recently, much attention has<br />been paid to embedding algorithms that have properties such as resistance to attacks and the concealment of embedded information.<br />These algorithms can be classified by the type of area in which the digital watermark is embedded or seized, their bandwidth, realtime<br />performance, and resistance to specific attack types. Existing embedding algorithms in a video can be conventionally divided<br />into three main groups, depending on the area in which the embedded digital watermark: embedding methods in the spatial domain,<br />in the region of transformation, and embedding methods in video compressed by the MPEG standard. The embedding algorithms of<br />the digital watermark in the spatial area are used for uncompressed video. The embedding digital watermark is usually added to the<br />brightness component and some color components, or only to the color components. In embedding algorithms in the transformation<br />region, the watermark is distributed over the transformation region and difficult to remove after embedding. For methods in the field<br />of transformation, there are several classes of methods based on different transformation functions, the main of which are the discrete<br />cosine transform, discrete wavelet transform and discrete Fourier transform.<br />Results. As a result of calculations the choice of the preferred algorithm of concealment of digital watermarks in a video file was<br />made.<br />Conclusions. In this article, a hierarchy analysis method is used to determine the preferred algorithm for integrating information<br />into video files according to a combination of quality indicators. The preferred algorithm is obtained on the basis of existing matrices<br />of comparisons of the relative importance of quality indicators and the results of software modeling of steganographic embedding<br />algorithms in video files. If the bandwidth was chosen as the prevailing criterion, the best method based on this criterion is provided<br />by a method based on the LSB, which is enhanced by the additional use of the Hamming code with the value of the priority vector<br />0.24. When the resistance to attacks was used as the predominant criterion, the results of the studies showed the effectiveness of the<br />discrete wavelet transform method with the possibility of embedding 2 bits of the digital watermark in the DCT block into the<br />frequency domain of LH. The scientific novelty of the work is that for the first time the method of embedding in the video file was<br />prevailing on the criteria of speed, bandwidth and resistance to interference in communication channels, and the theory of concealing<br />information in video files was further developed by increasing the noise immunity of existing algorithms.<br />The practical significance of the work is determined by the applicability of the investigated algorithms for protecting intellectual<br />property on video products transmitted by channels of communication with the obstacles, the solution of this problem is an actual<br />problem in the modern world.
 
##plugins.schemas.marc.fields.260.name## Zaporizhzhya National Technical University
2018-12-07 16:07:43
 
##plugins.schemas.marc.fields.856.name## application/pdf
http://ric.zntu.edu.ua/article/view/150024
 
##plugins.schemas.marc.fields.786.name## Radio Electronics, Computer Science, Control; No 3 (2018): Radio Electronics, Computer Science, Control
 
##plugins.schemas.marc.fields.546.name## uk
 
##plugins.schemas.marc.fields.540.name## Copyright (c) 2018 N. V. Shostak, V. M. Bezruk, A. A. Astrakhantsev