You are on page 1of 90

1. : ........................................................................

3
1.1 . ............................................................................ 4
1.2 ........................................................................ 7
1.3 ................................................................................. 16

2. . ..................................................................................18
2.1 (). ............................................................................... 19
2.2 ..................................................... 22

2.2.1 StegFS. ..........................................................................................................22


2.2.2 StegFS. ..................................................................24
2.2.3 .............................................................................................27
3. : .....29
3.1 . .................................................................... 31

3.2 ...............................................34
3.2.1 .............................36
3.3 .................................................................................................................. 47

3.3.1 ..........................................47
3.3.2. .................................................49
3.3.4 ...........................................................................51
4.
. ..............................................................................................52
4.1 -................................................................................ 53
4.2 , ................................................... 53

5. : . ..........................61
5. ........................................................................................................................................ 62
5.1 ....................................................................................................... 62
5.2 .................................................................. 63
5.3 ....................................................................................... 64
5.4 ............................................................... 68

5.5.1 ............................................................................76
5.5.2 ............................................................................76
5.5.4 .......................................................................................77
5.5.5 ........................................78
1. . ................................79
2. ...............84

2
3. . .....................................................................................88
......................................................................................................................89

, ,
,
.

2011

MathCad,
,
. ,

(),

. .. .

. , ,

MathCad,
. ,
,
, .
: .., .., .. . .: , 2002. 272.
,
, -8,

, ,

.., ..

3
.

, .
,
. . .
, , , , ,
,
.

1. :
1.
1) .
2) .
3) .
4) .

1. : ,
.
.
1) .
2) .
3) .
.
1. .., .., .. . .: ,

2002. 272

2. Rotation scale and translation invariant spread spectrum digital image watermarking. IEEE
Int. Conf. on Image Processing, 1998. P. 4.
3. Pereira S., Joseph J., Deguillaume F. Template Based recovery of Fourier-Based Watermarks
Using log-polar and Log-log Maps. IEEE Int. Conf on Multimedia Computing and Systems,
1999. P. 5.

.., ..

4
1.1 .
, , . ,
, ,
().
- ,
-
. , ,

.
. , -
,

, .
1996 , ,
,
.
(Ross Anderson),
.
.
, , .

. ,

, - ,
.
,
, ,
.
,
.

.., ..

, .
.
,
,
.
.
,
(information hiding).
, ,
.
, .

.
, ,
.
, .

,
. , .
, .
, :
,
,
,
() ,
.

.

.., ..

.
1) , ,
,
,
,
,
.
2)

, ,

(, ,
, ..)
3) , ,
,
, , , ..
4) , ,
, ..
.
5) ,
,
, ,
.
6) ,
,
, ,
:
,
.
7) , ,
,

.., ..

7

, :
,
.
, ,
. ,
.

1.2
, ,
. ,
.
, .
, ,
, , .
,
, ,
, ,
,
,
, - ,
. ,
() ,
( ). ,
.
, , ,
(secret communication)
,
(digital copyright watermarking)
(digital fingerprinting & traitor tracing).
,
, , ,

.., ..

8
, . ,
, , .
, ,
.
,
.

(feature tagging, captioning).

, ,

, ,
.
.

.

.

.
.
,
, ..
, .

, ,
.
, ,
,
.
.
.

. ,
, , ..
.

.., ..

9

: (spread
spectrum), ,

..

. ,
-
[https://gir.bmstu.ru].

.
(..
) , .

, , , ..

.
, (, )
,
, , ,
,
.

, . ,
,
( )
(anonymity & traffic analysis).
, ,
,

.
, , .
, (covert
channals) . ,
,

.., ..

10
(Trusted Computer System Evaluation Criteria, TCSEC),
, :
[9].
, ,
, , ,
.

()

.
(data hiding), - (coverf, host
data, message, container), - , -
.
1.
() ,
,
, :
,

-,
.

.
, .
. -,
,
.
. -,

.

-,

.., ..

11
-, -,
( , , ,
..).


.
.
,
container',
, . ,
,
. ,
stego ( stegano).
2. () b ( b
) ,
.

: , ,
, ,
.
3. m ,
.
(, m).
4. K ,
, .
. ,
, .

.., ..

12
,
.
,

, ,
.

,
.
,
.
, , ,
, .. M Z 2n , B Z 2q =

Z 2p , q n .
5. (, ,
) b, .
6. (
) b, ,
bm,k ( bm ).
7.

: F:

F 1 : ,
(, , ) -
( , ) ,
F(m,b,k)=bm,k;

F 1 ( b m . k , k ) = m ,

m ; b, bm,k ; .
8. S =
(F, F 1 ,M,B,K), , ,
.
,
, () [8],

.., ..

13
.
, ..
F(m,b) = bm ;

F 1 (bm) = m,

m ; b,bm .
9. () S
b F
, b, .
10. ,
.
11. ,
,

( ,
,
).
,
.
.
, () ,
,
. ,
, :

.
,
. ,
;
,

.., ..

14

.
,
;
,
, ,
, .
,
.
;
, ,

;

, ,
;


.

,
,
.

:
;
.
, , ,
, ,
. , ,
, ( ). ,

.., ..

15
,
.

,

. , ,
.
.
,
.
, , B
, M .
12. ()
(, ..), .
13. ()
,
. ,
File, ,
:

M B File .
File
. ,
, , B File .
14. =
|M|/|B| ,
M .
15. ,
( )

.., ..

16
, ,
:

( B)

M max ( B)
B

( B)

,
, - .
, ,
.


. , , ,
.
, ,
, , ,
. ,
,
-.
,

, .. ,

, ,
.
1.3
,
, .
,
.

.., ..

17
,

(. 1.).

. 1. .
,
, ,

, .
,
. , ,
, , ,
. ,
,
, .

, , ,
, , .
.

.., ..

18
.
, ,
, ,
.
, , ,
.

, ..
( , ,
),
.
,
.

1983
. ,
. (
,
, ,
). , , ,
,
.

2. .
2.
1) .
2) .
3) .
4)
.
5) .

.., ..

19

2. : ,
.
.
1) .
2)
.

3) .
.
1. .., .., .. . .: -,
2002. 272.
2. Lin Ch-Y., Chang Sh.-F. Distortion Modeling and Invariant Extraction for Digital Image Printand Scan Process. International Symposium on Multimedia Information Processing, 1999. P. 10.
3. Lin Ch-Y., Chang Sh.-F. Public Watermarking Surviving General Scaling and Cropping: An
Application for Print-and-Scan Process. Multimedia and Security Workshop at ACM
Multimedia, 1999.
2.1 ().
1
1.

1.
1.1.

1.2.

.., ..

20

:
1.2.1.

, ,

1.

1.2.2.

( )

(,

)

1.2.3.

"",

2.

1.


(,

)
1.3.

(,

.., ..

21
2.

1.4.

(mimic-function)

1.

2.

1.5.

(White Noise

Storm, S-Tools),

PGP

2.
2.1.

, .

. ,

.., ..

22
,

1,
,
.
, .
,

.

, , .
:
- ,
,
.
- .
2.2
2.2.1 StegFS.
StegFS - ,
,
. StegFS , ,
, , ,
,
.

, , Encrypting File System (EFS).

. , ,

.., ..

23
.
, .
,
,
. ,
.
, , ,
.
(, , ), , ,
.
.

. ,
/,
.
.
StegFS
, .
, StegFS :
1)
2)
3)

StegFS
. ,
. , , ,
.

.
StegFS Linux,
, StegFS

.., ..

24
, ,
.
2.2.2 StegFS.
3 StegFS.
,
,
; = 1 .
,
inode Unix.
, , , ,
.
, ,
, .
, ,
. ,
,
, .
,
. ,
. ,
StegFS.

.., ..

25


1001101101101100
0110110111110111
1010110110110110
0110110110111101

0111011101110111

1101111101110111

C1

C1

C1

C1

C1

C2

C1

C2

:
--:
--:
--:

--:

. 2. StegFS

StegFS ,
. ,
, ,
, .
.

. 3.

2
, 3 ,

.., ..

26
. ,
.
3.
, 3-
:
1)

inode ,

2)

3)

, ,
, .
, StegFS
, .
StegFS -,

,
, . , ,
, ,
inode . -
, ,

.
, StegFS -,
, ,
. ,
, , ..
. , , ,
.
, . ,
.
,
. ,

.., ..

27
, ,
, ,
. , ,
, .
, StegFS
. , StegFS
. ,
,
. ,
.
,
inodes, ,
. , ,
,
.
2.2.3
StegFS , ,
,
. , , ,
, ,

. , , ,
, -
, .

. ..
, StegFS
(FAK),
, ,
.
3 , StegFS,
. StegFS
(UAK). UAK StegFS

.., ..

28
( FAK)
, UAK.

1: , FAK
2: , FAK

(FAK)

1: , FAK
2: , FAK

. 4. StegFS

UAK-
(
, FAK)

(
, FAK)


( , FAK)

UAK-

( ,
FAK)

( , FAK)
UAK-


UAK-

. 5. StegFS

.., ..

29
UAK
. UAK , ,
.
, UAK,
,
, ,
UAK . ,
UAK. ,
UAK , ,
UAK.
,
( , FAK) . .. , StegFS UAK
, . ,
,
, , . StegFS,

UAK,
UAK .
StegFS, ..
. , ..
FAK,
StegFS. 4.
,
, StegFS FAK
, , FAK.
FAK
.

3. :
.
1.
1) .

.., ..

30
2) .
3) .
4) .

3. : ,
.
.
1) .
.
2) .
3)
.

4) .
.
1. .., .., .. . .: -,
2002. 272.
2. Kutter M. Watermarking Resisting to Translation, Rotation, and Scaling. Signal Processing
Laboratory, 1998. P. 10.
3. Kutter M. Digital Signature of Color Images using Amplitude Modulation. Signal Processing
Laboratory, 1997. P. 9.
4. Herrigel A., Pereira S., Petersen H. Secure Copyright Protection Techniques for Digital Images.
International Workshop on Information Hiding, 1998. P. 22.
5. Ramkumar M. Data Hiding in Multimedia Theory and Applications. New Jersey Institute of
Technolog, 1999. P. 70.
6. Bender W. Applications for Data Hiding. IBM Systems Journal, 2000. P. 22.
7. Chae J., Manjunath B. A Robust Data Hiding Technique using Multidimensional Lattices. Proc.
IEEE Conference on Advances in Digital Libraries, 1998. P. 8.
8. Chae J., Manjunath B. A Technique for Image Data Hiding and Reconstruction without Host
Image. Proceedings of the SPIE - The International Society for Optical Engineering. 1999, P.
9. Cuche E., Marquet P., Spatial filtering for zero-order and twin-image elimination in digital offaxis holography. Applied Optics V.39, 2000. P. 40704075

.., ..

31

3.1 .

, ().
.

.6
, .6,
() -. , ,
.
() -.
,
.
, .

. , ,
.
. ,
. ,
.
. ( )
( ) .

.., ..

32

.
,
, (, ).
(/) .

,
( , ).
,
, :

2 : ,
,
(
); ,
.
, .
,
, ,
, .
,
.

() ,

( ). , ,
( ).
,
. .

- ,
.
:

.., ..

33


. 3- . ,
, ,

() (

).

().
,
.
, , ,
. ,
,
.

. , .
,
. ,
, .

.., ..

34

.7

3.2

. , -

.
, ,
( JPEG,
- JPEG2000). ,
,

-, .
,
. :

,
, , .

.., ..

35
,
. ,

,
. ()
.

).

,

1 N
( xi xi )2 ,

N i 1

N - , xi , xi -
.
- /,

10log 2

N 2552
N

( xi xi )2

i 1

255 - (.. 8 /).


, 28 30 (
).
,
n .
,
. ,
.

(), .

.., ..

36
,
.
-, (fusion) .

. ,
.
3.2.1

,
.

l ( x, y ) {1,..., L} (r ( x, y ), g ( x, y ), b( x, y )) .

().
,
. ,
.
3.2.1.1. (Kutter)

RGB .

,
.

Si - , I {R, G, B} - , p ( x, y ) - ,
.

l ( p) 0.299r ( p) 0.587 g ( p) 0.114b( p) ,

b( p) ql ( p), s 0.

i
b '( p)
,
b( p) ql ( p), si 1.
q - , .
. q, ,
.

.., ..

37
, .
, .
,
,
. b ''( p) :

b ''( p)

c
c
1

2
b
''(
p
)
b
''(
x

i
,
y
)

b ''( x, y k ) ,

4c
i c
k c

c - (, , ) (c=3).
cr , cr
.

1 cr
bi ( p) bi ( p) .
cr i 1

.
,
.
:
, JPEG, .
3.2.1.2. (Bruyndonckx)
.
-- ().
88 . :
1)

2)

, .

3)

:
.
,
. ,

.., ..

38
.
.
.
, .
, ,
. .
,
.
.
: ,
, , - ( ).

l1A , l2 A , l1B , l2 B

- .

l1A l2 A , l1B l2 B s ()
:

1,

s
0,

l '1A l '1B

n l' n l'
l '2 A l '2 B n1Al '1A n1Bl '1B
l1 2 A 2 A 2 B 2 B l2 .
,
n1A n1B
n2 A n2 B
l '1A l '1B

l '2 A l '2 B

0, l '' l '' 0 l '' l '' 0


1A
1B
2A
2B

s ''
.
1, l ''1A l ''1B 0 l ''2 A l ''2 B 0

3.2.1.3. (Langelaar)

88.

pat ( x, y ) {0,1} .
B B0 B1, .
, l0 l1.
, :

.., ..

39

1, l l ,

S 0 1
.
0, l0 l1 .
,
B1.

1, l l 0,
0 1

l0 l1. : S
.
0, l0 l1 0.
3.2.1.4. (Pitas)

, .
, .
,
22 33 ,
. :
l '( x, y ) l ( x, y ) s( x, y ) .


.
, const .
, JPEG.
88 (
JPEG).
. ,
.
3.2.1.5. (Rongen)
, , ,
. ,
( ),
( ).

1/100 ,
.

.., ..

40
.
. ,

3.2.1.6. PatchWork

Patchwork

.
( 1 5),
.
(~10000) .
.
- ai bi, .

n

i 1

i 1

Sn [(ai ) (bi )] 2 n (ai bi )

(a b )
i 1

) n.
Sn 2. Sn .
,
, .
, patches (
).
(), ,
.

Patchwork

, , .
, , ,
. . ,
1 20000
.

.., ..

41
3.2.1.7. (Bender)

, .
.
:
1) .
2)
.
3) .
,
, .
,
. ,
.
, , .
,
.
,
.
3.2.2.

. ,
,
.
. C .
,
,

,
. ,
.
.8.

.., ..

42

.8.

. , ,
. ,
, .
.
.
:
, , , , , - ().

.
- (),
( ).
, , ,
-,

.
- , -
. ,
.
, .

.., ..

43
, ,
, ,
. , . ,

,
.

,
, . ,
,

.

,
.

.9. 8x8
3.2.2.1.

, 88
. ,
, 88. cb ( j, k ) ,
b , ( j , k ) - .
( JPEG),

.., ..

44
cb , j . cb (0,0) DC. .
-.
, .
.
3.2.2.2 (Koch)
88 1 .
:
.

.
:
0 ,
, 1
:

cb ( ji , j , ki ,1 ) cb ( ji ,2 , ki ,2 ) , si 0,
cb ( ji , j , ki ,1 ) cb ( ji ,2 , ki ,2 ) , si 1.
3.2.2.3 (Benham)
.
: ,
, , ,
.
, ,
.
,
. .

. 1, ( ),
; 0
. ,
, ,
.

.., ..

45
.
, , ,
.
3.2.2.4 (Podilchuk)

.
, .
,
.
( , ). ,
: .

, .
.

.
, .
3.2.2.5 (Hsu)
.
, , .
- .
.
(
). .
si cb ( j, k ) ,

d1 (i) sign(cb ( j, k ) cb1 ( j, k )) . 1, cb ( j, k )
, , 0
.
. -,
. -,

.., ..

46
DC-
. :

c ( j, k )

cb (0,0)
d2 (i) sign b

Q
(
j
,
k
)

Q
(0,0)
.

Q( j, k )

Q(0,0)

,
.
- .
.
JPEG-.
3.2.2.6 (Cox)
.

.
.
-
.
:

c 'i ci si ; c 'i ci (1 si ); c 'i ci e si .


,
. ,
.
.
:

.
3.2.2.7 (Barni)
,
. ,
. -,
. .

.., ..

47
: c 'i ci si ci
. , :
:

l ''( x, y ) ( x, y )l '( x, y ) (1 )l ( x, y ) .
1 (
) 0 .
,
. ,

.
n

c s
i 1

'' ''
i i

3.3

,
. , (fusion) .
3.3.1

wi N,
f.
:

f '(m, n) f (m, n)(1 wi ) ,


, f .
.:

f '(m, n) f (m, n) wi
,

f '(m, n) f (m, n)e wi .

.., ..

48
,
:

wi

f (m, n) f (m, n)
.
f (m, n)

f* ,
w. wi* .

:

w* w
.
w* w

[-1; 1]. , ,
,
. ,
, .
,

SN

f ' ( S

),
.
,
. (
).

.
, ,
- ,
.
, .
( ) ,
.

,
.

.., ..

49
,
w N f*:

(m, n)wi

f
3N

(m, n) .

,
, . (
),
, .
.

, .
3.3.2.

(, ),
.
.
- .
. -,
,
.

-,

, .
3.3.2.1. (Chae)
- (), 25 %
.
,
. - , f (m, n) ,
-

w(m, n) .

.., ..

50
, ,
24 ( ).
4 ,
. .
, , , , , 24 .
, , , .
.
24-
f '(m, n) f (m, n) w(m, n) .


.
. ,

wi

f (m, n) f (m, n)
f (m, n)

: .
3.3.2.2 (Kundur)
, ,
-.
.

NW MW . f ki,l , i 1...22( M l ) , k l,
.
:

f ki,l (m, n) f ki,l (m, n) S ( f ki,l (m, n))wki ,l (m, n) ,


S , :

S f ki,l (m, n) C (u, v) T f ki,l (m, n) ,


2

u ,v

.., ..

51
C(u,v) ,
, .
,
.
, .
3.3.4
(
) . ,
.
.
. , ,
, ().
,
, .
.

, .
.
. ,
, .
.
.
.

.
(). ,
.
( ),
(,
).

. ,

.., ..

52
. ,
, , () . ,
. ()
, , .
, ,
.
,
, .

4.
.
.
1) .
2) .
3) .
.
10. .., .., .. . .: -,
2002. 272.
11. Kutter M. Watermarking Resisting to Translation, Rotation, and Scaling. Signal Processing
Laboratory, 1998. P. 10.
12. Kutter M. Digital Signature of Color Images using Amplitude Modulation. Signal Processing
Laboratory, 1997. P. 9.
13. Herrigel A., Pereira S., Petersen H. Secure Copyright Protection Techniques for Digital Images.
International Workshop on Information Hiding, 1998. P. 22.
14. Ramkumar M. Data Hiding in Multimedia Theory and Applications. New Jersey Institute of
Technolog, 1999. P. 70.
15. Bender W. Applications for Data Hiding. IBM Systems Journal, 2000. P. 22.
16. Chae J., Manjunath B. A Robust Data Hiding Technique using Multidimensional Lattices. Proc.
IEEE Conference on Advances in Digital Libraries, 1998. P. 8.
17. Chae J., Manjunath B. A Technique for Image Data Hiding and Reconstruction without Host
Image. Proceedings of the SPIE - The International Society for Optical Engineering. 1999, P.
18. Cuche E., Marquet P., Spatial filtering for zero-order and twin-image elimination in digital offaxis holography. Applied Optics V.39, 2000. P. 40704075

.., ..

53
4.1 -.

. ,
. ,
.

, -,
,
. ,

.

-.

. ,
, , -,

-.


-, ()
. ,
Blue RGB .
,
-.
4.2 , .

:
-
-
-

.., ..

54
-
MP3. ,
.
MP3 - MPEG 1 Layer 3 - ,
MPEG 1.
:
MP3 .
,
. , MP3
.
,

, , ,

( , -
, ).
,
, .

.
( ),
- .
,

, - ,
.
,
-.
.
.
.

.., ..

55
, .

x i | xi | i
xi i
xi i | xi | i

si 1
i 1, 1 - , i
si 0

- i - , si - .

, MP3, . ,
.

. , -
.
, .
. ,
, .
,
, ,
.
,
, 0 1.
, .
,

12

.

, 0 1.
:

.., ..

56

q ri (vi i )2 r (ui i )2 , ri , i - i - .

u {0 , 1,2 , 2} - 1.
v {0 ,1 , 2 ,3} - 0.

i i - i , 1 0.
q 0 , 1, 0.

-, , 8 32
.
- -

.
: , , .
.
. ,
. ,
,
. .
,
.
. ,
, . MP3
,
.

MP3

().
,
:

.., ..

57

p /x /
xi i i
pi / xi /

1
, p - ,
0

pi 1, 1 .
, ,

.
5 .
, MP3 ,
MP3 .
20 60 . ,
,
MP3 .

:
- ;
- ;
- .
,
, ..,
.
, ,
MP3 .
,
MP3, mp3stego.
MP3 ,
MP3, , ,
.

.., ..

58
: ;
,
MP3 ; 50 .
,

MP3.
.

MP3 - .
MP3 - , 26
. 4- ,
. , ,
, . .
, ,
. ,
.
, MP3

, .
,
.

, ,
.
, , 128/c 160/c.
-, ,
( 20% ).
, ,
MP3 "" . ,
,
.

.., ..

59

MP3 . MP3
, :
- ,

MP3

.
- ,
.
. MP3
,
.
- . MP3
.

,
. , ,
.
, .
1,

0,5. ,
, ,
, ,
. -
, , ..

, , .

, ,
.

, ,

.., ..

60
,
,
.

MP3

.
3 ,
-. 2 :
, ,
. , ,
, ,
, .

-1, 0, 1. ,
.
, -1 0, 0 1,
(-
), MP3 .

,
. ,
.
,
.
85% .
0,5
, ,
.
, MP3
.

. . ,

.., ..

61
,
.
, .
, ( ),
.

.
, .

5. : .
4.
1) .
2) .
3)

5. : ,
.
.
1) .
2) .
3) .
.
1.
2.

Mitchell T. Machine Learning. " McGraw-Hill, 1997.


Farid H., Lyu S. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector
Machines // Information Hiding. " 2002. " Pp. 340354.

3.

Farid H., Lyu S. Steganalysis using color wavelet statistics and one-class support vector
machines // Security, Steganography, and Watermarking of Multimedia Contents. " 2004. "
Pp. 3545.

4.

Cristianini N., Shawe-Taylor J. An introduction to support vector machines and other kernel-based
learning methods. " Cambridge University Press, 2000. " March.

.., ..

62
5.

Schoelkopf B., Sung K., Burges C. et al. Comparing Support Vector Machines with Gaussian Kernels
to Radial Basis Function Classifiers: Tech. rep.: Massachusetts Institute of Technology, 1996.

6.

Bedi C., Goyal H. Qualitative and Quantitative Evaluation of Image Denoising Techniques //
International Journal of Computer Applications. " 2010. " October. " Vol. 8, no. 14. "
Pp. 3134.

7. Pevn T., Fridrich J. Merging Markov and DCT Features for Multi-Class JPEG Steganalysis //
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia
Contents IX. " Vol. 6505. " 2007.
8.

Pevn T., Bas P., Fridrich J. Steganalysis by subtractive pixel adjacency matrix // Trans. Info. For.
Sec. " 2010. " June. " Vol. 5. " Pp. 215224.

5.

.
(
) .
5.1

,
.
, . ,
:
,
,

.
( ),
, .

(

.., ..

63
) . ,

.
, , :
, ,
,
.
. (), ()
, .
, (
), . , ,
.
5.2

..

, .
( ).
, -
.
.
- , -
.

, - .

LSB

BMP. , LSB
. .
,
. ( )
(
). .
LSB . .
BMP

.., ..

64
.
0 255. - 0000 1111. :
0000 0000<->0000 0001;
0000 0010<->0000 0011;
...
1111 1100<->1111 1101;
1111 1110<->1111 1111.
LSB.
BMP : 256/2=128

..

LSB

, .
( . 10)

.10. .
10 ,
-
.
.
5.3

,

.., ..

65
. ,
.
, , ,

.

.
, :
;
,
;
, ,
Y, ;
Y

;
Y
.
.
.
()


Y:

.., ..

66

:
,

.

,


.
,

, ,

.
,

, ,

, ,

.
,

.., ..

67
,

, ,
. - , ,
,
, . . , .

:
;
.

, ,
- . :
(/0) - P() -
(/ ) - () - .
, ,
,
(/ ) + (/ ) = 1,
(/0) + (/0) = 1.
()
() = (/ ) = 1 - (/ )= 1 - (),
() = (/0) = 1 - (/0)= 1 - ().
() -
, .

.., ..

68
() -
, , -
.
, , () ( ())
P(), .
:



, ( )
.

.
5.4

.
.

, .

- ,
, , .. , N ,

, N.

, :

.., ..

69

- .
,
,
, .. , .
,
.
I

- ,

- .

- .

.., ..

70
, , ,

-
. ,
,
:

, ,
:
1)

N,
2)

,

, ,
-
, , .
,

. ,
.
.

.., ..

71
p- ,
p- , ,
.
x,

- ,

- .

. ,

- ,

, .

.., ..

72


.
-

, :


-
5.5

, , N,

.

- ,

.., ..

73
.
, .

- m*n

. ,

,
,

, ,
.
,

(..
).
.


:

.., ..

74

, .
,
,
. .
,

.
, .
,
.
. , ,
. ,
.


.
,
.
-
,
, .
, -. -
.
:

- 4
:

.., ..

75
;
;
;
.

.
, .. ,
.
, ,
.
, , ,
.

, ,
. ,
, -.
( 5 ),
:



. ,
-
.

.., ..

76
5.5.1


, .
.

- i- ,
- ,

i-

.
5.5.2
,
.
p- g:

p- g:

- .

.., ..

77
.
,
.

( ) .
:


.
5.5.4

.
:
-:

-:

.., ..

78
5.5.5
.

,
.
, -
. ,

, :
1)

2)

3)

:
1)

2)

, :

3)

4)

5)

6)


.
,
,
,

,
.

.., ..

79

1. .

, . . ,

()

() .

, a

- s(x).

.., ..

80

- :

- ,
:

.., ..

81

.
2. [DCT (FDCT)]
[DCT (IDCT)]
JPEG
JPEG :
1) : [R G B] -> [Y Cb Cr] (R,G,B - 8-
)

, , RGB.
, RGB .
Y,
: ,
- .

2 , (
). 2
.
2) JPEG

.., ..

82
JPEG , ,
. (- ,
).
, JPG, ,
2x2 . , ,
,
.
: JPEG , (,
Y) 2 :
.
JPG
( ).
3)
8- (Y,Cb,Cr) - " ":
8- 128 .
4) 8x8 (DCT)
8x8 , 8x8
DCT-. , X 8,
, ( X
8). , Y 8,
.
8x8 .
8x8 3 (Y,Cb,Cr), DCT
8x8:

8x8 ,

8x8;

8x8 , Cb;

, , 8x8 Cr.

DCT- , ,
.
.
.

.., ..

83
DCT- 2- ,
( 8x8) (
8x8=64, )
DCT (FDCT) DCT (IDCT).
FDCT:

.
IDCT:

,
,
DCT. , AA&N, 5 29 .

JPEG JPEG (IJG), C-
www.ijg.org.
64 DCT
, , DCT- 8x8,
8x8. , 8x8 (
8x8 , 2- 8x8).
, 8x8, 64
(0..63) ,
8x8 DCT . , ,
: (
0) DC.
,
( 63
8x8). DCT AC.

.., ..

84

2.
.
Blindside

, 50 .

.
DataMark StegComm , StegMark
, StegSafe
StegSign .


.
Digital Picture Envelope , (

. ,

.
Hide4PGP - ,
ANSIC

DOS (

1.x, , OS / 2 (Warp ), Win32 (9x NT).


,
.

.., ..

85
InThePicture
Windows Bitmap (BMP) .
Invisible Secrets , ,
-. :

, ,

, .
JPHIDE JPSEEK - , JPEG
. , ,
JPHIDE JPSEEK . ,
, , , -
. , ( 5%)
,
, - .
,

JPEG

"" , . 15%
.
MP3Stego MP3- . ,

. MP3Stego

,
. MP3 , ,
MPEG, .
, .
NICETEXT ,
-


(, . .).

.., ..

86
.

(, SQL)

,
.
OutGuess - ,
. ,
.
,
.
PNM JPEG.
ScramDisk - ,
. -

ScramDisk

.
.
Snow. ASCII ,
. - , ,

, ,
.
Steganos , .
. ,
, .
StegParty
.
- , ,
. -
, - ,
.
TextHide -
, ( )

.., ..

87
wbStego ,
, , HTML Adobe PDF . ,
.

.


Windows95/NT - S-Tools, freeware.
, ,
: ,
.
S-tools gif
bmp, wav (
, ). STools - ,
, ,
, , : DES, DES IDEA -
. -
( ) ,
, ,
. ,
- .
.
,
,
.
, , .
. ,
- , : ,
S-Tools ,
.
- .
, S-Tools,
(HWY1), , ,

Steganos for Windows 95

bmp wav, HTML


( ), -
.

.., ..

88
, Steganos "" (,
) ,
.

3. .
1.


.
2.
.
3.
.
4.

.
5.
.
6. ,

.
7. () ,
.
8.

()

, .
9.

FAK

Steg FS.
10.

.
11.

.., ..

89

12.
.


1.

.., .., .. . .: -,

2002. 272.
2. Rotation scale and translation invariant spread spectrum digital image watermarking. IEEE Int.
Conf. on Image Processing, 1998. P. 4.
3. Pereira S., Joseph J., Deguillaume F. Template Based recovery of Fourier-Based Watermarks
Using log-polar and Log-log Maps. IEEE Int. Conf on Multimedia Computing and Systems,
1999. P. 5.
4. Lin Ch-Y., Chang Sh.-F. Distortion Modeling and Invariant Extraction for Digital Image Printand Scan Process. International Symposium on Multimedia Information Processing, 1999. P. 10.
5. Lin Ch-Y., Chang Sh.-F. Public Watermarking Surviving General Scaling and Cropping: An
Application for Print-and-Scan Process. Multimedia and Security Workshop at ACM Multimedia,
1999.
6. Pereira S., Thierry P. Fine Robust Template Matching for Affine Resistant Image Watermarks.
IEEE Trans. on Image Processing, 1999. - P. 12.
7. Kutter M. Watermarking Resisting to Translation, Rotation, and Scaling. Signal Processing
Laboratory, 1998. P. 10.
8. Kutter M. Digital Signature of Color Images using Amplitude Modulation. Signal Processing
Laboratory, 1997. P. 9.
9. Herrigel A., Pereira S., Petersen H. Secure Copyright Protection Techniques for Digital Images.
International Workshop on Information Hiding, 1998. P. 22.
10. Ramkumar M. Data Hiding in Multimedia Theory and Applications. New Jersey Institute of
Technolog, 1999. P. 70.
11. Bender W. Applications for Data Hiding. IBM Systems Journal, 2000. P. 22.
12. Chae J., Manjunath B. A Robust Data Hiding Technique using Multidimensional Lattices. Proc.
IEEE Conference on Advances in Digital Libraries, 1998. P. 8.
13. Chae J., Manjunath B. A Technique for Image Data Hiding and Reconstruction without Host
Image. Proceedings of the SPIE - The International Society for Optical Engineering. 1999, P. 11.

.., ..

90
14. Cuche E., Marquet P., Spatial filtering for zero-order and twin-image elimination in digital offaxis holography. Applied Optics V.39, 2000. P. 40704075.
15. W.Diffie,M.E.Hellman. New Directions in cryptography// IEEE Trans. Inform. Theory, IT-22,
vol 6 (Nov. 1976), pp. 644-654.
16. .. . /. ./ ., ,
.1988..76.N5.

.., ..

You might also like