post_parent): $temp_content = $post->post_content; $temp_content = explode("

",$temp_content); $temp_content = $temp_content[1]; $temp_content = explode("

",$temp_content); $temp_content = $temp_content[0]; $temp_content = strip_tags($temp_content); $temp_content = trim($temp_content); $authors = explode(",",$temp_content); ?> post_title));?>"> $value): ?> "> "> "> post_content); while ($parser->parse()) { if (($parser->iNodeName=="a")&&(substr_count($parser->iNodeAttributes['href'],".pdf")>0)): ?>

Method of steganographic data protection in audio-files based on complimentary image

Shyrochyn S.S., Sulema Y.S.

Cloud storages give a convenient way for keeping user’s digital multimedia data (images, audio and video data), and they are becoming more and more popular among a large number of users. However in case of using cloud storage that doesn’t guarantee data protection a threat of unauthorized access to user’s personal multimedia data appears. The application of existing protection methods to multimedia data in clouds isn’t appropriate, because, firstly, they don’t take into account the specific properties of multimedia data, and secondly, they aren’t oriented to needs of a usual user. In particular, time of data processing during encryption and decryption isn’t usually considered as a characteristic of data protection software, though it’s important for a user. Therefore the development of specific methods of multimedia data protection is a topical task.

In this paper a new steganography method of data protection in audio-files is proposed, it’s based on storing a complimentary image instead of stegodata as well as on the use of a modified Latin square as a key. Special properties of multimedia data are used while creating a complimentary image, in particular multi-channel nature of audio data is taken into account. Parallel computations are stipulated to be used in the proposed method. It lets to achieve better time characteristics of stegodata encryption and decryption in comparison with the use of AES encryption algorithm. The proposed method can be used for user’s personal data protection in real time while transferring through network and keeping in cloud storages.


Full text (pdf)