ANALYSIS OF PREREQUISITES FOR ENSURING RESOURCE CONSENSUS WHEN PERFORMING STEGANOGRAPHIC DATA INSERTION PROCEDURES

DOI: 10.31673/2409-7292.2025.030518

Authors

  • M. O. Honcharov, (Гончаров М.О.) V.N. Karazin Kharkiv National University
  • O. P. Nariezhnii, (Нарєжній О.П.) V.N. Karazin Kharkiv National University
  • S. V. Malakhov, (Малахов С.В.) V.N. Karazin Kharkiv National University

DOI:

https://doi.org/10.31673/2409-7292.2025.030518

Abstract

In the conditions of sustainable growth in the complexity and multi-vector nature of modern cyber threats, digital
steganography continues to play an important role in ensuring data confidentiality [1-4] in information systems (IS) that
operate in conditions of resource limitations. The relevance of this direction emphasizes the need to create energy-efficient
steganographic algorithms that combine content resistance to hacking and low computational complexity. Experiments
confirmed the assumption that the procedure of preliminary content smoothing improves the starting conditions for the
formation of series of basic blocks (BB) of source images (in this case, content), minimizing the number of procedures at
the stage of their encoding with conversion. The introduction of these procedures reduces the consequences of fluctuation
«noise» in low-information areas of images and improves the computational complexity indicator of the processing
algorithm. Following the test trials results, preliminary assessments of their performance were obtained: - in terms of
execution time, PSNR indicator, and the number of BBs formed. The ability to flexibly configure preprocessing
parameters [1,5] allows the smoothing process to be adapted to different types of data (statistical properties of content),
ensuring a controlled level of visual distortion in the conditions of existing resource limitations of the hardware platforms
used. In practical terms, such consequences are extremely useful, especially in conditions of multitasking and/or a scarcity
of residual battery capacity in gadgets. This ensures high flexibility and efficiency of the steganography process, even in
the conditions of limited resources of the base device and/or system. The modeling performed allows to speak about good
prospects for further implementation of the considered data processing mechanisms into the structure of specialized
steganographic algorithms included in the group of mobile applications. The results obtained contribute to the further
improvement of the concept of low-resource steganography and form perspective directions for further research.
Keywords: steganography, run-lengths encoding, images, basic block, encapsulation, computational complexity;
resource consensus.

References
1. Конахович, Г., Прогонов, Д., & Пузиренко, О. (2018). Комп’ютерна стеганографічна обробка й аналіз
мультимедійних даних : підручник. Київ: Центр навчальної літератури.
2. Fridrich, J. (2009). Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge:
Cambridge University Press.
3. Yahya, A. (2019). Steganography techniques for digital images. Springer International Publishing.
4. Hassaballah, M. (2020). Digital Media Steganography: Principles, Algorithms, and Advances. Academic Press.
5. Гончаров, М. О., & Малахов, С. В. (2021, 21–23 квітня). Моделювання процедур підготовки даних
стеганоалгоритма з багаторівневим мультиплексуванням контенту. Комп’ютерне моделювання в наукоємних
технологіях (КНМТ-2021): матеріали 7-ї міжнар. наук.-техн. конф. Харків: ХНУ ім. В. Н. Каразіна, 118–122. URL:
http://surl.li/axsna.
6. Honcharov, M., & Malakhov, S. (2024). MODELING ATTEMPTS OF UNAUTHORIZED EXTRACTION OF
STEGANOCONTENT UNDER DIFFERENT COMBINATIONS OF DATA KEY-EXTRACTOR. Collection of
Scientific Papers «ΛΌГOΣ», (March 1, 2024; Paris, France), 234-245. DOI: 10.36074/logos-01.03.2024.053.
7. Shih, F. Y. (2020). Digital watermarking and steganography. Boca Raton: CRC Press.
8. Fuad, M., & Ernawan, F. (2020). Video steganography based on DCT psychovisual and object motion. Bulletin
of Electrical Engineering and Informatics, 9(3), 1015–1023. DOI: 10.11591/eei.v9i3.1859
9. Гончаров, Н., Лесная, Ю., & Малахов, С. (2022). Адаптация принципа кодирования длин серий для
противодействия попыткам неавторизованной экстракции стеганоконтента. Grail of Science, (17), 241-247. DOI:
10.36074/grail-of-science.22.07.2022.042.
10. Honcharov, M., & Malakhov, S. (2023). Adaptive modification of the output array of basic blocks series as а
mechanism to counteract unauthorized extraction of the staganocontent. Science and technology today, 8(22), 336-352.
DOI:10.52058/2786-6025-2023-8(22)-336-352.
11. Малахов, С., Колованова, Є., & Гончаров, М. (2023). ОСОБЛИВОСТІ НЕСАНКЦІОНОВАНОЇ
ЕКСТРАКЦІЇ СТЕГАНОКОНТЕНТУ ПРИ ЗМІНАХ ПРОСТОРОВОГО ПОЗИЦІЮВАННЯ ОПОРНИХ БЛОКІВ
КОНТЕНТУ. Collection of Scientific Papers «ΛΌΓOΣ», (May 26, 2023; Boston, USA), 152–157. DOI: 10.36074/logos26.05.2023.041
12. Pratt, W. K. (1978). Digital Image Processing. John Wiley & Sons.
13. Honcharov, M., Pavlova, L., & Lesnaya, Y. (2022). Modeling steganocontent extraction attempts with different
lengths stack sampling series of images blocks. Computer Science and Cybersecurity, (2), 22-27. DOI: 10.26565/2519-
2310-2022-2-02

Downloads

Published

2025-10-22

Issue

Section

Articles