Steganographic method of acoustic information protection in critical applications systems
The subject of the study is the process of protecting acoustic information in critical computer systems to ensure the required level of system security. The purpose of the article is to study the method of protecting acoustic information in critical computer systems by means of masking to ensure th...
Saved in:
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Kharkiv National University of Radio Electronics
2023-11-01
|
| Series: | Сучасний стан наукових досліджень та технологій в промисловості |
| Subjects: | |
| Online Access: | https://itssi-journal.com/index.php/ittsi/article/view/421 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849412485349638144 |
|---|---|
| author | Oleksandr Mozhaiev Yurii Gnusov Oleksandr Manzhai Volodymyr Strukov Vitalii Nosov Valery Radchenko Serhii Yenhalychev |
| author_facet | Oleksandr Mozhaiev Yurii Gnusov Oleksandr Manzhai Volodymyr Strukov Vitalii Nosov Valery Radchenko Serhii Yenhalychev |
| author_sort | Oleksandr Mozhaiev |
| collection | DOAJ |
| description |
The subject of the study is the process of protecting acoustic information in critical computer systems to ensure the required level of system security. The purpose of the article is to study the method of protecting acoustic information in critical computer systems by means of masking to ensure the impossibility of unauthorized access to the system. The paper outlines the following tasks: to analyze the software and hardware masking of speech; to study the masking of speech messages in order to introduce unrecognizability; to consider the features of speech message compression; to investigate methods of covert transmission of acoustic information. The results of the work, which were obtained using mathematical methods of information transformation in computer systems, are potentially possible methods of masking speech messages to ensure the impossibility of unauthorized access to the system. The analysis of the functioning of the proposed methods made it possible to formulate specific conclusions. The research has shown that the use of direct expansion of the spectrum of discrete signals for steganographic purposes helps to covertly embed information messages in still images. The task of extracting a message on the receiving side of a steganography system is equivalent to the task of detecting information from a mixture of a useful signal and an interference in a broadband communication system. The research revealed certain disadvantages of steganographic systems with an expanded spectrum of discrete signals: the probability of correct extraction of embedded data depends on the amount of distortion introduced, which depends on the provided bandwidth of the steganographic channel. Further research is desirable to analyze the possible use of methods for synthesizing large ensembles of quasi-orthogonal discrete signals with improved ensemble, structural, and correlation properties to ensure higher security of acoustic channels in computer systems for critical applications.
|
| format | Article |
| id | doaj-art-4c15fd250eb8434dba827dd6f8a2fd51 |
| institution | Kabale University |
| issn | 2522-9818 2524-2296 |
| language | English |
| publishDate | 2023-11-01 |
| publisher | Kharkiv National University of Radio Electronics |
| record_format | Article |
| series | Сучасний стан наукових досліджень та технологій в промисловості |
| spelling | doaj-art-4c15fd250eb8434dba827dd6f8a2fd512025-08-20T03:34:26ZengKharkiv National University of Radio ElectronicsСучасний стан наукових досліджень та технологій в промисловості2522-98182524-22962023-11-013 (25)Steganographic method of acoustic information protection in critical applications systemsOleksandr Mozhaiev0Yurii Gnusov1Oleksandr Manzhai2Volodymyr Strukov3Vitalii Nosov4Valery Radchenko5Serhii Yenhalychev6Kharkiv National University of Internal AffairsKharkiv National University of Internal AffairsKharkiv National University of Internal AffairsKharkiv National University of Internal AffairsKharkiv National University of Internal AffairsKharkiv National University of Internal AffairsSimon Kuznets Kharkiv National University of Economics The subject of the study is the process of protecting acoustic information in critical computer systems to ensure the required level of system security. The purpose of the article is to study the method of protecting acoustic information in critical computer systems by means of masking to ensure the impossibility of unauthorized access to the system. The paper outlines the following tasks: to analyze the software and hardware masking of speech; to study the masking of speech messages in order to introduce unrecognizability; to consider the features of speech message compression; to investigate methods of covert transmission of acoustic information. The results of the work, which were obtained using mathematical methods of information transformation in computer systems, are potentially possible methods of masking speech messages to ensure the impossibility of unauthorized access to the system. The analysis of the functioning of the proposed methods made it possible to formulate specific conclusions. The research has shown that the use of direct expansion of the spectrum of discrete signals for steganographic purposes helps to covertly embed information messages in still images. The task of extracting a message on the receiving side of a steganography system is equivalent to the task of detecting information from a mixture of a useful signal and an interference in a broadband communication system. The research revealed certain disadvantages of steganographic systems with an expanded spectrum of discrete signals: the probability of correct extraction of embedded data depends on the amount of distortion introduced, which depends on the provided bandwidth of the steganographic channel. Further research is desirable to analyze the possible use of methods for synthesizing large ensembles of quasi-orthogonal discrete signals with improved ensemble, structural, and correlation properties to ensure higher security of acoustic channels in computer systems for critical applications. https://itssi-journal.com/index.php/ittsi/article/view/421acoustic information; technical protection; cryptographic protection; steganographic (steganophonic) protection; modification; computer system languages |
| spellingShingle | Oleksandr Mozhaiev Yurii Gnusov Oleksandr Manzhai Volodymyr Strukov Vitalii Nosov Valery Radchenko Serhii Yenhalychev Steganographic method of acoustic information protection in critical applications systems Сучасний стан наукових досліджень та технологій в промисловості acoustic information; technical protection; cryptographic protection; steganographic (steganophonic) protection; modification; computer system languages |
| title | Steganographic method of acoustic information protection in critical applications systems |
| title_full | Steganographic method of acoustic information protection in critical applications systems |
| title_fullStr | Steganographic method of acoustic information protection in critical applications systems |
| title_full_unstemmed | Steganographic method of acoustic information protection in critical applications systems |
| title_short | Steganographic method of acoustic information protection in critical applications systems |
| title_sort | steganographic method of acoustic information protection in critical applications systems |
| topic | acoustic information; technical protection; cryptographic protection; steganographic (steganophonic) protection; modification; computer system languages |
| url | https://itssi-journal.com/index.php/ittsi/article/view/421 |
| work_keys_str_mv | AT oleksandrmozhaiev steganographicmethodofacousticinformationprotectionincriticalapplicationssystems AT yuriignusov steganographicmethodofacousticinformationprotectionincriticalapplicationssystems AT oleksandrmanzhai steganographicmethodofacousticinformationprotectionincriticalapplicationssystems AT volodymyrstrukov steganographicmethodofacousticinformationprotectionincriticalapplicationssystems AT vitaliinosov steganographicmethodofacousticinformationprotectionincriticalapplicationssystems AT valeryradchenko steganographicmethodofacousticinformationprotectionincriticalapplicationssystems AT serhiiyenhalychev steganographicmethodofacousticinformationprotectionincriticalapplicationssystems |