Engineering Journal: Science and InnovationELECTRONIC SCIENCE AND ENGINEERING PUBLICATION
Certificate of Registration Media number Эл #ФС77-53688 of 17 April 2013. ISSN 2308-6033. DOI 10.18698/2308-6033
  • Русский
  • Английский
Article

Research and development of security algorithm for design documentation in CAD/CAM/CAE saving from unauthorized access

Published: 30.04.2014

Authors: Volosatova T.M., Chichvarin N.V.

Published in issue: #2(26)/2014

DOI: 10.18698/2308-6033-2014-2-1201

Category: Information technology

The study considers analysis results of the main methods of steganographic document protection (digital images). The paper also demonstrates the method and algorithm of steganographic data hiding that seem appropriate for addressing the protection of design documents from unauthorized access. The developed and implemented method of ste-ganographic protection documentation in QR-codes is described. The analysis and evaluation of the readability of the QR-code with large volumes of messages using two ste-ganographic algorithms is given: Koch algorithm and Benham algorithm. Thus, the paper proposes the method of data hiding based on a combination of coding using steganographic data hiding.


References
[1] NOU "RNTTs EKIB", rntts.rf (accessed 3 December, 2013).
[2] Gribunin V.G., Okov I.N., Turintsev I.V. Tsifrovaya steganografiya [Digital steganography]. Moscow, SOLON-Press, 2002, 272 p.
[3] JosephJ.K. Od Ruanaidh*, ThierryPun. Signal Processing, 1998, vol. 66, pp. 303-317.
[4] Pereira S., Joseph J., Deguillaume F. Template Based recovery of Fourier-Based Watermarks Using log-polar and Log-log Maps. IEEE Int. Conf on Multimedia Computing and Systems, 1999, pp. 5-15.
[5] Lin Ch.-Y., Chang Sh.-F. Distortion Modeling and Invariant Extraction for Digital Image Print-and Scan Process. International Symposium on Multimedia Information Processing, 1999, pp. 10-23.
[6] Lin Ch.-Y., Chang Sh.-F. Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process. Multimedia and Security Workshop at ACM Multimedia, 1999, pp. 13-35.
[7] Pereira S., Thierry P. Fine Robust Template Matching for Affine Resistant Image Watermarks. IEEE Trans. on Image Processing, 1999, pp. 12-37.
[8] Kutter M. Watermarking Resisting to Translation, Rotation, and Scaling. Signal Processing Laboratory, 1998, pp. 10-27.
[9] Kutter M. Digital Signature of Color Images using Amplitude Modulation. Signal Processing Laboratory, 1997, pp. 9-23.
[10] Thilaka S., Donald L. Image Reconstruction with the FFT [Book Section] .GPU Gems 2. Addison-Wesley, 2005 (accessed 12 December, 2013).
[11] Volosatova T.M., Denisov A.V., Chichvarin N.V. Informatsionnye tekhnologii, Prilozhenie - Informational technologies. Appendix, 2012, no. 5, pp. 2-32.
[12] Chichvarin N.V. Steganograficheskii metod maskirovaniia dannykh s ispol'zovaniem tsifrovykh gologramm [Steganographic method of data hiding by means of digital holograms]. 2 sbornik tezisov dokladov VNTK "Bezopasnye informatsionnye tekhnologii — 2nd coll. of abstracts "Safe informational technologies". Bauman MSTU, Moscow, 2011, pp. 11-12.
[13] http://www.ess.ru/publications/articles/kravchenko/kravchenko.htm (accessed 3 December, 2013).