On the Method of Hidden Subband Embedding of Control Information in Digital Images

Authors

  • Dmitry S. Chursin LLC "CPS Group of Companies"
  • Evgeniy G. Zhilyakov Belgorod State National Research University
  • Andrey A. Chernomorets Belgorod State National Research University

DOI:

https://doi.org/10.52575/2687-0932-2026-53-1-227-238

Keywords:

hidden embedding, digital images, subband matrix, vector projections, stegocontainer distortion, resistance to external destructive influences

Abstract

The article is devoted to the development of a steganographic method for embedding data in digital images. The authors propose a method for hidden subband embedding of control information based on subband image analysis within the Fourier transform. Subband image analysis makes it possible to analyze the properties of images from the perspective of dividing the DFT definition area into subdomains in order to determine the subdomains into which it is proposed to implement hidden data embedding. In the developed method, the hidden subband embedding of control information is carried out on the basis of modifications of image line projections onto the eigenvectors of the subband matrix corresponding to an uninformative frequency interval. The embedded information, consisting of a set of bit sequences, is presented as a bipolar sequence of characters immediately before the embedding. To test the operability of the developed method, computational experiments were conducted on data embedding in digital images in order to evaluate the secrecy of data embedding and the robustness of embedded data extraction to additive uniformly distributed noise. The results of the conducted computational experiments demonstrated the operability of the developed method of hidden subband data embedding. It is shown that the proposed method ensures the secrecy of data embedding and the stability of data extraction in the conditions of external destructive influences in the form of additive noise.

Downloads

Download data is not yet available.

Author Biographies

Dmitry S. Chursin, LLC "CPS Group of Companies"

Software Product Implementation Specialist, Belgorod, Russia
E-mail: dima.chursin@bk.ru

Evgeniy G. Zhilyakov, Belgorod State National Research University

Doctor of Technical Sciences, Professor, Professor of the Department of Information and Telecommunication Systems and Technologies, Belgorod, Russia

Andrey A. Chernomorets, Belgorod State National Research University

Doctor of Technical Sciences, Associate Professor, Professor of the Department of Applied Informatics and Information Technology, Belgorod, Russia

References

Список литературы

Гантмахер Ф.Р. 1967. Теория матриц. М.: Наука, 574.

Грибунов В.Г., Оков И.Н., Туринцев И.В. 2009. Цифровая стеганография. М.: Солон-Пресс, 272.

Жиляков Е.Г. 2015. Оптимальные субполосные методы анализа и синтеза сигналов конечной длительности. Автоматика и телемеханика, 4: 51–66.

Жиляков Е.Г. 2017. Построение трендов отрезков временных рядов. Автоматика и телемеханика, 3: 80–95.

Жиляков Е.Г., Черноморец А.А., Голощапова В.А. 2011. Реализация алгоритма внедрения изображений на основе использования неинформационных частотных интервалов изображения-контейнера. Вопросы радиоэлектроники, 4(1): 96–104.

Жиляков Е.Г., Черноморец А.А., Болгова Е.В. 2014. О разложении изображений по собственным векторам субполосных матриц. Научные ведомости Белгородского государственного университета. Серия: Экономика. Информатика, 15(186): 185–189.

Жиляков Е.Г., Черноморец А.А., Болгова Е.В., Гахова Н.Н. 2014. Исследование устойчивости стеганографии в изображениях. Научные ведомости Белгородского государственного университета. Серия: Экономика. Информатика, 1(172): 168–174.

Жиляков Е.Г., Бабаринов С.Л., Прохоренко Е.И., Чурсин Д.С. 2025. Основы обработки сигналов в рамках субполосных представлений. Экономика. Информатика, 52(1): 145–155.

Конахович Г.Ф. 2006. Компьютерная стеганография. Теория и практика. М: МК–Пресс, 288.

Лихолоб П.Г. 2018. Разработка и исследование субполосного метода и алгоритмов скрытного внедрения контрольной информации в отрезки речевых сигналов: специальность 05.13.17 «Теоретические основы информатики»: диссертация на соискание ученой степени кандидата технических наук: 179.

Старовойтов В.В. 2018. Уточнение индекса SSIM структурного сходства изображений. Информатика, 15(3): 41–55.

Шелухин О.И., Канаев С.Д. 2024. Стеганография. Алгоритмы и программная реализация. М.: Горячая линия. Телеком, 592.

Barni M., Bartolini F., Cappellini V., Piva Al., Rigacci F. 1998. A M.A.P. identification criterion for DCT-based watermarking. Proceedings of the 9th European Signal Processing Conference.

Koh E. Zhao J. 1998. Towards reliable and hidden image copyright labeling. IEEE Seminar on Nonlinear Signals and Processing, 123–132.

References

Gantmacher F.R. 1967. Theory of matrices. Moscow: Nauka, 574.

Gribunov V.G., Okov I.N., Turintsev I.V. 2009. Tsifrovaya steganografiya [Digital steganography]. Moscow: Solon-Press, 272.

Zhilyakov E.G. 2015. Optimalnyye subpolosnyye metody analiza i sinteza signalov konechnoy dlitelnosti [Optimal subband methods for the analysis and synthesis of finite-duration signals]. Automation and Telemechanics, 4: 51–66.

Zhilyakov E.G. 2017. Postroyeniye trendov otrezkov vremennykh ryadov [Building trends of time series segments]. Automation and Telemechanics, 3: 80–95.

Zhilyakov E.G., Chernomorets A.A., Goloshchapova V.A. 2011. Realizatsiya algoritma vnedreniya izobrazheniy na osnove ispolzovaniya neinformatsionnykh chastotnykh intervalov izobrazheniya-konteynera [Implementation of an image embedding algorithm based on the use of non-informational frequency intervals of a container image]. Radio Electronics Issues, 4(1): 96–104.

Zhilyakov E.G., Chernomorets A.A., Bolgova E.V. 2014. O razlozhenii izobrazheniy po sobstvennym vektoram subpolosnykh matrits [On the decomposition of images into eigenvectors of subband matrices]. Scientific bulletin of Belgorod State University. Series: Economics. Computer Science, 15(186): 185–189.

Zhilyakov E.G., Chernomorets A.A., Bolgova E.V., Gakhova N.N. 2014. Issledovaniye ustoychivosti steganografii v izobrazheniyakh [Investigation of the stability of steganography in images]. Scientific bulletin of Belgorod State University. Series: Economics. Computer Science, 1(172): 168–174.

Zhilyakov E.G., Babarinov S.L., Prokhorenko E.I., Chursin D.S. 2025. Osnovy obrabotki signalov v ramkakh subpolosnykh predstavleniy [Fundamentals of signal processing in the framework of subband representations]. Economy. Computer Science, 52(1): 145–155.

Konakhovich G.F. 2006. Kompyuternaya steganografiya [Computer steganography]. Theory and practice. Moscow: MK–Press, 288.

Likholob P.G. 2018. Razrabotka i issledovaniye subpolosnogo metoda i algoritmov skrytnogo vnedreniya kontrolnoy informatsii v otrezki rechevykh signalov [Development and research of a subband method and algorithms for covertly embedding control information into segments of speech signals]: specialty 05.13.17 "Theoretical foundations of Computer Science": dissertation for the degree of Candidate of Technical Sciences: 179.

Starovoitov V.V. 2018. Utochneniye indeksa SSIM strukturnogo skhodstva izobrazheniy [Refinement of the SSIM index of structural similarity of images]. Computer Science, 15(3): 41–55.

Shelukhin O.I., Kanaev S.D. 2024. Steganografiya. Algoritmy i programmnaya realizatsiya [Steganography. Algorithms and software implementation]. Moscow: Hotline. Telecom, 592.

Barni M., Bartolini F., Cappellini V., Piva Al., Rigacci F. 1998. A M.A.P. identification criterion for DCT-based watermarking. Proceedings of the 9th European Signal Processing Conference.

Koh E. Zhao J. 1998. Towards reliable and hidden image copyright labeling. IEEE Seminar on Nonlinear Signals and Processing, 123–132.


Abstract views: 0

Share

Published

2026-03-30

How to Cite

Chursin, D. S., Zhilyakov, E. G., & Chernomorets, A. A. (2026). On the Method of Hidden Subband Embedding of Control Information in Digital Images. Economics. Information Technologies, 53(1), 227-238. https://doi.org/10.52575/2687-0932-2026-53-1-227-238

Issue

Section

INFOCOMMUNICATION TECHNOLOGIES

Most read articles by the same author(s)

1 2 > >>