O.G. Umanskiy
Èlektron. model. 2024, 46(4):87-111
https://doi.org/10.15407/emodel.46.04.087
ABSTRACT
The article provides a detailed analysis of modern steganographic methods and their practical applications across various fields, with a focus on the prospects for integration into banking systems. It examines key steganographic methods, including Least Significant Bit (LSB) substitution, Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT), as well as hybrid approaches combining steganography with cryptography. The impact of steganographic methods on enhancing the security of internal communications, protecting client data, and ensuring the continuity of business processes in the banking sector is analyzed. The article presents real-world examples of implementing steganography to protect online transac-tions and mobile banking, and discusses the main stages of integrating these methods into banking systems, including security requirement analysis, testing, and staff training.
KEYWORDS
steganography, cybersecurity, data protection, cryptography, information security.
REFERENCES
- Alhomoud, A. (2021). Image Steganography in Spatial Domain: Current Status, Techniques, and Trends. Intelligent Automation & Soft Computing, 27(1), 69-88.
https://doi.org/10.32604/iasc.2021.014773 - Provos, N., & Honeyman, P. (2003). Hide and seek: an introduction to steganography. IEEE Security & Privacy, 1(3), 3244.
https://doi.org/10.1109/MSECP.2003.1203220 - Ding, W., Yan, W., & Qi, D. (2002). Digital image watermarking based on discrete wavelet transform. Journal of Computer Science and Technology, 17(2), 129-
https://doi.org/10.1007/BF02962205 - Zong, T., Xiang, Y., Natgunanathan, I., Guo, S., Zhou, W. & Beliakov, G. (2015). Robust Histogram Shape-Based Method for Image Watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 25(5), 717-
https://doi.org/10.1109/TCSVT.2014.2363743 - Hameed, M.A., Hassaballah, M., Aly, S., & Awad, A.I. (2019). An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques. IEEE Access, 7, 185189-
https://doi.org/10.1109/ACCESS.2019.2960254 - Fridrich, J., & Soukal, D. (2006). Matrix Embedding for Large Payloads. IEEE Transactions on Information Forensics and Security, 1(3), 390-
https://doi.org/10.1109/TIFS.2006.879281 - Sarkar, A., Madhow, U., & Manjunath, B.S. (2010). Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography. IEEE Transactions on Information Forensics and Security, 5(2), 225-
https://doi.org/10.1109/TIFS.2010.2046218 - Ran-Zan Wang & Yeh-Shun Chen. (2006). High-payload image steganography using two-way block matching. IEEE Signal Processing Letters, 13(3), 161-
https://doi.org/10.1109/LSP.2005.862603 - Marvel, L. M., Boncelet, C. G., & Retter, C. T. (1999). Spread spectrum image steganography. IEEE Transactions on Image Processing, 8(8), 1075-
https://doi.org/10.1109/83.777088 - Kuznetsov, O., Frontoni, E., & Chernov, K. (2024). Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography. Applied Intelligence.
https://doi.org/10.1007/s10489-024-05415-z - Gutub, A., & Al-Ghamdi, M. (2020). Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools and Applications, 79(11-12), 7951–7985.
https://doi.org/10.1007/s11042-019-08427-x - Duan, X., Guo, D., Liu, N., Li, B., Gou, M., & Qin, C. (2020). A New High Capacity Image Steganography Method Combined with Image Elliptic Curve Cryptography and Deep Neural Network. IEEE Access, 8, 25777-
https://doi.org/10.1109/ACCESS.2020.2971528 - Islam, M.A., Riad, M.A.-A.K., & Pias, T.S. (2021). Enhancing Security of Image Steganography Using Visual Cryptography. 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST).
https://doi.org/10.1109/ICREST51555.2021.9331225 - Alanzy, M., Alomrani, R., Alqarni, B., & Almutairi, S. (2023). Image Steganography Using LSB and Hybrid Encryption Algorithms. Applied Sciences, 13(21), 11771.
https://doi.org/10.3390/app132111771 - Saeidi, Z., Yazdi, A., Mashhadi, S., Hadian, M., & Gutub, A. (2023). High performance image steganography integrating IWT and Hamming code within secret sharing. IET Image Processing.
https://doi.org/10.1049/ipr2.12938 - Alobaidi, T., & Mikhael, W. (2023). An adaptive steganography insertion technique based on wavelet transform. Journal of Engineering and Applied Science, 70(1).
https://doi.org/10.1186/s44147-023-00300-x - Baluja, S. (2017). Hiding images in plain sight: Deep steganography. Advances in Neural Information Processing Systems 30 (NIPS 2017), 2066-2076.
- Zhu, J., Kaplan, R., Johnson, J., & Fei-Fei, L. (2018). HiDDeN: Hiding Data with Deep Networks. arXiv preprint arXiv:1807.09937.
https://doi.org/10.1007/978-3-030-01267-0_40 - Shang, Y., Jiang, S., Ye, D., & Huang, J. (2020). Enhancing the Security of Deep Learning Steganography via Adversarial Mathematics, 8(9), 1446.
https://doi.org/10.3390/math8091446 - Magdy, M., Hosny, K.M., Ghali, N.I., & Ghoniemy, S. (2022). Security of medical images for telemedicine: a systematic review. Multimedia Tools and Applications.
https://doi.org/10.1007/s11042-022-11956-7 - Yewale, D., Badambe, A., Bagal, Y., & Khade, P. (2016). Steganography Technique Used for Military Application. International Journal of Advance Engineering and Research Development, 3(03).
https://doi.org/10.21090/IJAERD.0303128 - Gawade, N., More, A., Dange, S., Ingole, S., & Mathaur, S. (2022). Basic of Secrete Communication System for Military by Using ML and Steganography. International Journal for Research in Applied Science & Engineering Technology (IJRASET), 10(V).
https://doi.org/10.22214/ijraset.2022.43647 - Mughal, F.T., Iranmanesh, V., Fen, G.M., & Yin, J.H.J. (2015). Internet of Things: Securing Data using Image Steganography. 2015 Third International Conference on Artificial Intelligence, Modelling and Simulation.
https://doi.org/10.1109/AIMS.2015.56 - Qasim, H.A., & Mohammed, R.S. (2023). Lightweight Steganography Technique in The Internet of Things: A survey. Al-Salam Journal for Engineering and Technology, 3(1), 97–108.
https://doi.org/10.55145/ajest.2024.03.01.008 - Oleshchenko, V., & Pevnev, V. (2017). Development of digital steganography techniques for copyright protection, based on the watermark. Advanced Information Systems, 1(1), 57–60.
https://doi.org/10.20998/2522-9052.2017.1.10 - Sae-Tang, W., Fujiyoshi, M., & Kiya, H. (2019). A New Copyright- and Privacy-Protected Image Trading System Using a Novel SteganographyBased Visual Encryption Scheme. ECTI Transactions on Electrical Engineering, Electronics, and Communications, 17(1), 95–107.
https://doi.org/10.37936/ecti-eec.2019171.215455 - Sae-Tang, W., & Sirikham, A. (2023). Image Steganography-based Copyright and Privacy-Protected Image Trading Systems. ECTI Transactions on Computer and Information Technology (ECTI-CIT), 17(3), 358–375.
https://doi.org/10.37936/ecti-cit.2023173.252500 - Zainal, N., Hoshi, A.R., Ismail, M., T. Rahem, A.A.-R., & Muhsin Wadi, S. (2024). A hybrid steganography and watermark algorithm for copyright protection by using multiple embedding approaches. Bulletin of Electrical Engineering and Informatics, 13(3), 1877–1896.
https://doi.org/10.11591/eei.v13i3.6337 - Dinesh, S., Shubham, C., Madhavi, J., Sagar, B., Swapnali, B., Jadhav, S.A. (2017). Online secure payment system using steganography and cryptography. International Journal of Advanced in Management, Technology and Engineering Sciences. 7(12), 71-75. https://doi.org/16.10089.IJAMTES.2017.V7I11.15.1977
- Orucho, D.O., Awuor, F.M., Makiya, R., & Oduor, C. (2023). Review of Algorithms for Securing Data Transmission in Mobile Banking. Modern Economy, 14(09), 1192–1217.
https://doi.org/10.4236/me.2023.149062 - Jahnavi, S., Nandini, C. (2023). Multifold Secured Bank Application Authentication Service Using Random Visual Cryptography and Multimodal Steganography with Blockchain Technology. Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, Lecture Notes in Networks and Systems. 540, 119-134.
https://doi.org/10.1007/978-981-19-6088-8_12