<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2020-6-1-70-76</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-111</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATICS, COMPUTER ENGINEERING AND MANAGEMENT</subject></subj-group></article-categories><title-group><article-title>Обнаружение видео стегосистем с использованием универсального метода, основанного на использовании NIST-тестов</article-title><trans-title-group xml:lang="en"><trans-title>Detection of Video Steganography with the Use of Universal Method Based on NIST-Tests</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Ахрамеева</surname><given-names>К. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Akhrameeva</surname><given-names>K. ..</given-names></name></name-alternatives><email xlink:type="simple">noemail@neicon.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Коржик</surname><given-names>В. И.</given-names></name><name name-style="western" xml:lang="en"><surname>Korzhik</surname><given-names>V. ..</given-names></name></name-alternatives><email xlink:type="simple">val-korzhik@yandex.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Нгуен</surname><given-names>З. К.</given-names></name><name name-style="western" xml:lang="en"><surname>Nguyen</surname><given-names>C. ..</given-names></name></name-alternatives><email xlink:type="simple">noemail@neicon.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2020</year></pub-date><pub-date pub-type="epub"><day>13</day><month>04</month><year>2021</year></pub-date><volume>6</volume><issue>1</issue><fpage>70</fpage><lpage>76</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Ахрамеева К.А., Коржик В.И., Нгуен З.К., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Ахрамеева К.А., Коржик В.И., Нгуен З.К.</copyright-holder><copyright-holder xml:lang="en">Akhrameeva K..., Korzhik V..., Nguyen C...</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/111">https://tuzs.sut.ru/jour/article/view/111</self-uri><abstract><p>В статье предлагается универсальный метод обнаружения видео стегосистем, предложенный недавно авторами и основанный на использовании NIST-тестов. Описывается алгоритм обнаружения и оценивается его эффективность в терминах вероятностей пропуска и ложного обнаружения. Рассматривается возможность улучшения стойкости к обнаружению таких стегосистем за счет уменьшения скорости вложения в них скрытной информации.</p></abstract><trans-abstract xml:lang="en"><p>We propose a universal method of video stegosystem detection, which was recently suggested by the authers. They describe the detecting algorithm and its efficiency is presented in terms of the missing and false detection probabilities. The article considers the possibility of the detection resistance of such stegosystems by the means of reducing the speed of embedding secret information in them.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>видео стегосистема</kwd><kwd>алгоритмы вложения и извлечения</kwd><kwd>скорость вложения информации</kwd><kwd>вероятности пропуска и ложного обнаружения</kwd></kwd-group><kwd-group xml:lang="en"><kwd>NIST-тесты</kwd><kwd>video stegosystem</kwd><kwd>algorithms embedding and extraction</kwd><kwd>NIST-tested embedding rate</kwd><kwd>the probability of missing and false alarm</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Fridrich J. Steganography in Digital Media: Principles, Algorithms and Applications. Cambridge: Cambridge University Press, 2009.</mixed-citation><mixed-citation xml:lang="en">Fridrich J. Steganography in Digital Media: Principles, Algorithms and Applications. Cambridge: Cambridge University Press, 2009.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Небаева К.А., Герлинг Е.Ю., Догиль П.С., Федянин И.А. Цифровая стеганография и цифровые водяные знаки. Часть 1. Цифровая стеганография. СПб: СПбГУТ, 2016. 226 с.</mixed-citation><mixed-citation xml:lang="en">Коржик В.И., Небаева К.А., Герлинг Е.Ю., Догиль П.С., Федянин И.А. Цифровая стеганография и цифровые водяные знаки. Часть 1. Цифровая стеганография. СПб: СПбГУТ, 2016. 226 с.</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Яковлев В.А. Основы криптографии: учебное пособие. СПб: ИЦ Интермедия, 2016. 296 с.</mixed-citation><mixed-citation xml:lang="en">Коржик В.И., Яковлев В.А. Основы криптографии: учебное пособие. СПб: ИЦ Интермедия, 2016. 296 с.</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Fedyanin I., Godlewski A., Morales-Luna G. Steganalysis Based on Statistical Properties of the Encrypted Messages // Proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS, Warsaw, Poland, 28-30 August 2017). Lecture Notes in Computer Science. Vol. 10446. Cham: Springer, 2017. PP. 288-298. DOI:10.1007/978-3-319-65127-9_23</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Fedyanin I., Godlewski A., Morales-Luna G. Steganalysis Based on Statistical Properties of the Encrypted Messages // Proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS, Warsaw, Poland, 28-30 August 2017). Lecture Notes in Computer Science. Vol. 10446. Cham: Springer, 2017. PP. 288-298. DOI:10.1007/978-3-319-65127-9_23</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Nguyen C., Fedyanin I., Morales-Luna G. Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding // Preprints. 2018. DOI:10.20944/preprints201802.0143.v1</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Nguyen C., Fedyanin I., Morales-Luna G. Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding // Preprints. 2018. DOI:10.20944/preprints201802.0143.v1</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Bassham III L.E., Rukhin A.L, Soto J., Nechvatal J.R., Smid M., Barker E., et al. NIST Special Publication 800-22 Revision 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical report, Gaithersburg, 2010.</mixed-citation><mixed-citation xml:lang="en">Bassham III L.E., Rukhin A.L, Soto J., Nechvatal J.R., Smid M., Barker E., et al. NIST Special Publication 800-22 Revision 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical report, Gaithersburg, 2010.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Nguyen D.C., Morales-Luna G. Cipher Modification Against Steganalysis Based on NIST Tests // Proceedings of the 24th Conference of Open Innovations Association (FRUCT, Moscow, Russia, 8-12 April 2019). IEEE, 2019. PP. 179-186. DOI:10.23919/FRUCT.2019.8711958</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Nguyen D.C., Morales-Luna G. Cipher Modification Against Steganalysis Based on NIST Tests // Proceedings of the 24th Conference of Open Innovations Association (FRUCT, Moscow, Russia, 8-12 April 2019). IEEE, 2019. PP. 179-186. DOI:10.23919/FRUCT.2019.8711958</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
