<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2017-2-2-40-48</article-id><article-id pub-id-type="publisher-id">1127</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>THE USING OF ORTHOGONAL BASIS FOR THE STEGANOGRAPHIC CODING OF INFORMATION IN MULTIMEDIA</article-title><trans-title-group xml:lang="en"><trans-title>THE USING OF ORTHOGONAL BASIS FOR THE STEGANOGRAPHIC CODING OF INFORMATION IN MULTIMEDIA</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Balabanova</surname><given-names>Tatyana N.</given-names></name><name xml:lang="en"><surname>Balabanova</surname><given-names>Tatyana N.</given-names></name></name-alternatives><email>Sozonova@bsu.edu.ru</email><xref ref-type="aff" rid="aff1" /></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Likhogodina</surname><given-names>Elizaveta Sergeevna</given-names></name><name xml:lang="en"><surname>Likhogodina</surname><given-names>Elizaveta Sergeevna</given-names></name></name-alternatives><email>elza9313@gmail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Vodounou</surname><given-names>Aaron Candide</given-names></name><name xml:lang="en"><surname>Vodounou</surname><given-names>Aaron Candide</given-names></name></name-alternatives><email>aaron.vodounou@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Guryanova</surname><given-names>Oksana Igorevna</given-names></name><name xml:lang="en"><surname>Guryanova</surname><given-names>Oksana Igorevna</given-names></name></name-alternatives><email>Guryanova_o@bsu.edu.ru</email></contrib></contrib-group><aff id="aff1"><institution>Belgorod State National Research University</institution></aff><pub-date pub-type="epub"><year>2017</year></pub-date><volume>2</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2017/2/IT_5.pdf" /><abstract xml:lang="ru"><p>This article discusses methods for steganographic encoding additional information using three different orthogonal bases. The bases are represented by the functions, which occupies a different bandwidth in the spectrum. There are comparison of the approach to the definition of DCT-coefficients with the approaches used in the methods of the spread spectrum and subband projections. The approaches of the coefficients of the implementation to ensure secrecy by adaptive determination of their value are considered. However, their value is determined based on the energy structure of the segment of the speech signal. Criteria to evaluate steganographic encoding are the secrecy and accuracy of decoding control information. As the control information is a sequence of numbers in binary form. For the proposed principles of adaptation the results of numerical experiments the estimates that determine stealth: mean square error, the distance Itakura-Saito, correlation. In the computational experiments was found the probability of error for bits at different signal-to-noise ratio. The corresponding computational experiments were carried out for all outlined approaches.</p></abstract><trans-abstract xml:lang="en"><p>This article discusses methods for steganographic encoding additional information using three different orthogonal bases. The bases are represented by the functions, which occupies a different bandwidth in the spectrum. There are comparison of the approach to the definition of DCT-coefficients with the approaches used in the methods of the spread spectrum and subband projections. The approaches of the coefficients of the implementation to ensure secrecy by adaptive determination of their value are considered. However, their value is determined based on the energy structure of the segment of the speech signal. Criteria to evaluate steganographic encoding are the secrecy and accuracy of decoding control information. As the control information is a sequence of numbers in binary form. For the proposed principles of adaptation the results of numerical experiments the estimates that determine stealth: mean square error, the distance Itakura-Saito, correlation. In the computational experiments was found the probability of error for bits at different signal-to-noise ratio. The corresponding computational experiments were carried out for all outlined approaches.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>steganography</kwd><kwd>orthogonal basis</kwd><kwd>adaptive threshold of implementation</kwd><kwd>discrete cosine transform</kwd></kwd-group><kwd-group xml:lang="en"><kwd>steganography</kwd><kwd>orthogonal basis</kwd><kwd>adaptive threshold of implementation</kwd><kwd>discrete cosine transform</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Fridrich, J. 2012. Steganography in digital media: Principles, algorithms, and applications. Steganography in Digital Media, P. 1-441.</mixed-citation></ref><ref id="B2"><mixed-citation>Furui, Sadaoki. 2000. Digital speech processing, synthesis, and recognition. 2nd ed., rev. and expanded</mixed-citation></ref><ref id="B3"><mixed-citation>Cox I. J., Kilian J., Leighton F. T., Shamoon T. Secure spread spectrum watermarking for multimedia // IEEE transactions on image processing. ‒ 1997. ‒ V. 6, № 12. ‒ P. 1673-1687.</mixed-citation></ref><ref id="B4"><mixed-citation>Nedeljko Cvejic, Tapio Seppanen. 2004. Spread spectrum audio watermarking using frequency hopping and attack characterization. Signal Processing 84. P. 207 &amp;ndash; 213.</mixed-citation></ref><ref id="B5"><mixed-citation>Lykholob, P.G. Research of sensitivity of some measures of quality assessment of hidden information in the audio content [Текст] // Medvedeva, A.A., Likhogodina, E.S., Mishina, O.O. RESEARCH RESULT. Information technologies. №4. v.1. 2016. pp.21-25 URL: http://rr.bsu.edu.ru/media/information/2016/4/3_it.pdf DOI: 10.18413/2518-1092-2016-1-4-21-24</mixed-citation></ref><ref id="B6"><mixed-citation>Zhilyakov E.G., Pashintsev V.P., Belov S.P., Likholob P.G. About the secretive method of encoding control information in the speech data// Infocommunicatsionnye technologii. ‒ Samara, 2015. ‒ V. 13, № 3. ‒ P. 325-333.</mixed-citation></ref><ref id="B7"><mixed-citation>Fridrich, J. 2012. Steganography in digital media: Principles, algorithms, and applications. Steganography in Digital Media, P. 1-441.</mixed-citation></ref><ref id="B8"><mixed-citation>Furui, Sadaoki. 2000. Digital speech processing, synthesis, and recognition. 2nd ed., rev. and expanded</mixed-citation></ref><ref id="B9"><mixed-citation>GOST 16600-72. The transmission of speech by radio communication paths. The requirements for intelligibility of speech and methods of articulation measurements [Sound recording] / GOST 16600-72; isp.: D.I. Biblev. &amp;ndash; Belgorod: NIU BelGU, 2016. &amp;ndash; 1380 sec. &amp;ndash; Access mode: https://www.researchgate.net/publication/312167036_Recording_Gost_16600-72 DOI: 10.13140/RG.2.2.33677.74720</mixed-citation></ref><ref id="B10"><mixed-citation>Kisilenko А.V., Likhogodina E.S., Likholob P.G. About choice of the place for hiding information [Text] / Kisilenko А.V., Likhogodina E.S., Likholob P.G. // Sovremennoe obschestvo, obrazovanie i nauka. Sbornik nauchnyh trudov po matherialam Mezhdunarodnoi nauchno-practicheskoi konferencii: v 9 chastyah. &amp;ndash; Tambov: ООО &amp;quot;Konsaltingovaya kompaniya Yukom &amp;quot;, 2014. &amp;ndash; P. 76-78</mixed-citation></ref><ref id="B11"><mixed-citation>Signal processing with lapped transforms. / Malvar H. S. ‒ Boston: Artech House, 1992.</mixed-citation></ref><ref id="B12"><mixed-citation>Ahmed N., Natarajan T., Rao K. R. Discrete cosine transform // IEEE transactions on Computers. ‒ 1974. ‒ V. 100, № 1. ‒ P. 90-93.</mixed-citation></ref><ref id="B13"><mixed-citation>On uniqueness of determination of identity-relevant frequency bands in the sounds of Russian speech affected by noise [Текст] / Zhilyakov E.G., Likholob P.G., Kurlov A.V., Medvedeva А.А. // // Nauchnye vedomosti Belgorodskogo gosudarstvennogo universiteta. Seriya: Economica. Informatica. 2016. V. 37. № 2 (223). P. 167-173</mixed-citation></ref><ref id="B14"><mixed-citation>Evgeny G.&amp;nbsp; Zhilyakov, Sergey P.&amp;nbsp; Belov, Likholob P. G., Pashintsev V. P. On the Steganography in Voice Data // Asian Journal of Information Technology. ‒ 2016. ‒ V. 15, № 12. ‒ P. 1949-1952.</mixed-citation></ref><ref id="B15"><mixed-citation>Zhilyakov E.G., Likholob P.G., Medvedeva А.А., Prochorenko Е.I. Research of the sensitivity of certain quality measures to hide information in the speech data // Nauchnye vedomosti Belgorodskogo gosudarstvennogo universiteta. Seriya: Economica. Informatica. ‒ Belgorod, 2016. ‒ V. 9, № 230. ‒ P. 174-179.</mixed-citation></ref><ref id="B16"><mixed-citation>Zhilyakov E.G. Optimal subband methods of analysis and synthesis of signals of finite duration. Automation and mechanics. &amp;ndash; М.: Akademicheskiy nauchno-izdatelskiy, proizvodstvenno-poligraficheskiy i knigoraspredelitelskiy tsentr Rossiyskoi akademii nauk &amp;ldquo;Izdatelstvo &amp;ldquo;Nauka&amp;rdquo; № 4, 2015г. P. 51-66</mixed-citation></ref></ref-list></back></article>