<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2016-1-2-9-15</article-id><article-id pub-id-type="publisher-id">459</article-id><article-categories><subj-group subj-group-type="heading"><subject>COMPUTER SIMULATION</subject></subj-group></article-categories><title-group><article-title>RESEARCH OF SOME ALGORITHMS OF STEGANOGRAPHY</article-title><trans-title-group xml:lang="en"><trans-title>RESEARCH OF SOME ALGORITHMS OF STEGANOGRAPHY</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Zhilyakov</surname><given-names>Evgeniy Georgievich</given-names></name><name xml:lang="en"><surname>Zhilyakov</surname><given-names>Evgeniy Georgievich</given-names></name></name-alternatives><email>Zhilyakov@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Lykholob</surname><given-names>Peter Georgievich</given-names></name><name xml:lang="en"><surname>Lykholob</surname><given-names>Peter Georgievich</given-names></name></name-alternatives><email>likholob@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Medvedeva</surname><given-names>Aleksandra Aleksandrovna</given-names></name><name xml:lang="en"><surname>Medvedeva</surname><given-names>Aleksandra Aleksandrovna</given-names></name></name-alternatives><email>Medvedeva_aa@bsu.edu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2016</year></pub-date><volume>1</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2016/2/it2.pdf" /><abstract xml:lang="ru"><p>The paper discusses some steganographic methods based on the use of the frequency characteristics of the speech signal. In particular, the authors consider a widely used method of steganography spreading and a new method of subband projections. The subband projections steganographic method is based on the application of sub-band analysis using subband matrices. For comparison, we considered steganographic methods used in the work of several different measures of differences. Besides, for comparison, we used the standard error, relative error, the signal-to-noise ratio, correlation coefficient, a measure of distance Itakura Santo (maximum likelihood distance). Real speech signals were used to research the methods. This research was conducted at different durations of the analysis segments. It is shown that the method of subband projections makes less distortion compared to the spreading method.</p></abstract><trans-abstract xml:lang="en"><p>The paper discusses some steganographic methods based on the use of the frequency characteristics of the speech signal. In particular, the authors consider a widely used method of steganography spreading and a new method of subband projections. The subband projections steganographic method is based on the application of sub-band analysis using subband matrices. For comparison, we considered steganographic methods used in the work of several different measures of differences. Besides, for comparison, we used the standard error, relative error, the signal-to-noise ratio, correlation coefficient, a measure of distance Itakura Santo (maximum likelihood distance). Real speech signals were used to research the methods. This research was conducted at different durations of the analysis segments. It is shown that the method of subband projections makes less distortion compared to the spreading method.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>speech signals</kwd><kwd>steganography</kwd><kwd>measure of the difference</kwd><kwd>extension spectrum method</kwd><kwd>subband method of steganography</kwd></kwd-group><kwd-group xml:lang="en"><kwd>speech signals</kwd><kwd>steganography</kwd><kwd>measure of the difference</kwd><kwd>extension spectrum method</kwd><kwd>subband method of steganography</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1. Gribunin V.G., Okov I.N., Turintsev I.V. Digital Steganography. Protection Aspects. M.: Solon-Press, 2002. 261 p.</mixed-citation></ref><ref id="B2"><mixed-citation>2.&amp;nbsp;&amp;nbsp; Zharkikh A.A., Gurin A.V., Plastunov V.Y. Steganography Method based on the Direct Spread Spectrum Signal / Materials of the VII International Science and Technology Conference, 7-11 December, 2009 INTERMATIC. M.: MIREAchast 4, 2009. Pp 78-83.</mixed-citation></ref><ref id="B3"><mixed-citation>3.&amp;nbsp;&amp;nbsp; Zhilyakov E.G., Likholobov P.G., Devitsyna S.N. Determination of the Possible Volume of Information being Introduced at a Hidden Transfer of Marks in the Speech Data / Scientific Bulletin of Belgorod State University № 13 (132). Issue 23/1, Series &amp;ldquo;History. Political Science. Economy. Computer science&amp;rdquo;. Belgorod: Gik. 2012. Pp. 222-226.</mixed-citation></ref><ref id="B4"><mixed-citation>4.&amp;nbsp;&amp;nbsp; Zhilyakov E.G. Optimal Subband Methods of Analysis and Synthesis of Signals of Finite Duration / Automation and Remote Control. M.: Academic Scientific Publishing, Production and Publishing and Bookselling Center of the Russian Academy of Science &amp;quot;Publishing House&amp;quot; Science &amp;quot;№ 4, 2015. Pp. 51-66.</mixed-citation></ref><ref id="B5"><mixed-citation>5.&amp;nbsp;&amp;nbsp; Konakhovich G.F., Puzyrenko A.Y. Computer Steganography. Theory and Practice / Kiev: &amp;quot;MK-Press&amp;quot;, 2006. 288 p.</mixed-citation></ref><ref id="B6"><mixed-citation>6.&amp;nbsp;&amp;nbsp; Kryzhevich L.S., Beloborodov D.A. Steganographic Techniques to Hide Data in Sound Files Based on Wavelet Transformation / Auditorium: Electronic Journal of Kursk State University. Kursk: number 2, 2014. &amp;quot;Auditorium&amp;quot; e-Science URL: http://auditorium.kursksu.ru/index.php?page=6&amp;amp;new=2 (date of access: April 28, 2016).</mixed-citation></ref><ref id="B7"><mixed-citation>7.&amp;nbsp;&amp;nbsp; On the Uniqueness of the Definition of Specific Identity-important Frequency Bands in the Sound of Russian Speech Exposed to Noise / Zhilyakov E.G., Likholobov P.G., Kurlov A.V., Medvedev A.A. // Scientific Bulletin of Belgorod State University, number 2 (223). Issue 37, Series &amp;ldquo;History. Political science. Economy. Computer science.&amp;rdquo; Belgorod: GIK. 2016. Pp. 167-174.</mixed-citation></ref><ref id="B8"><mixed-citation>8.&amp;nbsp;&amp;nbsp; The Method of Covert Coding of Control Information in the Speech Data / Zhilyakov E.G., Belov&amp;nbsp;S.P., Likholobov P.G., Pashintsev V.P. // Information and Communication Technologies. Saratov Volga State University of Telecommunications and Informatics. Vol.13. №3 2015. Pp 325-333.</mixed-citation></ref><ref id="B9"><mixed-citation>9.&amp;nbsp;&amp;nbsp; Fridrich, J. Steganography in digital media: Principles, algorithms, and applications, 2012, Steganography in Digital Media, pp. 1-441.</mixed-citation></ref><ref id="B10"><mixed-citation>10. Furui, Sadaoki; Digital speech processing, synthesis, and recognition / SadaokiFurui. - 2nd ed., rev. and expanded, 2000</mixed-citation></ref><ref id="B11"><mixed-citation>11. Nedeljko Cvejic, Tapio Seppanen. Spread spectrum audio watermarking using frequency hopping and attack characterization/ Signal Processing 84. &amp;ndash; 2004. &amp;ndash;&amp;nbsp;p. 207 &amp;ndash; 213.</mixed-citation></ref><ref id="B12"><mixed-citation>12. Stanković, S., Orović, I., Sejdić, E. Multimedia signals and systems, 2012, Multimedia Signals and Systems, pp. 1-349.</mixed-citation></ref><ref id="B13"><mixed-citation>13. Thierry Dutoit, Ferran Marques. Applied Signal Processing A MATLAB TM-Based Proof of Concept 2009.</mixed-citation></ref><ref id="B14"><mixed-citation>14. Vercoe B.L., Csound: A Manual for the Audio-Processing System, MIT Media Lab, Cambridge 1995.</mixed-citation></ref><ref id="B15"><mixed-citation>15. Zhilyakov, E.G. Optimal sub-band methods for analysis and synthesis of finite-duration signals, Automation and remote control, pp. Vol. 76, No 4,&amp;nbsp;p. 589-602.</mixed-citation></ref></ref-list></back></article>