=Paper= {{Paper |id=Vol-2732/20200214 |storemode=property |title=New Technique for Hiding Data Using Adaptively Generated Pseudorandom Sequences |pdfUrl=https://ceur-ws.org/Vol-2732/20200214.pdf |volume=Vol-2732 |authors=Alexandr Kuznetsov,Alexey Smirnov,Diana Kovalchuk,Tetiana Kuznetsova |dblpUrl=https://dblp.org/rec/conf/icteri/KuznetsovSKK20 }} ==New Technique for Hiding Data Using Adaptively Generated Pseudorandom Sequences== https://ceur-ws.org/Vol-2732/20200214.pdf
                     New Technique for Hiding Data Using Adaptively
                          Generated Pseudorandom Sequences

                   Alexandr Kuznetsov 1 [0000-0003-2331-6326], Oleksii Smirnov 2[0000-0001-9543-874X],
                  Diana Kovalchuk 1[0000-0002-4499-3732] and Tetiana Kuznetsova 1[0000-0002-5605-9293]
                 1
                 V. N. Karazin Kharkiv National University, Svobody sq., 4, Kharkiv, 61022, Ukraine
                             kuznetsov@karazin.ua, dianakovalhyk@ukr.net
             2
              Central Ukrainian National Technical University, avenue University, 8, Kropivnitskiy, 25006,
                                       Ukraine, dr.smirnovoa@gmail.com



                     Abstract. This article explores the steganographic techniques of hiding in-
                     formation using direct spectrum expansion technology. Using noise-like pseu-
                     dorandom sequences (discrete signals), it is possible to reliably hide in-
                     formation messages in redundant digital data (cover files), for example, im-
                     ages, video and audio files, etc. However, the correlation of discrete signals and
                     cover files can be a problem; the extracted information messages can cover a lot
                     of the number of errors. Our experiments (on still images) show that the error
                     rate in the reconstructed information messages is very high. We offer a new
                     technique when the statistical properties of covers are taken into account when
                     generating discrete signals. In this case, it is possible to significantly reduce the
                     error rate without introducing additional distortion in-to the cover.

                     Keywords: pseudorandom sequence, hidden information, direct spectrum
                     spread technology, steganography


            1        Introduction

            Direct spread spectrum technology has traditionally been used in code division multi-
            ple access radio communication systems (CDMA). These techniques are used for a
            variety of reasons, including the establishment of secure communications, increasing
            resistance to natural interference, noise, and jamming, to prevent detection, to limit
            power flux density (e.g., in satellite down links), and to enable multiple-access com-
            munications [1-3].
               The technology of direct spectrum expansion uses discrete noise-like sequences
            (discrete signals) to expand a usually narrowband information signal over a relatively
            wideband (radio) frequency range. The receiver correlates received signals to extract
            the original information signal.
               Thus, the basic principle of direct spectrum spreading is the use of noise-like carri-
            ers and the bandwidth is much wider than that required for simple point-to-point
            communication with the same data rate. This allows you to get significant advantages
            in the organization of communication, for example [1-3]:




Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
 Resistance to jamming (interference). High resistance to narrowband interference
  is provided;
 Resistance to eavesdropping. The selection of a particular pseudo-random se-
  quence can be saved as a secret key. In this case, it is very difficult to find the right
  key and eavesdrop on the negotiations. In addition, when using very long pseu-
  dorandom sequences, it is possible to arrange communication at very low signal to
  noise ratios, which does not even allow the secret transmission of information to be
  detected;
 Resistance to fading. The expansion of the frequency band leads to an increase in
  the quality of communication, even in conditions of fading (attenuation) of the sig-
  nal;
 Multiple access capability. A large number of sequences allows to increase the
  subscriber capacity of the communication system, i.e. after all, makes communica-
  tion much cheaper.
   Direct spectrum spreading technology can also be used for steganographic purpos-
es, i.e. to hide information messages in redundant digital data (cover files), for exam-
ple, in images, video and audio files, etc. Moreover, cover files are interpreted as
noise in communication channels, and the number of different discrete signals deter-
mines the channel capacity of the steganosystem (similar to multiple access to
CDMA).
   This article explores the steganographic techniques of hiding information using di-
rect spectrum expansion technology. We offer a new technique when the statistical
properties of cover files are taken into account when generating discrete signals. This
allows you to significantly improve individual performance indicators of the ste-
ganosystem. In particular, we manage to significantly reduce the bit error rate in the
extracted informational messages.


2      Literature review

In the first works [4-7] on steganographic systems based on direct spectrum expan-
sion, the fundamental possibility of hiding data in various cover files was shown, the
main advantages of using pseudorandom sequences, as well as some dependences of
the error rate in the restored messages and cover file distortions are shown. Subse-
quently, many techniques were finalized and improved. In particular, in [8], combined
methods combining error correction, random positioning in pixels of a cover image,
and direct-sequence spread spectrum (DSSS) spectrum expansion were investigated.
In [9], concealment is implemented in the frequency domain, i.e. spreading modula-
tion was applied to discrete cosine transform (DCT) coefficients. In [10], the imple-
mentation of the steganosystem was supplemented by several levels of security, in-
cluding cryptographic transformations. In [11], aspects of the practical implementa-
tion of steganosystems when hiding information in audio files by the method of direct
spectrum expansion are considered. In [12], steganoanalysis methods using video files
and direct spectral expansion methods were studied. The work [13] is devoted to the
use of steganographic security techniques for transmitting medical images and elec-
tronic medical records in teleradiology. Article [14] is devoted to a theoretical panaly-
sis of the safety of steganosystems based on direct sequence spreading of the spec-
trum.
   Thus, methods of direct expansion of the spectrum are used to conceal data in vari-
ous multimedia files (images, video, audio, etc.). Moreover, transformations can be
used both in the spatial domain [4-7] and in the field of orthogonal transformations,
for example, in DCT [9]. At the same time, the main problem of using DSSS in ste-
ganography is the high level of errors in the restored messages.


3      Purpose and objectives of the article

The main goal of this work is to introduce a new technique for hiding informational
messages in cover files using direct spectrum expansion and adaptively generated
pseudorandom sequences. We propose a new approach consisting in the formation of
noise-like sequences taking into account the statistical properties of cover files. The
task is to ensure that each sequence does not correlate with the cover file used. This
can significantly reduce the bit error rate in the extracted informational messages. Our
experiments clearly confirm this.
   The article is organized as follows. First, we briefly present the known information
on the use of direct spectrum spreading technology in steganography (we use basic
information from several articles and US patents), and also show that the practical
failure to fulfill certain theoretical assumptions will lead to the guaranteed occurrence
of errors in the restored information data. Our experiments on still images clearly
demonstrate this, and the error rate remains very high even with amplification of the
spreading signal and with a small number of hidden data. We also show examples of
specific images of covers, as well as an assessment of their distortions at various pa-
rameters of the steganosystem. Finally, we propose a new technique for hiding infor-
mation, which is based on the obligatory fulfillment of the theoretical assumption
about the uncorrelatedness of extension sequences and cover files. The experiments
presented in the article show that in practical implementation it is really possible to
significantly reduce the bit error rate. Preliminary results were abridged at the confer-
ence [15].


4      Hiding data in images using direct spread spectrum
       technology

As a prototype of an improved method of hiding data in cover images, the technique
proposed in the dissertation by L. Marvel was selected, described in detail and studied
in [6, 7, 16, 17]. Let's consider it in more detail.
   The method of concealing data using the direct spread spectrum, proposed in US
patent [17], based on the fact that (on the transmission side after encryption and noise
                                                          
immunity coding) separate blocks mi  mi0 , mi1 ,..., mik 1 , i  0,..., N 1 of data of
information message m   m0 , m1 ,..., mN 1  the blocks are modulated by noise-like
discrete signals with the help of appropriate devices                                                       
                                                                                     i  i0 ,i1 ,..., in1 ,
i    0 , 1 ,...,  M 1 , k  M , with a base B  TF , where T is the duration
of the signal element i j , F is the frequency band of the signal  i .                                 Since
      1
F n    we have B  n  1 and the signal base sets the frequency spread of the
      T
frequency band of signal  i with respect to elementary signals i j and / or mi j . As a
result, a modulated information signal block is generated for each mi information
block
                                             k 1
                                      Ei    m*  ,
                                              j 0
                                                       ij    j                                              (1)


where

                                              1, mi j  1;
                                    m *i j  
                                              1, mi j  0;

which, according to statistical properties, takes the form of a random (noise-like)
sequence

                         k 1               k 1                   k 1               
                   Ei    
                         j 0
                               m *i j  j0 ,     m *i j  j1 ,...,     m *i j  jn1  ,
                                                                                       
                                            j 0                   j 0               

and due to the large base of discrete signals, the frequency spectrum is spreaded by
 B  n times.
   The resulting modulated message Ei is supplied to an alternationing device on
which the elements of Ei are mixed with the corresponding rule f by means of a
secret key K1 . The obtained data Ei  f ( Ei , K1 ) з using the appropriate device is
added to the data of the image Ci (digital image data in the spatial domain)
according to the rule: Si  Ci  Ei  G , where G  0 is the gain of the expansion
signal, which sets the "power" of the hidden blocks of information messages.
   The obtained data Si is supplied to the quantization device, which performs a
certain transformation to store the primary dynamic range of the cover image,
resulting in the formation of separate blocks of the steganogram S i and the cover
S  S0  S1  ...  S N 1 , which is transmitted to the receiving side.
  On the receiving side, the resulting steganogram blocks S i after filtration, are,
supplied to a reverse interleaving device, on which the elements of the filtered blocks
of the stegogram Si are mixed by rule f 1 , which is an inverse rule of alternation f
on the transmitting side. The extraction of blocks of information data is carried out
using a correlation receiver, which calculates the value of the correlation coefficient
obtained after the reverse alternation of data S *i  f 1 (Si , K1 ) and corresponding
discrete  j , signals identical to those used on the transmitting side:

                                                            n 1
                                  S *i ,  j            
                                                       1
                                                              S *iz  jz .                        (2)
                                                       n z 0

  Since Si  Ci  Ei  G we have:

                         n 1                           n 1                        n 1

                                                                                  
                      1                       1                 1
                             S *iz  jz  G         Eiz  jz        Ci  j
                      n z 0                  n z 0            n z 0 z z

   Suppose that the data block of the image block Ci has a random statistical
structure, that is, suppose that the second term on the right side of expression (2) is
close to zero and can be ignored. Then we have:
                                                     k 1
                          S *i ,  j   G     m *    ,  .iu           u     j           (3)
                                                 u 0

  Since all sequences of the set  are formed by a pseudorandom sequence
generator initiated by a secret key K 2 , the corresponding discrete signals are weakly
                                                 
correlated, that is, at u  j we have  u ,  j  0 .                  
   According to this, all terms, except case u  j , in the right-hand side of equation
(3) can be ignored. Where do we have:
                                                  n 1
                                                                          G;
                S *i ,  j   G  m *i j      
                                                1          2
                                                        j  G  m *i j                         (4)
                                                n z 0 z                   G.

   The corresponding value of the seized data is taken with a threshold device
according to the calculated correlation coefficient.
  Since G  0 and n  0 of  S *i ,  j                     character in (4) depends only on m *i ,
                                                                                                   j

from where we have:

                                                                            
                                                             1,  Si ,  j  0;          
                                   
                 m *i j  sign  S *i ,  j                
                                                                                                (5)
                                                             
                                                                           
                                                               1,  Si ,  j  0.         
                        
    If  S *i ,  j  0 in (5) we will assume that the hidden information has been lost
(erased). Separate blocks of data are formed from the extracted data on the receiving
side                                    
               mi  mi0 , mi1 ,..., mik 1 ,   i  0,..., N 1   of   information   messages
                                           1, m *i j  1;
m   m0 , m1 ,..., mN 1  , where mi j                    of which information messages
                                            0, m *i j  1;
are generated after noise immunity decoding and decryption of the extracted data.
   The secret key K 2 sets the rule for the formation of pseudorandom sequences
                            
i  i0 ,i1 ,..., in1 , which are formed by the corresponding generator and are used
as noise-like discrete signals i    0 , 1 ,...,  M 1 from the ensemble (set)
  of power M .
   The encryption and decryption rule on the transmitting and receiving side is
initiated by the secret key K 3 .
   The use of encryption and alternation devices in the process of hiding and
retrieving data can improve the statistical properties of the modulated message Ei , ie
to bring it closer to a random sequence. The use of noise immunity coding devices
can improve the reliability of the transmission of information messages
 m   m0 , m1 ,..., mN 1  during steganographic conversions.


5          Experimental researches

The disadvantage of the prototype under consideration is that in the process of ste-
ganographic hiding, the statistical properties of the blocks of the image Ci , are not
taken into account, that is, the digital image data can be correlated with the applied
discrete signals, which will lead to an error when extracting information data on the
receiving side.
   So, for example, if the correlation coefficient of the i -th block Ci of the image
will be higher behind the module and opposite in value of sign G  m *i j , that is, when
the second summand in the right part of expression (2) will be higher in module and
opposite in value of sign of the first summand (and the condition of mutual
orthogonality of applied discrete signals will be fulfilled), it is guaranteed that an
error will the result at data extract according to rule (5). In practice, as our researches
have shown, such cases occur very often. This is due to the fact that the digital data of
real images used to hide information messages do not have a random statistical
structure, that is, the applied assumption in the transition from formula (2) to formula
(3) is not fulfilled in practice and is false. Typically, steganographic hiding uses
realistic images and the corresponding digital data is not a random process, and even
in its statistical properties are not similar to pseudorandom sequences. The
                                                                         n 1
                                                          
corresponding values of the correlation coefficient  Сi ,  j      1
                                                                           Ci  j  0 , and
                                                                      n z 0 z z

                                       
can take large amplitude (  Сi ,  j  1 ) and random values. In this case, it is
possible to increase the reliability of the extracted data only by applying low-speed
noise immunity codes (as in the prototype discussed above [6, 7, 16, 17]), which
leads to a decrease in the relative transmission rate of information, or an increase in
the gain G , which leads to an increase in the introduced errors.
   To confirm this fact, Fig. 1 shows the empirical estimates of BER dependence in
message recovery using the considered prototype method (interrupted line). The
 G  4 gain was applied, and the number of bits k , hidden in one block Ci of the
cover image varied from 1 to 255. Fig. 2. shows empirical estimations of dependence
of the average proportion of introduced errors (in relation to the dynamic range of 256
levels) in the cover image with respect to the number of bits embedded in one element
of the cover. From the given dependencies (Fig. 1, 2, interrupted line) it is visible, that
at entering errors in the cover image below a visual threshold of human sensitivity (2-
3%) it is possible to hide no more than 10 bits of data in one block of the image Ci .
But even with such an insignificant amount of hidden data, BER takes the value
0.05..0.25, which requires the use of low-speed noise immunity codes with the
permission to correct multiple errors.




           Fig. 1. Bit error rate in recovered messages depending on message size
Fig. 2. The proportion of distortion introduced into the cover image depending on the size of
the message

    In Fig. 3, 4 show, accordingly, the obtained empirical estimates of the BER
dependence when restoring the messages and the dependence of the average fraction
of the input errors on the G gain values using the considered prototype method
(intermittent lines). At the same time, k  4 bits of information data were embedded
in one block Ci of the cover, and the gain G changed from 1 to 8. From the given
dependencies (Fig. 3, 4, interrupted line) it is visible, that at value of gain G  6
hiding of the information data leads to entering of errors, part of which ( relative to a
dynamic range ) is above a visual threshold of human sensitivity (2-3 %). That is, the
fact of hiding data in the image turns out to be a visual observation and
steganographic hiding with these parameters is not reasonable But at G  6 gain
value, there is a large number of errors when extracting individual data bits from the
spatial area of the image corresponding to BER  0,2 .




         Fig. 3. Rate of bit errors in recovered messages depending on the gain factor
Fig. 4. The proportion of introduced distortion in the cover image depending on the gain factor

  In Fig. 5-7 shows examples of images used in research:
 Fig. 5 – original image;
 Fig. 6 – image with hidden messages using prototype method;
 Fig. 7 – image with hidden messages using the proposed method.

  Data hiding is done with the following parameters: G  4 , k  4 .




                                    Fig. 5. Original image
                 Fig. 6. Example of cover image (using prototype method)




                Fig. 7. Example of cover image (using the proposed method)


6      Proposed data hiding technique

Our task is based on the following: by taking into account the statistical properties of
cover Ci , significantly reduce the BER of hidden data. Indeed, the introduction of
additional constraints on the correlation coefficient of the discrete signals used and
individual fragments of the image can significantly reduce the number of errors when
recovering the message on the receiving side.
   This problem is solved due to the special (we call adaptive) formation of
                                                     
pseudorandom sequences  j   j0 ,  j1 ,...,  jn1 , taking into account the statistical
properties of these blocks of cover Сi . That is, the value of the correlation coefficient
  Сi ,  j  for all i  0,.., N 1 and for all j  0,.., M  1 by the module should not
exceed some predetermined value  max (value of the set threshold):

                                              n 1
                           Сi ,  j      
                                            1
                                                  Ci  j  max .                       (6)
                                            n z 0 z z

  Thus, the formation of  j     0 , 1 ,...,  M 1 sequences is performed by a
pseudo-random rule, which is initiated by the secret key K 2 , and taking into account
conditions (6) for all i  0,.., N 1 and all j  0,.., M  1 .
   In this formation of discrete signals, each sequence of the set of
   0 , 1 ,...,  M 1 will not be correlated (up to the set limit) with any block of
the cover image, and, accordingly, the correlation coefficient of the i -th block Ci of
the cover on the module will never be higher than the module and the opposite in sign
 max . In accordance with this (and when the conditions of mutual orthogonality of
the applied discrete signals) the second term in the right part of expression (2) may
exceed in module and be opposite in sign to the first term only when
G  m *i j  max . It is in this case that an error of data extraction will happen, but the
probability of such an event will be much less than in case of an error of data
extraction in the prototype method. If the value of the  max threshold is lower than
the G gain value, i.e. when the unequal is performed G  m *i j  max the error will
not occur at all, i.e. an unmistakable transfer of secret information will be achieved.
   In Figs. 1-6, solid lines show empirical estimates of the probability properties of
steganographic concealment using the proposed method, which confirms our
conclusion:

 in Fig. 1 shows the bit error rate in the recovered messages depending on the size
  of the message;
 in Fig. 2 shows the proportion of distortion introduced into the cover image
  depending on the size of the message;
 in Fig. 3 shows bit error rate in the recovered messages depending on the gain fac-
  tor;
 in Fig. 4 shows the proportion of distortion introduced into the cover image
  depending on the gain factor.
7      Discussion of the results

From the above dependencies in Fig. 1, 2 (solid line) shows that when making errors
in the cover image lower than the visual threshold of human sensitivity (2-3%)
manages to embed no more than 10 bits of data in one block of the C coniner (as in
the prototype method). But with so a number of hidden data, the BER value is much
less than 0.1 and several dozen times less than in the prototype method.
   From the given dependencies in the fig. 3, 4 (solid line) can be seen that at the
value of gain hiding information data in the cover image leads to the introduction of
errors whose fate (in relation to the dynamic range) is higher than the visual threshold
of human sensitivity (2-3%) as well as in the method prototype. At G  6 values, the
errors introduced into the cover image are lower than the human visual sensitivity
threshold, i.e. they are invisible. In compared with the method-prototype, there is a
significant reduction in the number of errors when extracting individual data bits from
the spatial area of the image. In addition, at the H gain value, there is a total non
occurrence of errors in remote data, which confirms the above conclusion about the
error-free transmission of hidden information. Indeed, if G  4 then the inequality is
being realized     G  m *i j  max , that is, assuming the validity of the mutual
orthogonality of the applied discrete error signals, no errors occur at all and an error-
free transmission of hidden information is achieved.
   From the given dependencies in the fig. 5, 6 (solid line) shows that in almost all
cases, when hiding data the proposed method is a gain in relation to the method-
prototype (interrupted line). Thus, when the number of k bits hidden in one element
of the cover image increases, as well as in the prototype method, there is an increase
in the probability of false data extracted on the receiving side. However, this increase
is much slower than in the prototype method. As the G gain increases, the probability
of false data extraction decreases, but the proposed method (solid line) has
significantly improved probabilistic properties than the prototype method (interrupted
line).


8      Conclusions

Spread spectrum technologies are traditionally used in multiple access radio commu-
nication systems. Direct-sequence modulation makes the transmitted signal wider in
bandwidth than the information signal. The resulting transmitted signal resembles
white noise limited in bandwidth. This noiselike signal is used to accurately restore
the source data on the host side by multiplying it by the same expansion sequence.
This process is mathematically a correlation, i.e. on the receiving side the recovery of
information data is performed by calculating the correlation coefficient of the accept-
ed sequence and the spreading sequence.
   Application of the technology of direct spread-spectrum in radio communication
systems allows obtaining specific advantages: resistance to jamming (interference);
resistance to eavesdropping; resistance to fading; multiple access capabilities. Some
radiocommunication industry standards take advantage of these advantages. However,
this technology can also be successfully applied in steganography. Excess data (imag-
es, audio and video files, text documents, etc.) are interpreted as noise in a communi-
cation channel. The task is to hide information data in such a way that redundant data
(cover files) are not distorted, i.e., photo or video images are visually indistinguisha-
ble from the original data. The technology of direct spread-spectrum is suitable for
this very well.
   The main theoretical assumption that explains the operation of this technology is
the uncorrelation of the spreading sequence and noise in the communication channel.
In radio communications systems with white noise, this assumption is fulfilled and
there are few errors on the receiving side. In steganographic systems, however, this
assumption may not work. Noise is understood here to be excess digital data, for ex-
ample, it can be realistic images. And such cover files can strongly correlate with the
spreading sequence. As a result of the correlation reception, a large number of errors
occur when restoring information messages. We offer an effective way to reduce such
errors. In fact, we offer a new way to form spreading sequences that takes into ac-
count the statistical properties of cover files. We call this method adaptive. As a re-
sult, we have a set of spreading sequences that do not correlate with cover files and
almost no errors occur when restoring information messages. Experiments show that
this is indeed the case. Our approach is much more efficient. Thus, a specific tech-
nical result is achieved, namely: by taking into account the statistical properties of the
digital data of the cover images (in the adaptive formation of pseudorandom sequenc-
es) it is possible to significantly reduce the number of errors in the recovery of infor-
mation data on the receiving side.
   A promising trend is to study the properties of steganosystems using complex dis-
crete signals with special correlation properties. For example, we want to use se-
quences from our previous work [18-19] to hide information in cover images.


       References
 1. Torrieri, D.: Principles of Spread-Spectrum Communication Systems. Springer Interna-
    tional Publishing (2018)
 2. Yang, S.-M.M.: Modern Digital Radio Communication Signals and Systems. Springer In-
    ternational Publishing (2019)
 3. CDMA. TelecomSpace, (2020). http://www.telecomspace.com/cdma.html
 4. A. Z. Tirkel, C. F. Osborne and R. G. Van Schyndel, "Image watermarking-a spread spec-
    trum application," Proceedings of ISSSTA'95 International Symposium on Spread Spec-
    trum Techniques and Applications, Mainz, Germany, 1996, pp. 785-789 vol.2. doi:
    10.1109/ISSSTA.1996.563231.
 5. J. R. Smith and B. O. Comiskey, “Modulation and information hiding in images,” Lecture
    Notes in Computer Science, pp. 207–226, 1996. doi:10.1007/3-540-61996-8_42.
 6. L. M. Marvel, C. G. Boncelet, R. Jr., and Charles T., “Methodology of Spread-Spectrum
    Image Steganography,” Jun. 1998. doi:10.21236/ada349102.
 7. L. M. Marvel, C. G. Boncelet and C. T. Retter, "Spread spectrum image steganography,"
    in IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075-1083, Aug. 1999. doi:
    10.1109/83.777088.
 8. Youail, R.S., Samawi, V.W., Kadhim, A.-K.A.-R.: Combining a spread spectrum tech-
    nique with error-correction code to design an immune stegosystem. In: Security and Identi-
    fication 2008 2nd International Conference on Anti-counterfeiting. pp. 245–248 (2008)
 9. Agrawal, N., Gupta, A.: DCT Domain Message Embedding in Spread-Spectrum Steganog-
    raphy System. In: 2009 Data Compression Conference. pp. 433–433 (2009)
10. Nugraha, R.M.: Implementation of Direct Sequence Spread Spectrum steganography on
    audio data. In: Proceedings of the 2011 International Conference on Electrical Engineering
    and Informatics. pp. 1–6 (2011)
11. Yadav, P., Dutta, M.: 3-Level security based spread spectrum image steganography with
    enhanced peak signal to noise ratio. In: 2017 Fourth International Conference on Image In-
    formation Processing (ICIIP). pp. 1–5 (2017)
12. Zarmehi, N., Akhaee, M.A.: Video steganalysis of multiplicative spread spectrum ste-
    ganography. In: 2014 22nd European Signal Processing Conference (EUSIPCO). pp.
    2440–2444 (2014)
13. Eze, P.U., Parampalli, U., Evans, R.J., Liu, D.: Spread Spectrum Steganographic Capacity
    Improvement for Medical Image Security in Teleradiology*. In: 2018 40th Annual Inter-
    national Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
    pp. 1–4 (2018)
14. Wang, Y.-G., Zhu, G., Kwong, S., Shi, Y.-Q.: A Study on the Security Levels of Spread-
    Spectrum Embedding Schemes in the WOA Framework. IEEE Transactions on Cybernet-
    ics. 48, 2307–2320 (2018). https://doi.org/10.1109/TCYB.2017.2735989
15. Kuznetsov, A., Smirnov, O., Onikiychuk, A., Makushenko, T., Anisimova, O., Arischen-
    ko, A.: Adaptive Pseudo-Random Sequence Generation for Spread Spectrum Image Ste-
    ganography. In: 2020 IEEE 11th International Conference on Dependable Systems, Ser-
    vices and Technologies (DESSERT). pp. 161–165 (2020)
16. F. S. Brundick and L. M. Marvel, “Implementation of Spread Spectrum Image Steganog-
    raphy,” Mar. 2001. doi:10.21236/ada392155.
17. Patent No.: US 6,557,103 B1, Int.Cl. G06F 11/30. Charles G. Boncelet, Jr., Lisa M. Mar-
    vel, Charles T. Retter. Spread Spectrum Image Steganography. Patent No.: US 6,557,103
    B1, Int.Cl. G06F 11/30. – № 09/257,136; Filed Feb. 11, 1999; Date of Patent Apr. 29,
    2003
18. A. Kuznetsov, S. Kavun, V. Panchenko, D. Prokopovych-Tkachenko, F. Kurinniy and V.
    Shoiko, "Periodic Properties of Cryptographically Strong Pseudorandom Sequences," 2018
    International Scientific-Practical Conference Problems of Infocommunications. Science
    and Technology (PIC S&T), Kharkiv, Ukraine, 2018, pp.                      129-134. doi:
    10.1109/INFOCOMMST.2018.8632021
19. A. Kuznetsov, O. Smirnov, D. Kovalchuk, A. Averchev, M. Pastukhov and K. Kuz-
    netsova, "Formation of Pseudorandom Sequences with Special Correlation Proper-
    ties," 2019 3rd International Conference on Advanced Information and Communications
    Technologies       (AICT),      Lviv,     Ukraine,     2019,      pp.    395-399.     doi:
    10.1109/AIACT.2019.8847861