<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Application of Graph Theory to Ensure the Reliability of Steganographic Message Perception in the Creation of a Covert Communication Channel⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alla Kobozieva</string-name>
          <email>alla_kobozeva@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Bobok</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Laptiev</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitalii Savchenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Odesa National Maritime University</institution>
          ,
          <addr-line>34 Mechnikova str., 65029 Odesa</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Information and Communication Technologies</institution>
          ,
          <addr-line>7 Solomyanska str., 03110 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska str., 01033 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The rapid advancement of information technologies and the pervasive digitalization of all areas of human activity have made the protection of digital information a critically important issue in modern society. Steganography has emerged as one of the most promising and effective approaches to information security. Among the key requirements for a steganographic system is the reliability of steganographic message perception. However, many existing methods do not systematically meet this requirement and are not designed to operate effectively with randomly selected containers. The purpose of this work is to improve the qualitative and quantitative indicators of the reliability of perception of a steganographic message generated by an arbitrary steganographic algorithm. Also, ensuring the possibility of operation of a steganographic message in conditions of a random container, without any modifications to the algorithm, by developing a method for selecting blocks of a digital image container for introducing additional information into them. The goal was achieved through the reasonable use of a specific oriented graph, which is associated with the image, for dividing container blocks into classes with the same indicators of the contribution of the high-frequency component. The most important result of the work is a theoretically substantiated definition of the block parameter, which gives an integral quantitative characteristic of its high-frequency component the normalized separation of the maximum singular value of the block. The practical significance of the obtained results lies in the development of an algorithmic implementation of the proposed method for selecting blocks for steganographic transformation, which allows improving, when applied, both qualitative (established by subjective ranking) and quantitative (estimated using the peak signal-to-noise ratio) indicators of the reliability of perception of a steganographic message generated by an arbitrary steganographic method.</p>
      </abstract>
      <kwd-group>
        <kwd>reliability of perception of a steganogram</kwd>
        <kwd>directed graph</kwd>
        <kwd>binary relation</kwd>
        <kwd>singular value 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The rapid development of information technology and the widespread digitalization of all areas of
human activity have made the problem of protecting digital information critically important in
modern society [1,2]. This issue is particularly acute for the critical infrastructure of the state [3-6],
where insufficient information security, allowing for the possibility of unauthorized access, can
lead to catastrophic consequences not only for individuals, organizations, and enterprises, but also
for the state as a whole.</p>
      <p>One of the most promising and effective areas of information protection today is steganography
the art and science of hiding information [7,8]. The primary objective of steganography is to
conceal the very fact of the existence of secret data during their transmission, storage, or
processing.</p>
      <p>In steganographic systems, a secret message is embedded using a steganographic algorithm into
a container object that does not attract attention. In this study, the container is a digital image (DI),
and the secret message is first pre-encoded. The steganographic transformation must be performed
in such a way that an external observer does not suspect the presence of any additional
information (AI) within the resulting steganographic message. The resulting steganographic
message is then transmitted openly to the recipient or stored in its received form [9].</p>
      <p>A number of key requirements are imposed on a steganographic system, including:
•
•
•
•
•
ensuring the reliability of perception of the steganographic message i.e., it should be
visually indistinguishable from the original container [10];
resistance to attacks aimed at extracting or damaging the embedded message [11];
resistance to steganalysis, including both statistical and machine-learning-based detection
methods [12, 13];
sufficient throughput of the covert communication channel, enabling the transmission of a
meaningful amount of data [14];
low computational complexity, ensuring the efficiency and practicality of the system in
real-world applications.</p>
      <p>One of the most critical requirements for organizing a covert communication channel is the
first: ensuring the reliability of perception. If this requirement is not met, the steganographic
system fails to conceal the very existence of secret information and thus becomes fundamentally
ineffective [15]. At the same time, an objective and quantitative assessment of the reliability of
perception remains an open and unsolved problem. Traditionally used visual distortion metrics
such as signal-to-noise ratio (SNR), peak signal-to-noise ratio (PSNR), and similar indicators [16]
are insufficient for providing a consistent and objective evaluation of the presence or absence of
visual artifacts in a steganographic message. As a result, subjective ranking remains a relevant
method of assessment. Indeed, one of the most commonly applied metrics in steganography
PSNR, even at high values does not guarantee reliable perception of the steganographic message in
the general case [10]. The continued reliance on differential indicators for evaluating visual
distortion only emphasizes the fact that modern steganographic systems still lack robust
quantitative measures with a higher level of objectivity. In practice, steganographic messages with
PSNR values above 40 dB are typically considered visually acceptable [17]. Furthermore, a higher
PSNR value is usually associated with a lower probability of visual degradation after the
embedding of additional information.</p>
      <p>All containers used in steganographic systems can be classified into three categories: selected,
random, and imposed [18]. While the deliberate selection of a container plays a significant role in
ensuring key properties of a steganographic message, especially its perceptual invisibility, in
realworld applications containers are most often chosen randomly. Therefore, it is highly desirable that
the effectiveness of a steganographic algorithm be independent of the specific properties of the
container. However, many existing methods are not adapted for operation with random containers,
limiting their applicability, particularly when it comes to guaranteeing the reliability of perception.
This limitation is a clear disadvantage of such systems [7,8,19].</p>
      <p>Although ongoing research aims to establish sufficient conditions for reliable perception of
steganographic messages [10], and its findings may inform the development of improved methods,
many existing approaches still cannot systematically ensure perceptual reliability without
substantial modification. Thus, this issue remains an open and relevant research challenge.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem analysis</title>
      <p>Most modern steganographic methods are block-based, primarily for the following reasons [20]:
resistance to compression attacks, relatively low computational complexity, and the natural
suitability for parallel processing. For these reasons, block-based methods are the focus of the
discussion below.</p>
      <p>When creating a covert communication channel, the requirement for reliability of perception, as
noted above, is key. However, modern steganographic methods cannot always ensure this
condition for a random container.</p>
      <p>The issues of developing sufficient conditions for ensuring the reliability of perception of a
steganographic message have been repeatedly raised by steganographers. It is known [21] that
modification of high-frequency components leads to the least visual distortions of the original
image, while modification of medium frequencies corresponds to greater distortions. The greatest
distortions of the original image occur when modifying low-frequency components. However, the
practical application of this fact in the field of steganography is not always justified due to the fact
that when using a high-frequency component (block) of an image for the implementation of the AI,
the resulting steganographic message will be sensitive to any attacks against the embedded
message, in particular to compression, which forces us to look for other, compromise, possibilities
for ensuring the necessary properties of the steganographic message.</p>
      <p>In [10], a sufficient condition for ensuring the reliability of perception of a steganographic
message was obtained in the Walsh-Hadamard transform domain by using a General Approach to
the Analysis of the State of Information Systems (General Approach) based on perturbation theory
and matrix analysis. Based on General Approach, relationships were established between
WalshHadamard transforms, discrete cosine transform coefficients, and components of the singular
decomposition of the corresponding matrices, which made it possible to obtain a sufficient
condition for ensuring the reliability of perception of a steganographic message. The obtained
condition can be applied regardless of the container region (spatial, transformation domain) in
which the AI is introduced. In addition, due to the mathematical approach used, it makes it possible
to prevent local violations of the reliability of perception associated not only with the
steganographic transformation, but also with other disturbing effects, where the differential
indicators of visual distortions of the DI are often unable to signal the artifacts that have arisen.
Thus, the General Approach based on perturbation theory is one of the most promising approaches
to solving the problem considered in the paper.</p>
      <p>As a result of further development of the General Approach in [22,23], new properties of the
formal parameters of the DI were established: the presence of regions of stabilization of
perturbations of singular values and singular vectors of the matrix of the original DI, which are
destroyed as a result of the steganographic transformation. The obtained conclusions confirmed
that in order to ensure the reliability of perception of the formed steganographic message, it is
sufficient that its result is a perturbation of singular triplets (blocks) of the container matrix,
corresponding to several of the smallest singular values. Such a sufficient condition is preferable,
compared to [21] in the frequency domain of content, since singular triplets do not separate the
extent about all frequency components, allowing even when using only the smallest singular
values in the steganographic transformation to ensure the sensitivity of the corresponding block to
disturbing effects is less than when using only high-frequency components.</p>
      <p>However, all sufficient conditions require their consideration when developing a
steganographic method. For existing methods, satisfying the existing sufficient conditions may be
difficult without their specific modification or not feasible at all, although the reliability of
perception by such methods may not be systematically ensured. Thus, in [19], a block
steganographic method is proposed that implements the introduction of AI in the region of the
singular decomposition of a container block by specific disturbance of a pair of maximum singular
values. This method remains one of the most resistant among existing methods to compression
attacks with small quality factors. However, artifacts may appear on the steganographic message in
the case when the container has significant areas with small differences in brightness values. The
PSNR value for some DI-containers here fluctuates within the range of 33 37 dB when using all
container blocks in the steganographic transformation process, i.e. with a covert communication
channel throughput of 1/64 bits/pixel. This leaves the task of ensuring the possibility of effective
operation of this method in the conditions of a random container relevant.</p>
      <p>In [24], a block method is proposed that implements the immersion of the AI in the spatial
region of the container by perturbing the pixels of the next block used in the steganographic
transformation by ±∆ (depending on the value of the embedded bit), ensuring that the
disturbance during the embedding of the AI is not less than the possible disturbance of the pixel
during an attack against the embedded message for the fundamental possibility of decoding. This
method does not guarantee the reliability of perception of the steganographic message, is not
designed to work with a random container, in particular, having significant areas with small
differences in brightness values, which is noted by one of the authors in a later work [25], where
its modification is proposed.</p>
      <p>The properties of the steganographic method often depend on the format of the DI container
[26], on the values of the parameters used in its algorithmic implementation. Thus, the properties
of the well-known block method of Koch and Zhao [16], which embeds the AI in the area of the
discrete cosine transform by establishing a certain correspondence between the values of a pair of
pre-selected coefficients, depend on how significant the difference between the moduli of these
coefficients, determined by the parameter P, will be. The larger P, the more resistant the
corresponding algorithm will be to attacks against the embedded message. However, increasing P
can lead to the appearance of visible artifacts on the steganographic message, which results in the
need to decrease P, and hence a decrease in the stability of the algorithm to be able to use a random
container, leaving the task of simultaneously ensuring the reliability of perception of the
steganographic message and significant resistance to attacks against the embedded message
relevant.</p>
      <p>Based on the results of the conducted analysis of literary sources, the objective of this work is to
improve the qualitative and quantitative characteristics of the reliability of perception of a
steganographic message generated by an arbitrary steganographic algorithm, including to ensure
the possibility of its operation in a random container, without any modifications to the algorithm,
by developing a method for selecting DI container blocks for implementing AI into them.</p>
      <p>To achieve the goal, the following tasks are solved in the work:</p>
      <p>Determining a method for formally representing DI that gives an integral picture of the
distribution of blocks depending on the contribution of the high-frequency component to
them;
Determining a block parameter that gives a quantitative characteristic of its high-frequency
component regardless of the storage format (with/without losses) of DI;
Developing a method for selecting DI container blocks for steganographic transformation
and its algorithmic implementation.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Digital image graph</title>
      <p>Let F</p>
      <p>n×n-matrix of DI. We divide F in the standard way [27] into square non-intersecting
l×lblocks, any of which is further designated as Bij , i, j = 1,n l, where 
the integer part of the
argument. Each of the block for the implementation of the
AI, which is a binary sequence:  1,  2, … ,   ,   ∈ {0,1}. As is known [21], due to the peculiarities of
the human visual system, the blocks that contain small details and contours are preferable for
minor changes during steganographic transformation of a container, i.e. where there is a relatively
significant high-frequency component. To isolate such blocks, it is necessary to determine such a
parameter (parameters) of the block, the quantitative expression of which will be an indicator of
the presence of contours the contribution of the high-frequency component. The presence of
such a parameter (parameters) will allow us to construct a binary relation  on a set of DI blocks
according to the following rule: block   will be in relation  [28] with   , i.e. ordered pair &lt;
  ,   &gt;∈ ρ, if their high-frequency component contribution rates are equal. This binary relation
is reflexive, symmetrical and transitive, i.e. it is an equivalence relation, and therefore defines the
partition of the set of AI blocks into subsets equivalence classes. Based on the value of the
selected parameter for one block from the class, it will be possible to draw a conclusion about the
expediency/inexpediency of the entire class for steganographic transformation, since each class
here is completely determined by any of its elements. Among these formed classes, i.e. among their
representative blocks, it is proposed to make a choice for implementing AI.</p>
      <p>To simplify the process of such a choice, we will associate the DI with a directed graph
  ( ,  ) the binary relation defined above  [29]. Set of vertices V a graph is defined by a set of
image blocks, an ordered pair of blocks &lt;   ,   &gt;∈  , i.e. there is a directed edge  Bij ,Bkm  ,
coming from the top   to the top   , if &lt;   ,  
&gt;∈ ρ. Based on the properties of the
introduced binary relation , graph   ( ,  ) will have the following properties:
•
•
•
at each vertex of the graph   ( ,  ) there will be a loop (reflexivity ),
for each edge of the graph there will be an oppositely directed edge (symmetry );
the graph will be disconnected, the number of its connectivity components will be
determined by the number of equivalence classes for the set of DI blocks.</p>
      <p>To achieve the goal of the work, it makes sense to simplify the obtained graph   ( ,  ) from
the point of view of reducing the cardinalities of sets V, X, applying a simple homomorphic
convolution to each of its connected components, resulting in a macrograph    ( ,  ), each
macro-vertex of which corresponds to an equivalence class of a binary relation  , is isolated, and
the choice of blocks preferred for steganographic transformation will be reduced to the choice of
certain macrovertices. To ensure greater informativeness of the graph    ( ,  ) it is proposed to
make it weighted, where the weight of any macro-peak will be determined by the value of the
parameter (or some quantitative characteristic of their totality, if there is more than one
parameter), which is an indicator of the presence of contours in the block the contribution of the
high-frequency component.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Selection of the integral quantitative indicator of the highfrequency component of the block</title>
      <p>The main issue for the implementation of graph construction    ( ,  ), corresponding to the DI, is
the question of choosing a parameter (parameters) a quantitative indicator of the high-frequency
component of the block. On the surface, here lies the use of the values of the high-frequency
coefficients of the block, but the rationality of such use is not obvious. A number of questions arise
here: how many such coefficients to use in the analysis process; will this number depend on the
block size; how exactly to quantitatively take into account the combined contribution of the
selected frequency coefficients. And the main question: if there are several such parameters, then
how to compare them when comparing blocks to select from them (blocks) more preferable for
steganographic transformation. And although all these questions can be answered as a result of the
studies, the main disadvantage of directly using high-frequency coefficients to achieve the goal of
the work is a significant difference in their values for DI blocks in different (with/without loss)
storage formats [10], which will not ensure the independence of the developed method for
selecting container blocks for steganographic transformation from the container format.</p>
      <p>Obviously, it is preferable to achieve the goal of the work to determine/form one integral
parameter of the block, which characterizes the presence of contours in this block, the specific
choice of which is justified below.</p>
      <p>From the point of view of ensuring the requirement for a steganosystem of insignificant
computational complexity, for the method being developed, preference should be given to the
block parameters used by the method for analysis, from its spatial domain, since the analysis of
such parameters will not require additional computational costs when moving from the spatial
domain to the transformation domain and back. An indicator of the presence of a high-frequency
component in the spatial domain of the block   with elements  ( ),  ,  = ̅1̅̅,̅, is the presence of
significant differences in pixel brightness, which is characterized by the magnitude of the
amplitude of brightness fluctuations:</p>
      <p>
        = m a,x  ( ) − m,in  ( ). (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
      </p>
      <p>However, for the purposes of work, such a parameter is not indicative for use, since a situation
is possible here when the difference in brightness values in a block is caused by only a few pixels,
while all the others form a background area:
122 153 153 151
 
151 152 152 151
150 151 152 152
151 153 152 152 
.</p>
      <p>
        The matrix shown corresponds to the DI block in Fig. 1(b), highlighted in red. There is only one
pixel (
        <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
        ), due to the presence of which a noticeable difference in brightness is obtained: A = 31. It
is obvious that such a block is inappropriate to use in the process of steganographic transformation
for several reasons. Firstly, if any of the block transformation areas (frequency, singular value
decomposition area, etc.) is used for the embedding of the AI, then this will most likely lead to the
perturbation of most pixels, which means that there will be a high probability of artifacts occurring
within the boundaries of its background part. Secondly, if the embedding of the AI occurs directly
in the spatial area, then the localization of those pixels, due to the perturbation of which this
embedding will be carried out, is obvious here, which reduces the level of secrecy of the
steganosystem. Thirdly, such a block structure significantly limits the value of the throughput of
the covert communication channel, which, although not critical, is not desirable. Taking into
account the above, parameter (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) is inappropriate to use as a characteristic for selecting blocks for
embedding the AI.
      </p>
      <p>
        In accordance with the General Approach, all properties of the DI and their changes, in
particular as a result of the steganographic transformation, can be formally estimated by the
properties (perturbations) of the full set of its formal parameters the singular values and singular
vectors F, uniquely determined by means of normal singular value decomposition [30]:
 =  Σ  , (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
where U, V orthogonal matrices where columns   ,   = ̅1̅̅,̅̅, are left and right singular vectors
respectively, with left singular vectors being lexicographically positive, Σ =
 ( 1( ), … ,   ( )),
      </p>
      <p>
        1( ) ≥ ⋯ ≥   ( ) ≥ 0, (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
singular values F, ( 1,   ,   ),  = ̅1̅̅,̅̅, singular triplets. The presence/absence of contours in an
arbitrary block of the image is assessed by its singular spectrum a set of singular values, which in
principle can become the subject of analysis for solving the problem under consideration. At the
same time, the number of singular values parameters from which it is necessary to select the
useful for analysis, is an order of magnitude less than the number of frequency coefficients
discussed above.
      </p>
      <p>
        Information about high frequencies (of the block) of the DI is carried mainly by singular triplets
corresponding to the smallest singular values (of the block) of the matrix F. It can be argued that
the singular values in these triplets are responsible for the high-frequency component (of the
block) of the image [22,23]. Indeed, the energy E of DI with n×n-matrix F with elements   ,  ,  =
̅1̅̅,̅̅, is defined as:
 
that is
where  ( ,  ),  = ̅0̅,̅̅̅̅̅−̅̅̅1̅,  = ̅0̅,̅̅̅̅−̅̅̅1̅,
energy spectrum F. The expansion (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) can be

equivalently represented as a sum of outer products [31]:  =  Σ = ∑ =1    
  . This idea is
disconcerting F on n signals
      </p>
      <p>, the total energy of which gives E.</p>
      <p>Signal energy    
  =   ( 1 , … ,   ) ( 1 , … ,   ) in the spatial domain in accordance with</p>
      <p>i2 (u1i2v12i + ... + u12ivn2i + u22iv12i + ... + u22ivn2i + ... + un2iv12i + ... + un2ivn2i ) = i2( u12i (v12i + ... + vn2i )+
+ ... + un2i (v12i + ... + vn2i )) = i2 (u12i + ... + uni</p>
      <p>
        2 )(v12i + ... + vn2i ) = i2 ,
svdgap ( ) = min| ̅ −  ̅ |,
svdgap (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = ̅̅1̅− ̅̅2̅.
      </p>
      <p>
        ≠

(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(6)
 P(u,v) =  i2 .
      </p>
      <p>n
i=1</p>
      <p>Thus, it is the singular values in singular triplets that directly correspond to the frequency
components of the image (of the block), including high-frequency ones. Although the number of
singular values, as noted above, is an order of magnitude less than the number of frequency
coefficients, the use of even small singular values still does not provide the opportunity to
determine a single block parameter characterizing the contribution of its high-frequency
component. In addition, in (blocks) of DI data in lossy formats, it is the smallest singular values that
suffer the most during compression, being zeroed out in the process of quantization and
rounding of the discrete cosine transform coefficients in more than 98% of image blocks, regardless
of whether contours and small details are present in the block or not. When DI data is restored
after compression, the smallest singular values of blocks, although they will be different from zero,
however, this difference is due only to the roundings that occur during the restoration process, i.e.
is associated with the peculiarities of machi
sets of real (singular values) and integer (values of pixel brightness) numbers. This makes it
inappropriate to use such singular values as a subject of analysis for solving the problems of this
work, taking into account the required independence of the developed method from the format of
transitions between
where  ̅ ,  = ̅1̅̅,̅</p>
      <p>
        vector components  ̅ = (̅̅1̅, ̅̅2̅, … ,  ̅ ) , at the same time  ̅ =  ⁄‖ ‖, where
‖ ‖ vector norm  = ( 1( ),  2( ), … ,   ( )) . In accordance with (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ):
      </p>
      <p>It can be concluded that the value</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) will be the closer to unity, the smaller the
highfrequency component, regardless of the storage format of the DI
with/without losses. This
conclusion was practically confirmed in the course of a computational experiment, typical results
of which are demonstrated in Fig. 2 for the DI presented in Fig. 1. Properties of the histograms of
the DI.
corresponding.
      </p>
      <p>
        Further, DI that differ only in the storage format (with/without losses) will be called
For DI blocks, regardless of the storage format, the relation (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) can be clarified:
      </p>
      <p>1( ) ≫  2( ) ≥ ⋯ ≥   ( )
in this case, the smaller the high-frequency component of the block, the greater the relative
difference between the first singular value and all other singular values spectrum. Due to this, as an
integral parameter that characterizes the contribution of high frequencies to the block, we will
consider the normalized separation of the maximum singular value   ( ). Normalized separation</p>
      <p>
        ( ) arbitrary singular value   ( ) is determined in accordance with the formula:
values   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) for blocks of original lossless DI and corresponding lossy DI (JPEG, QF=75) are
comparable, although quantization of frequency coefficients during compression contributes to the
features of the above-mentioned histogram. Thus, the histogram mode as a result of image
compression is slightly shifted to the right both for DI with large areas of small differences in pixel
brightness values (hereinafter referred to as background images), and for DI where areas with
small differences in brightness are few in number and insignificant in relative area, i.e. containing a
large number of details, contours (hereinafter referred to as contour image), while for contour DI,
after compression, blocks appear (or the number increases), for which   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) comparable to
one, and for the background in the lossy format in one, the histogram mode will most likely be
observed.
d
      </p>
      <p>
        However, there is no fundamental difference for the histograms of the corresponding DI. Let us
designate Γ and Γ histograms   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) for background and contour DI respectively.
Differences in properties Γ and Γ are determined only by the degree of contribution of the
highfrequency component to the DI, i.e. by whether it is background or contour:
• in Γ range of possible values   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) less than in Γ ;
• histogram modes  (Γ ) and  (Γ ) are related by the inequality:  (Γ ) &gt;  (Γ );
values in modes  ( (Γ )) and  ( (Γ )) correspond to the inequality:  ( (Γ )) ≫  ( (Γ )).
At the same time, more than 90% blocks of DI usually responds for a little neighborhood of mode
Γ , while for a contour image outside such a neighborhood there will be a significant number of
blocks (more than 50%). This occurs due to the fact that for blocks with small differences in pixel
brightness values   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) ≈ 1, and for the background image of such blocks the majority, and
only for a small number of blocks containing contours, small details,   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) will differ
significantly from 1.
      </p>
      <p>
        The presented results support the use of expression (6) as an integral parameter for evaluating
the contribution of the high-frequency component to a digital signal block. They also provide
practical confirmation of the effectiveness of the proposed approach to block selection for
steganographic transformation based on the analysis   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ).
      </p>
      <p>
        However, when considering the presence of contours in the DI block as an indicator of the
normalized separation of the maximum singular value when constructing the binary relation
defined above  and the corresponding directed weighted graph   ( ,  ) it is necessary to
determine in which case the values of the normalized separation of the maximum singular values
are considered equal. Since   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) ∈ [0,1] ⊂  , where R is a set of real numbers, the set
[0,1] is infinite, and the computation   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) is in a floating-point number system, then, due
to the specifics of machine arithmetic, computational errors may accumulate, causing two real
numbers that are actually equal to appear slightly or even noticeably different after calculation.
The degree of difference here will be determined, firstly, by the sensitivity/insensitivity of the
parameter in question to disturbing effects, and secondly, by the different number and order of
arithmetic operations performed to calculate them, which, in the general case, will lead to different
errors for the two numbers. Significant differences in the values   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), if in fact they are
equal, it cannot arise, since the singular values, and therefore   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), are insensitive to
disturbing effects [31]. But minor differences even for naturally equal normalized separations of
the first singular value in the general case may take place, which must be taken into account in the
practical verification of their equality. Moreover, the equality of the calculated values may be a
consequence of the peculiarities of machine arithmetic   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) while their actual values differ
from each other. Taking into account all of the above, it is proposed that when calculating
   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) round off a value to significant digits, thus moving into a discrete range of values
  (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), i.e. replacing an infinite set [0,1] to a finite discrete bounded set [0,1]d, for which the
exact lower and upper bounds will be equal, respectively: inf 0,1d = 0 , sup0,1d = 1.
      </p>
      <p>
        Example of construction   ( ,  ) for a small-sized DI that is part of the image (Fig. 1(b)), is
shown in Fig. 3 (in order not to clutter the figure, each pair of oppositely directed edges is The
constructed graph is disconnected. Its connectivity components are strongly connected subgraphs,
each of which corresponds to the equivalence class of the introduced binary relation . The
corresponding weighted macrograph G_DI^M (V,X) is shown in Fig. 4 (for each vertex its label is
entered, and the weight is also indicated).designated by one bidirectional edge). When  = 2 we
have the following values   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ):
      </p>
      <p>0.97, 0.99, 0.97, 0.97, 0.98, 0.98, 0.99, 0.99, 0.97.</p>
      <p>
        Values   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) correspond to the order of blocks from left to right, top to bottom.
      </p>
      <p>The constructed graph is disconnected. Its connectivity components are strongly connected
subgraphs, each of which corresponds to the equivalence class of the introduced binary relation  .
The corresponding weighted macrograph    ( ,  ) is shown in Fig. 4 (for each vertex its label is
entered, and the weight is also indicated).
the DI matrix, divided</p>
      <p>Usage    ( ,  ) allows computationally simple rejection of those blocks, the introduction of DI
into which is undesirable. These are blocks for which the weight of the corresponding
macrovertices is close to one. The number of such rejected classes-macrovertices will depend on
the required throughput of the formed steganographic communication channel, or in other words,
on the length of DI. The lower the throughput, the greater the number of formed classes of blocks
(macrovertices) that can be rejected, the higher the quality of the choice of blocks for
steganographic transformation will be only with a significant high-frequency component
(macrovertices with a relatively small weight), the higher the probability of ensuring the reliability
of perception of the steganographic message.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Method for selecting image container blocks for embedding additional information</title>
      <p>The main steps of the method for selecting blocks of the DI container for the implementation of AI
are as follows:</p>
      <p>Step 1. Matrix F of DI with size n×n is divided in the standard way into non-intersecting
l×lblocks   ,  ,  = ̅1̅,̅̅[̅̅̅⁄̅̅̅].</p>
      <p>
        Step 2. For each block   ,  ,  = ̅1̅,̅̅[̅̅̅⁄̅̅̅]:
2.1. Define   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = ̅̅1̅− ̅̅2̅.
      </p>
      <p>〈  ,   〉 ∈ ρ if  (  ) =  (  ).</p>
      <p>Step 4. Build a directed graph   ( ,  ), corresponding to a binary relation .</p>
      <p>Step 5. By simple homomorphic convolution of the connected components of the graph
  ( ,  ) build a macrograph    ( ,  ).</p>
      <p>Step 6. Determine the quantity of blocks of the DI container, necessary for the immersion of
the DI  1,  2, … ,   ,   ∈ {0,1}.</p>
      <p>Step 7. For immersion of DI use blocks corresponding to macro vertices    ( ,  ), starting
from the macro-vertex with the smallest weight, in order of increasing weight of the vertices.
Blocks from one equivalence class are selected according to the secret key.</p>
      <p>For practical verification of the effectiveness of using the proposed method for selecting
container blocks for steganographic transformation in order to improve/ensure the reliability of
perception of the generated steganographic message, a computational experiment was conducted
in which the following parameter values were used for the algorithmic implementation of the
method: l = 8, = 2.</p>
      <p>The experiment involved 300 DIs from the database 4cam_auth [32] (TIF format), 300 DIs from
the base img_Nikon_D70s [33] (TIF format), 200 DIs obtained by non-professional video cameras
(TIF format), 800 DIs from the NRCS database [34] (JPEG format). The following steganographic
methods were used in the experiment: one of the most resistant to compression attacks, the
steganographic method [19], which leads to the non-systematic occurrence of artifacts on the DI
steganographic message; one of the most widely used and modifiable methods is Koch and Zhao
[16], the violation of the reliability of perception in which can occur with an increase in the
parameter used to modify the coefficients of the discrete cosine transform when embedding the DI
bit into the next block. During the experiment, the same DI was embedded into the container with
a random selection of blocks and in accordance with the graph    ( ,  ). Typical experimental
results are illustrated in Fig. 5, 6 for specific DI.</p>
      <p>The visual quality of steganographic messages (perception reliability), established by subjective
ranking, for all DI involved in the computational experiment turned out to be higher with the
second method of immersion of DI selection of blocks in accordance with the proposed method.
It was found that the value of the difference indicator of visual distortion PSNR for the second
immersion option was never less than this indicator for the first option, and for 52% of images
PSNR was significantly increased: by 2 6 dB.</p>
      <p>Of course, any choice of container blocks potentially reduces the possible throughput of the
formed communication channel, which is undesirable. However, firstly, such a forced measure
makes it possible to use existing effective methods without any modifications in the conditions of a
random container, and secondly, taking into account the rapid development of steganalytical
methods, the modern trend is to use steganographic methods in conditions of low throughput.</p>
      <p>It should be noted that, of course, the use of this method cannot guarantee the absence of
artifacts on the DI-steganographic message, established using subjective ranking, with a significant
length of the DI. But it guarantees an improvement in visual quality when using it, compared to a
set of blocks for steganographic transformation, selected randomly or in accordance with a secret
key, which does not take into account the possibility of artifacts, i.e. does not take into account the
fact that the steganographic method used is not designed for a random container.</p>
      <p>The method for selecting container blocks for steganographic transformation proposed in the
work is itself block-based, which determines its computational complexity for n×n-DI as  ( 2), but
this does not limit the scope of its application to block steganographic methods only: it can also be
used for steganometric methods that are not block-based, for example, for the method of modifying
the least significant bit [35], by selecting areas on the DI container in the form of a combination of
blocks that are most/least favorable for embedding the DI from the point of view of ensuring the
reliability of perception of the steganographic message.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>The paper solves a scientific and practical problem of increasing the qualitative and quantitative
indicators of the reliability of perception of a steganographic message generated by an arbitrary
steganographic algorithm, which is relevant for constructing a hidden (steganographic)
communication channel, by developing a method for selecting blocks of the matrix of a DI
container for embedding DI into them. The developed method ensures the possibility of operating
the steganographic algorithm under conditions of a random container, which is most often used in
practice. No direct analogues of the proposed method have been found in the open press.</p>
      <p>The research yielded the following key results:
1. The expediency of formally representing a digital image as a weighted macrograph is
substantiated. In this model, macrovertices are formed by a simple homomorphic
convolution of strongly connected subgraphs derived from a directed graph. This graph
corresponds to a binary equivalence relation defined on the set of DI blocks. Two blocks are
considered equivalent if the quantitative contribution of their high-frequency components
is equal.
2. A new block parameter was introduced normalized separation of the maximum singular
value. This parameter provides an integral quantitative characteristic of the b
Based on this parameter, a method for selecting suitable DI container blocks for
steganization was developed, along with its algorithmic implementation.
3. The proposed algorithm for block selection demonstrated significant improvements. In 52%
of the test images, the PSNR increased by 2 6 dB compared to random block selection.
Moreover, in all cases, the PSNR achieved using the proposed algorithm was never lower
than that of random selection. The visual quality of the steganographic messages, as
determined by subjective ranking, was also consistently maintained or improved across all
test images.</p>
      <p>The developed method for selecting blocks for steganographic transformation has a low
computational complexity, which for n×n-DI is defined as  ( 2), which provides the prospect of
its use for a stream container.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
[6] J.I. Alcaide, R.G. Llave, Critical infrastructures cybersecurity and the maritime sector,
Transportation Research Procedia 45 (2020) 547 554. URL:
https://doi.org/10.1016/j.trpro.2020.03.058
[7] D. Srinivasan, K. Manojkumar, A. Syed, H. Nutakki, A comprehensive review on
advancements and applications of steganography, 2024. URL:
https://doi.org/10.13140/RG.2.2.13568.44807
[8] A.A. Abdulla, Digital image steganography: challenges, investigation, and recommendation for
the future direction, Soft Computing 28 (2024) 8963 8976. URL:
https://doi.org/10.1007/s00500023-09130-8
[9] S. Pramanik, M.M. Ghonge, R.V. Ravi (Eds.), Multidisciplinary Approach to Modern Digital</p>
      <p>Steganography, Information Science Reference, 2021.
[10] A.A. Kobozieva, A.V. Sokolov, The sufficient condition for ensuring the reliability of
perception of the steganographic message in the Walsh-Hadamard transform domain,
Problemele Energeticii Regionale 2 (2022) 84 100. URL:
https://doi.org/10.52254/18570070.2022.2-54.08
[11] A.A. Kobozeva, A.V. Sokolov, Robust steganographic method with code-controlled
information embedding, Problemele Energeticii Regionale 4 (2021) 115 130. URL:
https://doi.org/10.52254/1857-0070.2021.4-52.11
[12] K.D. Michaylov, D.K. Sarmah, Steganography and steganalysis for digital image enhanced
Forensic analysis and recommendations, Journal of Cyber Security Technology 9 (2024) 1 27.</p>
      <p>URL: https://doi.org/10.1080/23742917.2024.2304441
[13] A. Kobozieva, I. Bobok, N. Kushnirenko, Steganalysis method for detecting LSB embedding in
digital video, digital image sequence, in Proceedings of the 11th International Conference on
Information Control Systems &amp; Technologies (ICST-2023), Odesa, Ukraine, 2023, pp. 78 90.</p>
      <p>URL: https://ceur-ws.org/Vol-3513/paper07.pdf
[14] B.G. Tahirova, Method for calculation maximum throughput hidden channels
in systems of steganographic communications, T-Comm 16 (2022) 40 45. URL:
https://doi.org/10.36724/2072-8735-2022-16-9-40-45
[15] M. Hassaballah (Ed.), Digital Media Steganography: Principles, Algorithms, and Advances (1st</p>
      <p>Ed.), Academic Press, 2020.
[16] G. Konakhovich, D. Progonov, O. Puzyrenko, Steganographic Processing and Analysis of</p>
      <p>Multimedia Data, Center for Educational Literature, 2018.
[17] A.S. Ansari, M.S. Mohammadi, M.T. Parvez, A comparative study of recent steganography
techniques for multiple image formats, International Journal of Computer Network and
Information Security 11 (2019) 11 25. URL: https://doi.org/10.5815/ijcnis.2019.01.02
[18] J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications,</p>
      <p>Cambridge University Press, 2009.
[19] M.A. Melnik, Compression-resistant steganography algorithm, Information Security 2 (2012)
99 106.
[20] I. Bobok, A. Kobozeva, Universal method for detecting violations in the integrity of a digital
image based on analysis of blocks of its matrix, Problemele Energeticii Regionale 4 (2023) 98
112. URL: https://doi.org/10.52254/1857-0070.2023.4-60.08
[21] K. Karampidis, E. Kavallieratou, G. Papadourakis, A review of image steganalysis techniques
for digital forensics, Journal of Information Security and Applications 40 (2018) 217 235. URL:
https://doi.org/10.1016/j.jisa.2018.04.005
[22] I.I. Bobok, A.A. Kobozeva, Development of the theoretical approach based on matrix theory
for analyzing the state of information security systems, Problemele Energeticii Regionale 3
(2024) 29 43. URL: https://doi.org/10.52254/1857-0070.2024.3-63.03
[23] I.I. Bobok, A.A. Kobozieva, Theoretical foundations of digital content integrity expertise,
Problemele Energeticii Regionale 1 (2025) 105 120. URL:
https://doi.org/10.52254/18570070.2025.1-65.08
[24] V.M. Rudnitsky, O.V. Kostyrka, Robust stegano transformation in spatial domain of cover
image, Informatics and Mathematical Methods in Simulation 3 (2013) 353 360.
[25] disturbance quilted transformation of spatial
image container, Informatics and Mathematical Methods in Simulation 6 (2016) 85 93.
[26] Z. Liu, X. Yi, X. Zhao, Y. Yang, Content-aware robust JPEG steganography for lossy channels
using LPCNet, IEEE Signal Processing Letters 29 (2022) 2253 2257. URL:
https://doi.org/10.1109/LSP.2022.3217727
[27] R. Gonzalez, R. Woods, Digital Image Processing (4th Ed.), Pearson, 2018.
[28] S.K. Sarkar, A Textbook Of Discrete Mathematics, S Chand Publishing, 2019.
[29] J.L. Gross, J. Yellen, M. Anderson, Graph Theory and Its Applications (3rd Ed.), Chapman and</p>
      <p>Hall/CRC, 2018.
[30] C. Bergman, J. Davidson, Unitary embedding for data hiding with the SVD, 2005. URL:
https://dr.lib.iastate.edu/handle/20.500.12876/54635
[31] J.W. Demmel, Applied Numerical Linear Algebra, SIAM, 1997.
[32] Y.-f. Hsu, S.-f. Chang, Detecting image splicing using geometry invariants and camera
characteristics consistency, in Proceedings of the 2006 IEEE International Conference on
Multimedia and Expo, Toronto, Canada, 2006, pp. 549 552. doi: 10.1109/ICME.2006.262447.
[33] T. Gloe, R. Böhme, The 'Dresden Image Database' for benchmarking digital image forensics, in:
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC '10). Association for
Computing Machinery, New York, USA, 2010, pp. 1584 1590. doi: 10.1145/1774088.1774427
[34] NRCS Photo Gallery. United States Department of Agriculture. Washington, USA. URL:
https://www.nrcs.usda.gov
[35] M.A. Aslam et al., Image steganography using Least Significant Bit (LSB) A systematic
literature review, in Proceedings of the 2022 2nd International Conference on Computing and
Information Technology (ICCIT), Tabuk, Saudi Arabia, 2022, pp. 32 38. doi:
10.1109/ICCIT52419.2022.9711628</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>T.O.</given-names>
            <surname>Abrahams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.K.</given-names>
            <surname>Ewuga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.O.</given-names>
            <surname>Dawodu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.O.</given-names>
            <surname>Adegbite</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.O.</given-names>
            <surname>Hassan</surname>
          </string-name>
          ,
          <article-title>A review of cybersecurity strategies in modern organizations: examining the evolution and effectiveness of cybersecurity measures for data protection</article-title>
          ,
          <source>Computer Science &amp; IT Research Journal</source>
          <volume>5</volume>
          (
          <year>2024</year>
          )
          <article-title>1 25</article-title>
          . URL: https://doi.org/10.51594/csitrj.v5i1.
          <fpage>699</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>X.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <article-title>The current status and challenges of cybersecurity risks</article-title>
          ,
          <source>Internet of Things and Cloud Computing</source>
          <volume>12</volume>
          (
          <year>2024</year>
          )
          <article-title>10 16</article-title>
          . URL: https://doi.org/10.11648/j.iotcc.
          <volume>20241201</volume>
          .12
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mukherjee</surname>
          </string-name>
          ,
          <article-title>Implementing cybersecurity in the energy sector</article-title>
          ,
          <year>2019</year>
          . URL: https://doi.org/10.6084/m9.figshare.9728051
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I.</given-names>
            <surname>Bobok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kobozeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Maksymov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Maksymova</surname>
          </string-name>
          ,
          <article-title>Checking the integrity of CCTV footage in real time at nuclear facilities</article-title>
          ,
          <source>Nuclear &amp; Radiation Safety</source>
          <volume>2</volume>
          (
          <year>2016</year>
          ) 68
          <fpage>72</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Akpan</surname>
          </string-name>
          , G. Bendiab,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shiaeles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Karamperidis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Michaloliakos</surname>
          </string-name>
          ,
          <article-title>Cybersecurity challenges in the maritime sector</article-title>
          ,
          <source>Network</source>
          <volume>2</volume>
          (
          <year>2022</year>
          )
          <article-title>123 138</article-title>
          . URL: https://doi.org/10.3390/network2010009
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>