Main Article Content

Volodymyr Pevnev
Yurii Voikov


The paper considers the possibility of using a mosaic composed of many miniature images to hide the fact of text information transmission. The results of the study of optimal mosaic construction when using steganographic methods of hiding information are presented. The use of the proposed algorithms implies the use of сryptographically secure pseudorandom number generator with dynamically changing parameters for concealing information. The generators are used to determine the location of information bits in a certain mini-images, as well as in a specific pixels and color channels. Using the proposed algorithm, no more than twenty-five percent of the color channels are changed, provided that one bit per color is used. This paper is supplemented with illustrations and examples of how the algorithm works.

Article Details

How to Cite
Pevnev, V., & Voikov, Y. (2020). RESEARCH AND PROTOTYPING METHODS OF STEGANOGRAPHY USING MOSAIC. Advanced Information Systems, 4(2), 137–141.
Methods of information systems protection
Author Biographies

Volodymyr Pevnev, National Aviation University “Kharkiv Aviation Institute”, Kharkiv

Candidate of Technical Science, Associate Professor, Associate Professor of Computer Systems, Networks and Cyber security Department

Yurii Voikov, National Aviation University “Kharkiv Aviation Institute”, Kharkiv

Master's Degree in Computer Systems, Networks and Cyber Security


Inad, Aljarrah, Abdullah, Al-Amareen, Abdelrahman, Idries and Osama, Al-Khaleel (2014), “Image Mosaicing Using Binary Edge Detection”, Proc. of the Int. conf. on Comp. Technology and Information Management, Dubai, UAE, 2014, pp. 187-190, available to:

Pevnev, V. and Frolov, V. (2018), “Results of studies of generators of pseudorandom sequences with dynamic parameters”, Control, navigation and communication systems, Vol. 4 (50), pp. 139-143, DOI:

Neil F., Johnson, Zoran, Duric and Sushil, Jajodi (2012), [Information Hiding: Steganography and Watermarking-Attacks and Countermeasures, Springer Science & Business Media, 137 p.

Abdelrahman Desoky, Noiseless Steganography: The Key to Covert Communications, CRC Press, 2016 – 300 p.

Jessica, Fridrich (2010), Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press, 437 p.

Frank Y., Shih (2017), Digital Watermarking and Steganography:

Fundamentals and Techniques, CRC Press, 200 p.

Frank Y., Shih (2017), Multimedia Security: Watermarking, Steganography, and Forensics, CRC Press, 423 p.

Kazuhiro, Kondo (2012), Multimedia Inf. Hiding Technologies and Methodologies for Controlling Data, IGI Global, 497 p.

Barney, Warf (2018), The SAGE Encyclopedia of the Internet, SAGE, 1120 p.

Pevnev, V., Novakov, Y., Tsuranov, M. and Kharchenko V. (2017), “The Method of Data Integrity Assurance for Increasing IoT Infrastructure Security”, Proc. of the 31 th Int. Conference on Information Technologies (InfoTech-2017), pp. 27-36.