Features of implementation of the text steganography method for the hidden data transmission and protection of intellectual property rights are considered. The method is based on the modification of the spatial-geometric parameter of the container-text - aprosh. Data hiding is performed not only in ordinary, but also in special (soft hyphen, line break, etc.) symbols and spaces.
Słowa kluczowe: text steganography, property rights, aprosh, steganography strength.
Przeanalizowano cechy wdrożenia metody steganografii tekstowej w celu ukrytej transmisji danych i ochrony praw własności intelektualnej. Metoda oparta jest na modyfikacji parametru przestrzenno-geometrycznego tekstu-kontenera - aprosh. Ukrywanie danych odbywa się nie tylko w zwyczajnych, ale również w specjalnych (mijany łącznik, przerwa liniowa i td.) symbolach i spacjach.
Keywords: steganografia tekstowa, prawo własności, aprosz, odporność steganograficzna
The development of information technology has led to the fact that now they put the information on a par with the generally accepted material values. Access to it with the advent of global computer networks has become incredibly simple. Simplicity and speed of such access significantly increased both the threat of data security breach, as well as the threat of unauthorized access (without author's permission) to information. The main objects of copyright relating to information technologies, including publishing technologies, are: paper and electronic versions of various text or other documents, databases, computer programs. This means that Internet objects also refer to intellectual property. The logic of regulating the Internet itself and the relations connected with the use of its resources and capabilities should be in the plane of both national and international law. Thus, the problem of protecting information and protecting copyright for text documents is becoming increasingly important. A method of solving of this problem on the basis of text steganography is investigated and analyzed in some articles, for example . The specifics of algorithmic and software implementation of the steganographic methods that are based to protect of digital documents against unauthorized use are analyzed in . Contrary to cryptography which purpose is hiding data by encrypting them, the purpose of steganography is to hide the fact of the transfer of confidential messages. It is because of steganography system of protection is achieved the greatest degree of resistance to intentional attacks to destroy or to identify hidden information. The steganographic system (stegosystem or steganosystem) - a set of tools and techniques that are used to form a secret channel of information transfer [3-5]. The steganosystem forms the channel, that carries the filled container. This channel is considered to be exposed to the influence from the [...]
 Urbanovich P., Chourikov K., Rimorev A. , Urbanovich N., Urbanovich N., Text steganography application for protection and transfer of the information, Przegląd Elektrotechniczny, 86 (2010), nr.10, 95-97.  Shutko N. , The use of aprosh and kerning in text steganography, Przegląd Elektrotechniczny, 92 (2016), nr.10, 222-225.  Konahovich G.F., Puzyrenko A.U., Computer steganography, Kiev, MK-Press, 2006 (in Russian).  Gribunin V. G., Okov I.N., Turincev I.V., Digital steganography, Moscow, Solon-Press, 2002, 272 (in Russian).  Urbanovich N., Development, analysis of efficiency and performance in an electronic textbook methods of text steganography, Printing future days: 4th International Scientific Conference on Printing and Media Technology, Chemnitz, 2011, p. 189-193.  Shutko N.P., Romanenko D.M., Urbanovich P.P., Mathematical model of the text steganography on the base of modifying the spatial and color settings of text characters, Proceedings of BSTU: Physics and mathematics. Informatics, Minsk, 179 (2015), nr. 6, 152-157.  Brassil J., Low S., Maxemchuk N.F., O’Gorman L. , Electronic Marking and Identification Techniques to Discourage Document Copying, IEEE Journal on Sel. Areas in Commun., 13 (1995), nr. 8, 1495-1504.  Low S.H., Maxemchuk N.F., Lapone A.M., Document Identification for Copyright Protection Using Centroid Detection, IEEE Trans on Commun., 46 (1998), nr.3, 372-381.  Urbanovich P., Shutko N., Theoretical Model of a Multi- Key Steganography System, in: Recent Developments in Mathematics and Informatics, Contemporary Mathematics and Computer Science Vol. 2, Ed. A. Zapała, Wydawnictwo KUL, Lublin, 2016, Part II, Chapter 11, pp. 181-202.