Infokommunikacionnye tehnologiiInfokommunikacionnye tehnologii2073-3909Povolzhskiy State University of Telecommunications and Informatics56105Original ArticleSteganography algorithms robust to active attacsSmaginAleksei Arkadievichsmaginaa1@mail.ruValishinMarat Faritovichvalmar.ktn@gmail.comUlyanovsk State UniversityState Scientific Center-Research Institute of Atomic Reactors15032015131828820122020Copyright © 2015, Smagin A.A., Valishin M.F.2015The aim of this work is to develop a steganographic algorithm, which is able to organize covert channel data in terms of a targeted attack on a container. Robust against an active attack on a steganographic algorithms is used to solve a number of applied problems. For example, the task of adding a new functionality to a fixed format. It is proposed to use the state diagram to describe the possible transformations of a digital object as a result of the attacks. The transition between the two states is characterized by the distortion introduced in the original object, and if the distortion produces a number of different objects, the corresponding state in the diagram is marked with infinity symbolizes sign which the attitude of "one-to-many". Thus, the problem of constructing robust against an active attack steganography is reduced to obtaining an algorithm that is able to extract hidden information from all the states in the diagram. There are two theoretical methods of construction robust against an active attack steganography: method of reducing a plurality of containers and method of assessing distortion. The first method is based on the assumption that among a plurality of containers. There can be such containers that the attack does not destroy embedded information. The second method allows you to build a robust embedding algorithm if the distortion introduced by the attack is limited by modulo in a metric space of containers. This paper gives a practical application of the proposed methods for the construction of steganography system that is robust against conversion of color images to grayscale. The program implementation in the programming language Python is given.steganographysteganalysisactive attacksrobuststeganographic algorithmdigital image processingjpeg compressionстеганографиястегоанализактивная атакаробастностьстеганографический алгоритмцифровая обработка изображенийJPEG компрессия[Gustavus J. Simmons. The Prisoner’s Problem and the Subliminal Channel, Advances in Cryptology: Proceedings of Workshop on Communications Security (Crypto'83, David Chaum, ed.). Plenum Press. 1984. - P. 51-67.][Конахович Г.Ф., Пузыренко А.Ю. Компьютерная стеганография. Теория и практика. К.: МК-Пресс, 2006. - 288 с.]