CONFIDENTIAL INFORMATION SECRET METHOD

Journal Title: Scientific Journal of Astana IT University - Year 2020, Vol 2, Issue 2

Abstract

The article deals with the issues of hiding text information in a graphic file. Most often, one or two least significant bits of the image pixels are modified. To do this, each byte of the secret message is divided into 8 or 4 parts. The use of the least significant bits of the graphic file for transmitting a secret message significantly limits the size of the original message, in addition, it allows steganographic analysis programs to detect and decrypt the transmitted data. A formula for hiding textual information in image pixels is proposed. The algorithm for hiding information is that the bytes of the secret message are mixed with the bytes of pixels of the key image using a secret formula. The result is new bytes of image pixels. A steganography scheme has been developed for embedding secret text in random image pixels. Random bytes are pre-embedded in each pixel row of the original image. As a result of the operations, a key image is obtained. Text codes are embedded in random pixel bytes of a given RGB channel. To generate a secret message, the characters of the table of ASCII codes are used. The detection and decryption program compares the pixels of the received image with the pixels of the key image in the specified RGB channel and extracts the codes of the encrypted text. The use of abstract images as a key image significantly increases the reliability of the protection of confidential information, since in such images there is a random change in pixel values. Demonstration programs for encryption and decryption in the Python 3.5.2 programming language have been developed. A graphic file is used as the decryption key. The developed steganography scheme allows not only transmitting sensitive information, but also adding digital fingerprints or hidden tags to the image.

Authors and Affiliations

O. Kan, E. Murykh

Keywords

Related Articles

METHODS OF NAVIGATING ALGORITHMIC COMPLEXITY: BIG-OH AND SMALL-OH NOTATIONS

This article provides an in-depth exploration of Big-Oh and small-oh notations, shedding light on their practical implications in the analysis of algorithm complexity. Big-Oh notation offers a valuable tool for estimatin...

A BIBLIOMETRIC STUDY ON BLOCKCHAIN CONCEPT: A THEME ANALYSIS AND FUTURE DIRECTIONS FOR COMPUTER SCIENCE TRAINING

This paper aims to study the blockchain concept domain in the computer science field due to bibliometric study. Authors employed bibliometric and network analysis techniques to analyze existing literature. In total, 719...

INTELLECTUAL INFORMATION TECHNOLOGIES IN THE ACTIVITIES OF THE EMERGENCY RESCUE SERVICE

The paper considers the features of the use of intelligent information technologies in the process of the emergency rescue service of the enterprise. To improve the efficiency of the rescue services, it is necessary to...

THE RATIONAL USE OF COMPUTING POWER IN MODERN TRENDS IN THE DEVELOPMENT OF ELECTRONICS

This article considers methods and ways of automating software optimization using additional programs and analyzing their algorithms and the principle of operation. Since against the background of the rapid growth of c...

DEVICE FOR DETERMINING THE VALUE OF THE STEADY-STATE ELECTRICITY IN THE PRIMARY CIRCUIT USING A REED SWITCH AND A MICROPROCESSOR

This article discusses an innovative device designed to determine the value of the steady-state current in the primary circuit of electrical installations using reed switches and a microprocessor without the use of cur...

Download PDF file
  • EP ID EP711931
  • DOI 10.37943/AITU.2020.15.23.009
  • Views 56
  • Downloads 0

How To Cite

O. Kan, E. Murykh (2020). CONFIDENTIAL INFORMATION SECRET METHOD. Scientific Journal of Astana IT University, 2(2), -. https://europub.co.uk/articles/-A-711931