The principles of building a parallel program for steganographic file protection

In the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms. This paper delves into the potential of steganography as a robust tool for ensuring confide...

Full description

Bibliographic Details
Main Authors: Nuriev Marat, Zaripova Rimma, Sitnikov Sergey, Nurgaliev Rustam
Format: Article
Language:English
Published: EDP Sciences 2023-01-01
Series:E3S Web of Conferences
Online Access:https://www.e3s-conferences.org/articles/e3sconf/pdf/2023/95/e3sconf_emmft2023_09027.pdf
_version_ 1797345291647582208
author Nuriev Marat
Zaripova Rimma
Sitnikov Sergey
Nurgaliev Rustam
author_facet Nuriev Marat
Zaripova Rimma
Sitnikov Sergey
Nurgaliev Rustam
author_sort Nuriev Marat
collection DOAJ
description In the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms. This paper delves into the potential of steganography as a robust tool for ensuring confidentiality by embedding data covertly within other files. Recognizing the limitations of traditional steganographic techniques in the face of expansive contemporary data sets, the paper explores the amalgamation of parallel programming with steganographic processes. Such a fusion promises to distribute computational tasks effectively, thereby reducing the overall execution time. Detailed discussions underscore the significance of data decomposition, process synchronization, and thread coordination, illustrating how parallel algorithms can markedly expedite concealed data embedding and extraction. However, inherent challenges like minimizing thread communication, optimizing shared data access, and preventing race conditions are brought to the fore. Solutions are proposed through diverse methods, tools, and design strategies aimed at streamlining workload distribution and enhancing task execution. In conclusion, the paper emphasizes that blending steganography with parallel programming can potentially revolutionize data protection systems, with continual refinements in techniques and methods driving the domain towards offering more potent solutions for electronic data confidentiality and security.
first_indexed 2024-03-08T11:15:26Z
format Article
id doaj.art-89080edc7e814aa79191e582604288b1
institution Directory Open Access Journal
issn 2267-1242
language English
last_indexed 2024-03-08T11:15:26Z
publishDate 2023-01-01
publisher EDP Sciences
record_format Article
series E3S Web of Conferences
spelling doaj.art-89080edc7e814aa79191e582604288b12024-01-26T10:35:55ZengEDP SciencesE3S Web of Conferences2267-12422023-01-014580902710.1051/e3sconf/202345809027e3sconf_emmft2023_09027The principles of building a parallel program for steganographic file protectionNuriev Marat0Zaripova Rimma1Sitnikov Sergey2Nurgaliev Rustam3Kazan National Research Technical University named after A. N. Tupolev – KAIKazan State Power Engineering UniversityKazan State Power Engineering UniversityKazan National Research Technological UniversityIn the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms. This paper delves into the potential of steganography as a robust tool for ensuring confidentiality by embedding data covertly within other files. Recognizing the limitations of traditional steganographic techniques in the face of expansive contemporary data sets, the paper explores the amalgamation of parallel programming with steganographic processes. Such a fusion promises to distribute computational tasks effectively, thereby reducing the overall execution time. Detailed discussions underscore the significance of data decomposition, process synchronization, and thread coordination, illustrating how parallel algorithms can markedly expedite concealed data embedding and extraction. However, inherent challenges like minimizing thread communication, optimizing shared data access, and preventing race conditions are brought to the fore. Solutions are proposed through diverse methods, tools, and design strategies aimed at streamlining workload distribution and enhancing task execution. In conclusion, the paper emphasizes that blending steganography with parallel programming can potentially revolutionize data protection systems, with continual refinements in techniques and methods driving the domain towards offering more potent solutions for electronic data confidentiality and security.https://www.e3s-conferences.org/articles/e3sconf/pdf/2023/95/e3sconf_emmft2023_09027.pdf
spellingShingle Nuriev Marat
Zaripova Rimma
Sitnikov Sergey
Nurgaliev Rustam
The principles of building a parallel program for steganographic file protection
E3S Web of Conferences
title The principles of building a parallel program for steganographic file protection
title_full The principles of building a parallel program for steganographic file protection
title_fullStr The principles of building a parallel program for steganographic file protection
title_full_unstemmed The principles of building a parallel program for steganographic file protection
title_short The principles of building a parallel program for steganographic file protection
title_sort principles of building a parallel program for steganographic file protection
url https://www.e3s-conferences.org/articles/e3sconf/pdf/2023/95/e3sconf_emmft2023_09027.pdf
work_keys_str_mv AT nurievmarat theprinciplesofbuildingaparallelprogramforsteganographicfileprotection
AT zaripovarimma theprinciplesofbuildingaparallelprogramforsteganographicfileprotection
AT sitnikovsergey theprinciplesofbuildingaparallelprogramforsteganographicfileprotection
AT nurgalievrustam theprinciplesofbuildingaparallelprogramforsteganographicfileprotection
AT nurievmarat principlesofbuildingaparallelprogramforsteganographicfileprotection
AT zaripovarimma principlesofbuildingaparallelprogramforsteganographicfileprotection
AT sitnikovsergey principlesofbuildingaparallelprogramforsteganographicfileprotection
AT nurgalievrustam principlesofbuildingaparallelprogramforsteganographicfileprotection