The principles of building a parallel program for steganographic file protection
In the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms. This paper delves into the potential of steganography as a robust tool for ensuring confide...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2023-01-01
|
Series: | E3S Web of Conferences |
Online Access: | https://www.e3s-conferences.org/articles/e3sconf/pdf/2023/95/e3sconf_emmft2023_09027.pdf |
_version_ | 1797345291647582208 |
---|---|
author | Nuriev Marat Zaripova Rimma Sitnikov Sergey Nurgaliev Rustam |
author_facet | Nuriev Marat Zaripova Rimma Sitnikov Sergey Nurgaliev Rustam |
author_sort | Nuriev Marat |
collection | DOAJ |
description | In the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms. This paper delves into the potential of steganography as a robust tool for ensuring confidentiality by embedding data covertly within other files. Recognizing the limitations of traditional steganographic techniques in the face of expansive contemporary data sets, the paper explores the amalgamation of parallel programming with steganographic processes. Such a fusion promises to distribute computational tasks effectively, thereby reducing the overall execution time. Detailed discussions underscore the significance of data decomposition, process synchronization, and thread coordination, illustrating how parallel algorithms can markedly expedite concealed data embedding and extraction. However, inherent challenges like minimizing thread communication, optimizing shared data access, and preventing race conditions are brought to the fore. Solutions are proposed through diverse methods, tools, and design strategies aimed at streamlining workload distribution and enhancing task execution. In conclusion, the paper emphasizes that blending steganography with parallel programming can potentially revolutionize data protection systems, with continual refinements in techniques and methods driving the domain towards offering more potent solutions for electronic data confidentiality and security. |
first_indexed | 2024-03-08T11:15:26Z |
format | Article |
id | doaj.art-89080edc7e814aa79191e582604288b1 |
institution | Directory Open Access Journal |
issn | 2267-1242 |
language | English |
last_indexed | 2024-03-08T11:15:26Z |
publishDate | 2023-01-01 |
publisher | EDP Sciences |
record_format | Article |
series | E3S Web of Conferences |
spelling | doaj.art-89080edc7e814aa79191e582604288b12024-01-26T10:35:55ZengEDP SciencesE3S Web of Conferences2267-12422023-01-014580902710.1051/e3sconf/202345809027e3sconf_emmft2023_09027The principles of building a parallel program for steganographic file protectionNuriev Marat0Zaripova Rimma1Sitnikov Sergey2Nurgaliev Rustam3Kazan National Research Technical University named after A. N. Tupolev – KAIKazan State Power Engineering UniversityKazan State Power Engineering UniversityKazan National Research Technological UniversityIn the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms. This paper delves into the potential of steganography as a robust tool for ensuring confidentiality by embedding data covertly within other files. Recognizing the limitations of traditional steganographic techniques in the face of expansive contemporary data sets, the paper explores the amalgamation of parallel programming with steganographic processes. Such a fusion promises to distribute computational tasks effectively, thereby reducing the overall execution time. Detailed discussions underscore the significance of data decomposition, process synchronization, and thread coordination, illustrating how parallel algorithms can markedly expedite concealed data embedding and extraction. However, inherent challenges like minimizing thread communication, optimizing shared data access, and preventing race conditions are brought to the fore. Solutions are proposed through diverse methods, tools, and design strategies aimed at streamlining workload distribution and enhancing task execution. In conclusion, the paper emphasizes that blending steganography with parallel programming can potentially revolutionize data protection systems, with continual refinements in techniques and methods driving the domain towards offering more potent solutions for electronic data confidentiality and security.https://www.e3s-conferences.org/articles/e3sconf/pdf/2023/95/e3sconf_emmft2023_09027.pdf |
spellingShingle | Nuriev Marat Zaripova Rimma Sitnikov Sergey Nurgaliev Rustam The principles of building a parallel program for steganographic file protection E3S Web of Conferences |
title | The principles of building a parallel program for steganographic file protection |
title_full | The principles of building a parallel program for steganographic file protection |
title_fullStr | The principles of building a parallel program for steganographic file protection |
title_full_unstemmed | The principles of building a parallel program for steganographic file protection |
title_short | The principles of building a parallel program for steganographic file protection |
title_sort | principles of building a parallel program for steganographic file protection |
url | https://www.e3s-conferences.org/articles/e3sconf/pdf/2023/95/e3sconf_emmft2023_09027.pdf |
work_keys_str_mv | AT nurievmarat theprinciplesofbuildingaparallelprogramforsteganographicfileprotection AT zaripovarimma theprinciplesofbuildingaparallelprogramforsteganographicfileprotection AT sitnikovsergey theprinciplesofbuildingaparallelprogramforsteganographicfileprotection AT nurgalievrustam theprinciplesofbuildingaparallelprogramforsteganographicfileprotection AT nurievmarat principlesofbuildingaparallelprogramforsteganographicfileprotection AT zaripovarimma principlesofbuildingaparallelprogramforsteganographicfileprotection AT sitnikovsergey principlesofbuildingaparallelprogramforsteganographicfileprotection AT nurgalievrustam principlesofbuildingaparallelprogramforsteganographicfileprotection |