An analysis of the possibility of realization steganography in C#
The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the ana...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Lublin University of Technology
2021-12-01
|
Series: | Journal of Computer Sciences Institute |
Subjects: | |
Online Access: | https://ph.pollub.pl/index.php/jcsi/article/view/2761 |
_version_ | 1818299080761147392 |
---|---|
author | Piotr Pawlak Jakub Podgórniak Grzegorz Kozieł |
author_facet | Piotr Pawlak Jakub Podgórniak Grzegorz Kozieł |
author_sort | Piotr Pawlak |
collection | DOAJ |
description | The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the analysis of the possibility of implementing digital images steganography with the use of the C # programming language. Firstly, existing libraries and mathematical transformations which can help with performing steganography were found. Also, own code solutions were implemented. In order to objectively evaluate the methods of data hiding, the parameters describing the degree of distortion of transforms and hidden images were calculated. Subsequently, optimal solutions for specific problems were identified and demonstrational data hiding was performed. Based on the obtained results, it can be concluded that it is possible to successfully implement steganography in the C # language. There are many ready-made libraries and tools, the effectiveness of which has been verified in the conducted analysis. Due to the contradictory of stenographic requirements, it is not possible to meet all of them optimally, i.e. undetectability, resistance to destruction and information capacity. For this reason, it is not possible to clearly indicate the best solutions. In order to achieve satisfactory results, one should look for compromises between the set requirements. |
first_indexed | 2024-12-13T04:45:32Z |
format | Article |
id | doaj.art-c72fb7f94dbb497d9e43dc475aa5c94b |
institution | Directory Open Access Journal |
issn | 2544-0764 |
language | English |
last_indexed | 2024-12-13T04:45:32Z |
publishDate | 2021-12-01 |
publisher | Lublin University of Technology |
record_format | Article |
series | Journal of Computer Sciences Institute |
spelling | doaj.art-c72fb7f94dbb497d9e43dc475aa5c94b2022-12-21T23:59:10ZengLublin University of TechnologyJournal of Computer Sciences Institute2544-07642021-12-012110.35784/jcsi.2761An analysis of the possibility of realization steganography in C#Piotr Pawlak0Jakub Podgórniak1Grzegorz KoziełLublin University of TechnologyLublin University of TechnologyThe computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the analysis of the possibility of implementing digital images steganography with the use of the C # programming language. Firstly, existing libraries and mathematical transformations which can help with performing steganography were found. Also, own code solutions were implemented. In order to objectively evaluate the methods of data hiding, the parameters describing the degree of distortion of transforms and hidden images were calculated. Subsequently, optimal solutions for specific problems were identified and demonstrational data hiding was performed. Based on the obtained results, it can be concluded that it is possible to successfully implement steganography in the C # language. There are many ready-made libraries and tools, the effectiveness of which has been verified in the conducted analysis. Due to the contradictory of stenographic requirements, it is not possible to meet all of them optimally, i.e. undetectability, resistance to destruction and information capacity. For this reason, it is not possible to clearly indicate the best solutions. In order to achieve satisfactory results, one should look for compromises between the set requirements.https://ph.pollub.pl/index.php/jcsi/article/view/2761steganographyC# programming languagedata hidingdigital image processing |
spellingShingle | Piotr Pawlak Jakub Podgórniak Grzegorz Kozieł An analysis of the possibility of realization steganography in C# Journal of Computer Sciences Institute steganography C# programming language data hiding digital image processing |
title | An analysis of the possibility of realization steganography in C# |
title_full | An analysis of the possibility of realization steganography in C# |
title_fullStr | An analysis of the possibility of realization steganography in C# |
title_full_unstemmed | An analysis of the possibility of realization steganography in C# |
title_short | An analysis of the possibility of realization steganography in C# |
title_sort | analysis of the possibility of realization steganography in c |
topic | steganography C# programming language data hiding digital image processing |
url | https://ph.pollub.pl/index.php/jcsi/article/view/2761 |
work_keys_str_mv | AT piotrpawlak ananalysisofthepossibilityofrealizationsteganographyinc AT jakubpodgorniak ananalysisofthepossibilityofrealizationsteganographyinc AT grzegorzkozieł ananalysisofthepossibilityofrealizationsteganographyinc AT piotrpawlak analysisofthepossibilityofrealizationsteganographyinc AT jakubpodgorniak analysisofthepossibilityofrealizationsteganographyinc AT grzegorzkozieł analysisofthepossibilityofrealizationsteganographyinc |