An analysis of the possibility of realization steganography in C#

The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the ana...

Full description

Bibliographic Details
Main Authors: Piotr Pawlak, Jakub Podgórniak, Grzegorz Kozieł
Format: Article
Language:English
Published: Lublin University of Technology 2021-12-01
Series:Journal of Computer Sciences Institute
Subjects:
Online Access:https://ph.pollub.pl/index.php/jcsi/article/view/2761
_version_ 1818299080761147392
author Piotr Pawlak
Jakub Podgórniak
Grzegorz Kozieł
author_facet Piotr Pawlak
Jakub Podgórniak
Grzegorz Kozieł
author_sort Piotr Pawlak
collection DOAJ
description The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the analysis of the possibility of implementing digital images steganography with the use of the C # programming language. Firstly, existing libraries and mathematical transformations which can help with performing steganography were found. Also, own code solutions were implemented. In order to objectively evaluate the methods of data hiding, the parameters describing the degree of distortion of transforms and hidden images were calculated. Subsequently, optimal solutions for specific problems were identified and demonstrational data hiding was performed. Based on the obtained results, it can be concluded that it is possible to successfully implement steganography in the C # language. There are many ready-made libraries and tools, the effectiveness of which has been verified in the conducted analysis. Due to the contradictory of stenographic requirements, it is not possible to meet all of them optimally, i.e. undetectability, resistance to destruction and information capacity. For this reason, it is not possible to clearly indicate the best solutions. In order to achieve satisfactory results, one should look for compromises between the set requirements.
first_indexed 2024-12-13T04:45:32Z
format Article
id doaj.art-c72fb7f94dbb497d9e43dc475aa5c94b
institution Directory Open Access Journal
issn 2544-0764
language English
last_indexed 2024-12-13T04:45:32Z
publishDate 2021-12-01
publisher Lublin University of Technology
record_format Article
series Journal of Computer Sciences Institute
spelling doaj.art-c72fb7f94dbb497d9e43dc475aa5c94b2022-12-21T23:59:10ZengLublin University of TechnologyJournal of Computer Sciences Institute2544-07642021-12-012110.35784/jcsi.2761An analysis of the possibility of realization steganography in C#Piotr Pawlak0Jakub Podgórniak1Grzegorz KoziełLublin University of TechnologyLublin University of TechnologyThe computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the analysis of the possibility of implementing digital images steganography with the use of the C # programming language. Firstly, existing libraries and mathematical transformations which can help with performing steganography were found. Also, own code solutions were implemented. In order to objectively evaluate the methods of data hiding, the parameters describing the degree of distortion of transforms and hidden images were calculated. Subsequently, optimal solutions for specific problems were identified and demonstrational data hiding was performed. Based on the obtained results, it can be concluded that it is possible to successfully implement steganography in the C # language. There are many ready-made libraries and tools, the effectiveness of which has been verified in the conducted analysis. Due to the contradictory of stenographic requirements, it is not possible to meet all of them optimally, i.e. undetectability, resistance to destruction and information capacity. For this reason, it is not possible to clearly indicate the best solutions. In order to achieve satisfactory results, one should look for compromises between the set requirements.https://ph.pollub.pl/index.php/jcsi/article/view/2761steganographyC# programming languagedata hidingdigital image processing
spellingShingle Piotr Pawlak
Jakub Podgórniak
Grzegorz Kozieł
An analysis of the possibility of realization steganography in C#
Journal of Computer Sciences Institute
steganography
C# programming language
data hiding
digital image processing
title An analysis of the possibility of realization steganography in C#
title_full An analysis of the possibility of realization steganography in C#
title_fullStr An analysis of the possibility of realization steganography in C#
title_full_unstemmed An analysis of the possibility of realization steganography in C#
title_short An analysis of the possibility of realization steganography in C#
title_sort analysis of the possibility of realization steganography in c
topic steganography
C# programming language
data hiding
digital image processing
url https://ph.pollub.pl/index.php/jcsi/article/view/2761
work_keys_str_mv AT piotrpawlak ananalysisofthepossibilityofrealizationsteganographyinc
AT jakubpodgorniak ananalysisofthepossibilityofrealizationsteganographyinc
AT grzegorzkozieł ananalysisofthepossibilityofrealizationsteganographyinc
AT piotrpawlak analysisofthepossibilityofrealizationsteganographyinc
AT jakubpodgorniak analysisofthepossibilityofrealizationsteganographyinc
AT grzegorzkozieł analysisofthepossibilityofrealizationsteganographyinc