CONFIDENTIAL INFORMATION SECRET METHOD

The article deals with the issues of hiding text information in a graphic file. Most often, one or two least significant bits of the image pixels are modified. To do this, each byte of the secret message is divided into 8 or 4 parts. The use of the least significant bits of the graphic file for t...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: O. Kan, E. Murykh
Formato: article
Lenguaje:EN
Publicado: Astana IT University 2020
Materias:
Acceso en línea:https://doaj.org/article/fcd5596ed45840fc8b1c989a058be6c9
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:fcd5596ed45840fc8b1c989a058be6c9
record_format dspace
spelling oai:doaj.org-article:fcd5596ed45840fc8b1c989a058be6c92021-12-02T12:22:41ZCONFIDENTIAL INFORMATION SECRET METHOD10.37943/AITU.2020.15.23.0092707-90312707-904Xhttps://doaj.org/article/fcd5596ed45840fc8b1c989a058be6c92020-06-01T00:00:00Zhttps://sj.astanait.edu.kz/wp-content/uploads/2020/07/Journal-AITU_2-102-109.pdfhttps://doaj.org/toc/2707-9031https://doaj.org/toc/2707-904XThe article deals with the issues of hiding text information in a graphic file. Most often, one or two least significant bits of the image pixels are modified. To do this, each byte of the secret message is divided into 8 or 4 parts. The use of the least significant bits of the graphic file for transmitting a secret message significantly limits the size of the original message, in addition, it allows steganographic analysis programs to detect and decrypt the transmitted data. A formula for hiding textual information in image pixels is proposed. The algorithm for hiding information is that the bytes of the secret message are mixed with the bytes of pixels of the key image using a secret formula. The result is new bytes of image pixels. A steganography scheme has been developed for embedding secret text in random image pixels. Random bytes are pre-embedded in each pixel row of the original image. As a result of the operations, a key image is obtained. Text codes are embedded in random pixel bytes of a given RGB channel. To generate a secret message, the characters of the table of ASCII codes are used. The detection and decryption program compares the pixels of the received image with the pixels of the key image in the specified RGB channel and extracts the codes of the encrypted text. The use of abstract images as a key image significantly increases the reliability of the protection of confidential information, since in such images there is a random change in pixel values. Demonstration programs for encryption and decryption in the Python 3.5.2 programming language have been developed. A graphic file is used as the decryption key. The developed steganography scheme allows not only transmitting sensitive information, but also adding digital fingerprints or hidden tags to the imageO. KanE. MurykhAstana IT Universityarticlesteganographyinformation hidingimage keyimage pixelsembedding formulaInformation technologyT58.5-58.64ENScientific Journal of Astana IT University, Vol 2, Iss 2, Pp 102-109 (2020)
institution DOAJ
collection DOAJ
language EN
topic steganography
information hiding
image key
image pixels
embedding formula
Information technology
T58.5-58.64
spellingShingle steganography
information hiding
image key
image pixels
embedding formula
Information technology
T58.5-58.64
O. Kan
E. Murykh
CONFIDENTIAL INFORMATION SECRET METHOD
description The article deals with the issues of hiding text information in a graphic file. Most often, one or two least significant bits of the image pixels are modified. To do this, each byte of the secret message is divided into 8 or 4 parts. The use of the least significant bits of the graphic file for transmitting a secret message significantly limits the size of the original message, in addition, it allows steganographic analysis programs to detect and decrypt the transmitted data. A formula for hiding textual information in image pixels is proposed. The algorithm for hiding information is that the bytes of the secret message are mixed with the bytes of pixels of the key image using a secret formula. The result is new bytes of image pixels. A steganography scheme has been developed for embedding secret text in random image pixels. Random bytes are pre-embedded in each pixel row of the original image. As a result of the operations, a key image is obtained. Text codes are embedded in random pixel bytes of a given RGB channel. To generate a secret message, the characters of the table of ASCII codes are used. The detection and decryption program compares the pixels of the received image with the pixels of the key image in the specified RGB channel and extracts the codes of the encrypted text. The use of abstract images as a key image significantly increases the reliability of the protection of confidential information, since in such images there is a random change in pixel values. Demonstration programs for encryption and decryption in the Python 3.5.2 programming language have been developed. A graphic file is used as the decryption key. The developed steganography scheme allows not only transmitting sensitive information, but also adding digital fingerprints or hidden tags to the image
format article
author O. Kan
E. Murykh
author_facet O. Kan
E. Murykh
author_sort O. Kan
title CONFIDENTIAL INFORMATION SECRET METHOD
title_short CONFIDENTIAL INFORMATION SECRET METHOD
title_full CONFIDENTIAL INFORMATION SECRET METHOD
title_fullStr CONFIDENTIAL INFORMATION SECRET METHOD
title_full_unstemmed CONFIDENTIAL INFORMATION SECRET METHOD
title_sort confidential information secret method
publisher Astana IT University
publishDate 2020
url https://doaj.org/article/fcd5596ed45840fc8b1c989a058be6c9
work_keys_str_mv AT okan confidentialinformationsecretmethod
AT emurykh confidentialinformationsecretmethod
_version_ 1718394492538585088