Tezislər / Theses



Yüklə 17,55 Mb.
Pdf görüntüsü
səhifə132/493
tarix02.10.2023
ölçüsü17,55 Mb.
#151572
1   ...   128   129   130   131   132   133   134   135   ...   493
BHOS Tezisler 2022 17x24sm

THE 3
rd
 INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS 
dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
141
DATA SECURITY USING STEGANOGRAPHY 
Gulbicha Zahidova 
Baku Engineering University 
Baku, Azerbaijan 
guabdullayeva@beu.edu.az 
Keywords: 
steganography, steganalysis, security, steganographic methods, LSB.
 
Abstract –
Steganography is the art of covert or hidden writing. The 
purpose of steganography is secret communication to hide the presence of 
a message from a third party. This proposed system deals with the 
application of steganography, which uses security. In this technology, the 
end user determines the image that will act as a carrier of information. The 
data file is encrypted and verified. This message is hidden. If the image is 
cracked or interpreted by a third party user, any image will be opened in the 
viewer, but will not display the information. This protects the data from being 
invisible and is secure during transmission. The user on the receiving side 
uses another piece of code to retrieve information from the image. 
The art of writing with incomprehensible symbols other than those with 
a password or key is cryptography. Steganography is the art of covert or 
covert writing. The purpose of steganography is secret communication to 
hide the message from a third party. This is in contrast to cryptography, the 
art of stealth writing, which is designed to make a message unreadable by a 
third party, but does not hide the existence of secret communication. While 
steganography is separate and distinct from cryptography. Both have been 
used throughout recorded history as means to protect information, there are 
many analogies between the two and, in fact, some authors categorize 
steganography as a form of cryptography since hidden communication 
certainly is a form of secret writing [1]. Steganography hides a secret 
message, but not the fact that the two parties are in contact with each other. 
The information entered is a message that you want to send anonymously. 
The stego process generally involves placing a secret message in a transport 
medium called a carrier. The hidden message is inserted into the carrier to 
create a stego environment. The use of a stego key can be used to encrypt 
a secret message and / or to make a random selection within a stego 
scheme. Classical steganography depends on the secrecy of the coding 
system, but modern steganography can only be detected when confidential 
information is known, e.g. secret key. The actual process of entering data 
into another file usually involves two classes of files - message files and cover 
files. A message file is information that is hidden or entered during a 
steganographic process. Depending on what the user is hiding, the message 
file can be any source of information - audio, graphics, text or even malicious 
files. The only restriction on the message file is that it must match the cover 



Yüklə 17,55 Mb.

Dostları ilə paylaş:
1   ...   128   129   130   131   132   133   134   135   ...   493




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin