THE 3 rd INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
141
DATA SECURITY USING STEGANOGRAPHY Gulbicha Zahidova Baku Engineering University Baku, Azerbaijan guabdullayeva@beu.edu.az Keywords: steganography, steganalysis, security, steganographic methods, LSB.
Abstract – Steganography is the art of covert or hidden writing. The
purpose of steganography is secret communication to hide the presence of
a message from a third party. This proposed system deals with the
application of steganography, which uses security. In this technology, the
end user determines the image that will act as a carrier of information. The
data file is encrypted and verified. This message is hidden. If the image is
cracked or interpreted by a third party user, any image will be opened in the
viewer, but will not display the information. This protects the data from being
invisible and is secure during transmission. The user on the receiving side
uses another piece of code to retrieve information from the image.
The art of writing with incomprehensible symbols other than those with
a password or key is cryptography. Steganography is the art of covert or
covert writing. The purpose of steganography is secret communication to
hide the message from a third party. This is in contrast to cryptography, the
art of stealth writing, which is designed to make a message unreadable by a
third party, but does not hide the existence of secret communication. While
steganography is separate and distinct from cryptography. Both have been
used throughout recorded history as means to protect information, there are
many analogies between the two and, in fact, some authors categorize
steganography as a form of cryptography since hidden communication
certainly is a form of secret writing [1]. Steganography hides a secret
message, but not the fact that the two parties are in contact with each other.
The information entered is a message that you want to send anonymously.
The stego process generally involves placing a secret message in a transport
medium called a carrier. The hidden message is inserted into the carrier to
create a stego environment. The use of a stego key can be used to encrypt
a secret message and / or to make a random selection within a stego
scheme. Classical steganography depends on the secrecy of the coding
system, but modern steganography can only be detected when confidential
information is known, e.g. secret key. The actual process of entering data
into another file usually involves two classes of files - message files and cover
files. A message file is information that is hidden or entered during a
steganographic process. Depending on what the user is hiding, the message
file can be any source of information - audio, graphics, text or even malicious
files. The only restriction on the message file is that it must match the cover