THE 3 rd INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
142
file. A cover file is an environment that contains a message file after a
steganographic process has been applied.
Steganography differs from cryptography in that while cryptography
focuses on keeping the content of a message secret, steganography focuses
on keeping the message secret [2]. Steganography and cryptography are
both ways to protect information from undesirable aspects, but no technology
alone is perfect and can be compromised. When the existence of classified
information is discovered or even suspected, the purpose of steganography
is partially defeated [3]. Thus, the power of steganography can be enhanced
by combining it with cryptography.
We use the technique of hiding information with an image file, the
appearance, resolution or clarity of the image is not affected. Confidential
information can be lengthy. For the hacker, the image will simply appear
when viewed in advance and is not a trace of hidden information. If the image
file is opened via a text editor, the data will not be visible because the
information is stored in a binary encryption form. This makes it difficult for the
application to separate the data into an image file.
In Least-Significant Bit Encoding (LSB) a digital image consists of a
matrix of color and intensity values. In a typical gray scale image, 8 bits/pixel
are used. In a typical full-color image, there are 24 bits/pixel, 8 bits assigned
to each color components [4]. The simplest steganographic methods place
the bits of the message directly in the deterministic sequence on the least
significant bit plane of the overlay image. Because the amplitude of the
change is small, the modulation of the bit, which is the least important, does
not result in a difference perceived by man. Other methods "process" the
message with a pseudo random noise sequence before or during the
insertion of the message into the cover image. The advantage of LSB
embedding is its simplicity and many techniques use these methods [5].
The placement of the LSB also allows for high perceptual transparency.
However, there are many weaknesses in terms of robustness, resistance to
interference and other security issues. LSB encoding is extremely sensitive
to any type of stego-image filtering or manipulation. Measurement, rotation,
cutting, adding noise, or stego-shaped loss of compression can destroy the
message. In addition, an attacker can easily delete a message by deleting
(resetting) the entire LSB plane with very little change in the perception
quality of the altered stego-image [6].
The system deals with the secure transmission of data. This system
deals with the implementation of security using steganography. That is, to
hide a large amount of information in the image without compromising the
clarity and pixels of the image. The main purpose of this system is to hide a
large amount of encrypted and verified information, regardless of the size of
the image and without compromising the clarity of the image. In this chapter,