Tezislər / Theses



Yüklə 17,55 Mb.
Pdf görüntüsü
səhifə133/493
tarix02.10.2023
ölçüsü17,55 Mb.
#151572
1   ...   129   130   131   132   133   134   135   136   ...   493
BHOS Tezisler 2022 17x24sm

THE 3
rd
 INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS 
dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
142
file. A cover file is an environment that contains a message file after a 
steganographic process has been applied. 
Steganography differs from cryptography in that while cryptography 
focuses on keeping the content of a message secret, steganography focuses 
on keeping the message secret [2]. Steganography and cryptography are 
both ways to protect information from undesirable aspects, but no technology 
alone is perfect and can be compromised. When the existence of classified 
information is discovered or even suspected, the purpose of steganography 
is partially defeated [3]. Thus, the power of steganography can be enhanced 
by combining it with cryptography. 
We use the technique of hiding information with an image file, the 
appearance, resolution or clarity of the image is not affected. Confidential 
information can be lengthy. For the hacker, the image will simply appear 
when viewed in advance and is not a trace of hidden information. If the image 
file is opened via a text editor, the data will not be visible because the 
information is stored in a binary encryption form. This makes it difficult for the 
application to separate the data into an image file. 
In Least-Significant Bit Encoding (LSB) a digital image consists of a 
matrix of color and intensity values. In a typical gray scale image, 8 bits/pixel 
are used. In a typical full-color image, there are 24 bits/pixel, 8 bits assigned 
to each color components [4]. The simplest steganographic methods place 
the bits of the message directly in the deterministic sequence on the least 
significant bit plane of the overlay image. Because the amplitude of the 
change is small, the modulation of the bit, which is the least important, does 
not result in a difference perceived by man. Other methods "process" the 
message with a pseudo random noise sequence before or during the 
insertion of the message into the cover image. The advantage of LSB 
embedding is its simplicity and many techniques use these methods [5].
The placement of the LSB also allows for high perceptual transparency. 
However, there are many weaknesses in terms of robustness, resistance to 
interference and other security issues. LSB encoding is extremely sensitive 
to any type of stego-image filtering or manipulation. Measurement, rotation, 
cutting, adding noise, or stego-shaped loss of compression can destroy the 
message. In addition, an attacker can easily delete a message by deleting 
(resetting) the entire LSB plane with very little change in the perception 
quality of the altered stego-image [6]. 
The system deals with the secure transmission of data. This system 
deals with the implementation of security using steganography. That is, to 
hide a large amount of information in the image without compromising the 
clarity and pixels of the image. The main purpose of this system is to hide a 
large amount of encrypted and verified information, regardless of the size of 
the image and without compromising the clarity of the image. In this chapter, 



Yüklə 17,55 Mb.

Dostları ilə paylaş:
1   ...   129   130   131   132   133   134   135   136   ...   493




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin