CONFIDENTIAL INFORMATION SECRET METHOD

Journal Title: Scientific Journal of Astana IT University - Year 2020, Vol 2, Issue 2

Abstract

The article deals with the issues of hiding text information in a graphic file. Most often, one or two least significant bits of the image pixels are modified. To do this, each byte of the secret message is divided into 8 or 4 parts. The use of the least significant bits of the graphic file for transmitting a secret message significantly limits the size of the original message, in addition, it allows steganographic analysis programs to detect and decrypt the transmitted data. A formula for hiding textual information in image pixels is proposed. The algorithm for hiding information is that the bytes of the secret message are mixed with the bytes of pixels of the key image using a secret formula. The result is new bytes of image pixels. A steganography scheme has been developed for embedding secret text in random image pixels. Random bytes are pre-embedded in each pixel row of the original image. As a result of the operations, a key image is obtained. Text codes are embedded in random pixel bytes of a given RGB channel. To generate a secret message, the characters of the table of ASCII codes are used. The detection and decryption program compares the pixels of the received image with the pixels of the key image in the specified RGB channel and extracts the codes of the encrypted text. The use of abstract images as a key image significantly increases the reliability of the protection of confidential information, since in such images there is a random change in pixel values. Demonstration programs for encryption and decryption in the Python 3.5.2 programming language have been developed. A graphic file is used as the decryption key. The developed steganography scheme allows not only transmitting sensitive information, but also adding digital fingerprints or hidden tags to the image.

Authors and Affiliations

O. Kan, E. Murykh

Keywords

Related Articles

Integrated Anti-risk Management of Conflicts of a Scientific Project in a Behavioral Economics

The object of the research is the processes of managing uncertainties such as risks, conflicts, and factors of behavioral economics which may have negative consequences for a scientific project. The study has revealed...

DETERMINATION OF THE OPTIMAL CONTROLLABLE KEY INDICATOR OF CALL CENTER IN ORDER TO INCREASE EFFICIENCY FOR GENERATING INCOME

This paper focuses on call centers, which have become a common means of communication with potential customers in various companies. Specifically, this paper analyzes call center data and the importance of assessing key...

TRACKING OF NON-STANDARD TRAJECTORIES USING MPC METHODS WITH CONSTRAINTS HANDLING ALGORITHM

In recent decades, a Model-Based Predictive Control (MPC) has revealed its dominance over other control methods such as having an ability of constraints handling and input optimization in terms of the value function. H...

IMPACT OF THE COVID-19 PANDEMIC ON STUDENTS IN THE REPUBLIC OF KAZAKHSTAN

Kazakhstan, as many other countries in the world had to urgently switch to online learning when it became clear that the Covid-19 was a highly contagious disease and it was necessary to ‘social distance’ to slow down i...

EXPERT-ANALYTICAL MODEL OF MANAGEMENT QUALITY ASSESSMENT AT A CONSTRUCTION ENTERPRISE

This article develops an expert-analytical model for assessing the quality of process-oriented management of construction companies. The model differs in a two-tier approach to object evaluation by pre-evaluating the c...

Download PDF file
  • EP ID EP711931
  • DOI 10.37943/AITU.2020.15.23.009
  • Views 79
  • Downloads 0

How To Cite

O. Kan, E. Murykh (2020). CONFIDENTIAL INFORMATION SECRET METHOD. Scientific Journal of Astana IT University, 2(2), -. https://europub.co.uk./articles/-A-711931