An analysis of the possibility of realization steganography in C#
Article Sidebar
Open full text
Issue Vol. 21 (2021)
-
Comparison of selected mathematical functions for the analysis of growth behavior of items and physical interpretation of Avrami-Weibull function
Keshra Sangwal259-278
-
Comparison of classical machine learning algorithms in the task of handwritten digits classification
Oleksandr Voloshchenko, Małgorzata Plechawska-Wójcik279-286
-
The comparative analysis of Java frameworks: Spring Boot, Micronaut and Quarkus
Maciej Jeleń, Mariusz Dzieńkowski287-294
-
Usability analysis taking into consideration the aspects of accessibility of selected university websites
Karol Kałan, Damian Karpiuk, Mariusz Dzieńkowski295-302
-
A comparison of conventional and deep learning methods of image classification
Maryna Dovbnych, Małgorzata Plechawska–Wójcik303-308
-
Comparative analysis of connection performance with databases via JDBC interface and ORM programming frameworks
Mateusz Żuchnik, Piotr Kopniak309-315
-
Examination of text's lexis using a Polish dictionary
Roman Voitovych, Edyta Łukasik316-323
-
Comparison of capabilities of the Unity environment and LibGDX in terms of computer game development
Piotr Kosidło, Karol Kowalczyk, Marcin Badurowicz324-329
-
Performance analysis of the TensorFlow library with different optimisation algorithms
Maciej Wadas, Jakub Smołka330-335
-
Analysis of user experience during interaction with selected CMS platforms
Michał Miszczak, Mariusz Dzieńkowski336-343
-
Analysis of polish community on streaming platform twitch.tv during COVID-19 epidemy
Kamil Jeżowski, Marcin Badurowicz344-348
-
A study of the user experience when interacting with applications that work with sports armbands to monitor human activity
Mateusz Kiryczuk, Paweł Kocyła, Mariusz Dzieńkowski349-355
-
Performance comparison of programming interfaces on the example of REST API, GraphQL and gRPC
Mariusz Śliwa, Beata Pańczyk356-361
-
Digital entertainment in the face of COVID-19
Adam Jarszak362-366
-
Symfony and Laravel – a comparative analysis of PHP programming frameworks
Krzysztof Kuflewski, Mariusz Dzieńkowski367-372
-
A comparative analysis of cryptocurrency wallet management tools
Kamil Biernacki, Małgorzata Plechawska-Wójcik373-377
-
Analysis of data storage methods available in the Android SDK
Dominika Kornaś378-382
-
An analysis of the possibility of realization steganography in C#
Piotr Pawlak, Jakub Podgórniak, Grzegorz Kozieł383-390
Main Article Content
DOI
Authors
jakub.podgorniak@pollub.edu.pl
Abstract
The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the analysis of the possibility of implementing digital images steganography with the use of the C # programming language. Firstly, existing libraries and mathematical transformations which can help with performing steganography were found. Also, own code solutions were implemented. In order to objectively evaluate the methods of data hiding, the parameters describing the degree of distortion of transforms and hidden images were calculated. Subsequently, optimal solutions for specific problems were identified and demonstrational data hiding was performed. Based on the obtained results, it can be concluded that it is possible to successfully implement steganography in the C # language. There are many ready-made libraries and tools, the effectiveness of which has been verified in the conducted analysis. Due to the contradictory of stenographic requirements, it is not possible to meet all of them optimally, i.e. undetectability, resistance to destruction and information capacity. For this reason, it is not possible to clearly indicate the best solutions. In order to achieve satisfactory results, one should look for compromises between the set requirements.
Keywords:
References
N. Ahmed, T. Natarajan, K.R. Rao, Discrete Cosine Transform, IEEE Transactions on Computers, Volume: C-23, Issue: 1 (1974) 90-93. DOI: https://doi.org/10.1109/T-C.1974.223784
J. Białasiewicz, Falki i aproksymacje, Wydawnictwa Naukowo-Techniczne, Warszawa, 2000.
Biblioteka Accord.NET, https://github.com/accord-net/framework, [1.04.2021].
Biblioteka AForge.NET, https://github.com/andrewkirillov/AForge.NET, [1.04.2021].
Biblioteka Math.NET, https://github.com/mathnet/mathnet-numerics, [1.04.2021].
Biblioteka NWaves, https://github.com/ar1st0crat/NWaves, [1.04.2021].
Biblioteka UMapx, https://github.com/asiryan/UMapx, [1.04.2021].
Biblioteka Universal.Common.Mathematics, https://nuget.org/packages/Universal.Common.Mathematics/, [1.04.2021].
Biblioteka TrentTobler.Algorithms.FourierTransform, https://github.com/trenttobler/FourierTransform, [1.04.2021].
S. Dhawan, R. Gupta, Analysis of various data security techniques of steganography: A survey, ISJ: A Global Perspective, Volume: 30, Issue: 2 (2021) 63-87. DOI: https://doi.org/10.1080/19393555.2020.1801911
Z. Fortuna, B. Macukow, J. Wąsowski, Metody numeryczne, Wydawnictwa Naukowo-Techniczne, Warszawa, 2015.
N. Hamid, A. Yahya, R. B. Ahmad, O. M. Al-Qershi, Image steganography techniques: an overview, IJCSS, Volume: 6, Issue: 3 (2012) 168-187.
P. Kopniak, Metody cyfrowego przetwarzania sygnałów na potrzeby steganologii komputerowej, Politechnika Lubelska, Lublin, 2007.
T. C. Lu, T. N. Vo, Reversible steganography techniques: A survey, In Digital Media Steganography, Elsevier (2021) 189-213. DOI: https://doi.org/10.1016/B978-0-12-819438-6.00018-9
T. Morkel, J. H. Eloff, M. S. Olivier, An overview of image steganography, ISSA (2015).
P. Strumiłło, M. Strzelecki, Przekształcenie Fouriera obrazów, Politechnika Łódzka, Łódź, 2006.
M. A. Wakure, A. N. Holambe, A Discrete Wavelet Transform: A Steganographic Method for Transmitting Images, IJCA, Volume: 129 (2015) 26-29. DOI: https://doi.org/10.5120/ijca2015906915
Z. Yuan, D. Liu, X. Zhang, Q. Su, New image blind watermarking method based on two-dimensional discrete cosine transform, Optik, Volume: 204 (2020) 164152. DOI: https://doi.org/10.1016/j.ijleo.2019.164152
P. Zimnicki, G. Kozieł, Analiza właściwości metod steganografii odwracalnej, JCSI, Volume: 8 (2018), 292-297. DOI: https://doi.org/10.35784/jcsi.699
Article Details
Abstract views: 375
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
