An analysis of the possibility of realization steganography in C#

Piotr Pawlak

piotr.pawlak3@pollub.edu.pl
Lublin University of Technology (Poland)

Jakub Podgórniak


Lublin University of Technology (Poland)

Grzegorz Kozieł


(Poland)

Abstract

The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the analysis of the possibility of implementing digital images steganography with the use of the C # programming language. Firstly, existing libraries and mathematical transformations which can help with performing steganography were found. Also, own code solutions were implemented. In order to objectively evaluate the methods of data hiding, the parameters describing the degree of distortion of transforms and hidden images were calculated. Subsequently, optimal solutions for specific problems were identified and demonstrational data hiding was performed. Based on the obtained results, it can be concluded that it is possible to successfully implement steganography in the C # language. There are many ready-made libraries and tools, the effectiveness of which has been verified in the conducted analysis. Due to the contradictory of stenographic requirements, it is not possible to meet all of them optimally, i.e. undetectability, resistance to destruction and information capacity. For this reason, it is not possible to clearly indicate the best solutions. In order to achieve satisfactory results, one should look for compromises between the set requirements.


Keywords:

steganography, C# programming language, data hiding, digital image processing

N. Ahmed, T. Natarajan, K.R. Rao, Discrete Cosine Transform, IEEE Transactions on Computers, Volume: C-23, Issue: 1 (1974) 90-93.
DOI: https://doi.org/10.1109/T-C.1974.223784   Google Scholar

J. Białasiewicz, Falki i aproksymacje, Wydawnictwa Naukowo-Techniczne, Warszawa, 2000.
  Google Scholar

Biblioteka Accord.NET, https://github.com/accord-net/framework, [1.04.2021].
  Google Scholar

Biblioteka AForge.NET, https://github.com/andrewkirillov/AForge.NET, [1.04.2021].
  Google Scholar

Biblioteka Math.NET, https://github.com/mathnet/mathnet-numerics, [1.04.2021].
  Google Scholar

Biblioteka NWaves, https://github.com/ar1st0crat/NWaves, [1.04.2021].
  Google Scholar

Biblioteka UMapx, https://github.com/asiryan/UMapx, [1.04.2021].
  Google Scholar

Biblioteka Universal.Common.Mathematics, https://nuget.org/packages/Universal.Common.Mathematics/, [1.04.2021].
  Google Scholar

Biblioteka TrentTobler.Algorithms.FourierTransform, https://github.com/trenttobler/FourierTransform, [1.04.2021].
  Google Scholar

S. Dhawan, R. Gupta, Analysis of various data security techniques of steganography: A survey, ISJ: A Global Perspective, Volume: 30, Issue: 2 (2021) 63-87.
DOI: https://doi.org/10.1080/19393555.2020.1801911   Google Scholar

Z. Fortuna, B. Macukow, J. Wąsowski, Metody numeryczne, Wydawnictwa Naukowo-Techniczne, Warszawa, 2015.
  Google Scholar

N. Hamid, A. Yahya, R. B. Ahmad, O. M. Al-Qershi, Image steganography techniques: an overview, IJCSS, Volume: 6, Issue: 3 (2012) 168-187.
  Google Scholar

P. Kopniak, Metody cyfrowego przetwarzania sygnałów na potrzeby steganologii komputerowej, Politechnika Lubelska, Lublin, 2007.
  Google Scholar

T. C. Lu, T. N. Vo, Reversible steganography techniques: A survey, In Digital Media Steganography, Elsevier (2021) 189-213.
DOI: https://doi.org/10.1016/B978-0-12-819438-6.00018-9   Google Scholar

T. Morkel, J. H. Eloff, M. S. Olivier, An overview of image steganography, ISSA (2015).
  Google Scholar

P. Strumiłło, M. Strzelecki, Przekształcenie Fouriera obrazów, Politechnika Łódzka, Łódź, 2006.
  Google Scholar

M. A. Wakure, A. N. Holambe, A Discrete Wavelet Transform: A Steganographic Method for Transmitting Images, IJCA, Volume: 129 (2015) 26-29.
DOI: https://doi.org/10.5120/ijca2015906915   Google Scholar

Z. Yuan, D. Liu, X. Zhang, Q. Su, New image blind watermarking method based on two-dimensional discrete cosine transform, Optik, Volume: 204 (2020) 164152.
DOI: https://doi.org/10.1016/j.ijleo.2019.164152   Google Scholar

P. Zimnicki, G. Kozieł, Analiza właściwości metod steganografii odwracalnej, JCSI, Volume: 8 (2018), 292-297.
DOI: https://doi.org/10.35784/jcsi.699   Google Scholar

Download


Published
2021-12-30

Cited by

Pawlak, P., Podgórniak, J., & Kozieł, G. (2021). An analysis of the possibility of realization steganography in C#. Journal of Computer Sciences Institute, 21, 383–390. https://doi.org/10.35784/jcsi.2761

Authors

Piotr Pawlak 
piotr.pawlak3@pollub.edu.pl
Lublin University of Technology Poland

Authors

Jakub Podgórniak 

Lublin University of Technology Poland

Authors

Grzegorz Kozieł 

Poland

Statistics

Abstract views: 263
PDF downloads: 134