Development of Multi-Platform Steganographic Software Based on Random-LSB

IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Programming and Computer Software Pub Date : 2024-01-24 DOI:10.1134/s0361768823080224
Gabor Attila Tibor, Jozsef Katona
{"title":"Development of Multi-Platform Steganographic Software Based on Random-LSB","authors":"Gabor Attila Tibor, Jozsef Katona","doi":"10.1134/s0361768823080224","DOIUrl":null,"url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Today, users can’t even imagine the creative and advanced methods of disguising and hiding our data. However, the free software tools available for such purposes are often outdated or rudimentary in terms of functionality, and sometimes even contain vulnerabilities. The purpose of this article is to design and implement an easy-to-use and secure data hiding application that meets modern expectations and requirements, and also has a functionality that also returns the detectability level of the data to the user. The study first explores and evaluates currently available free software based on a certain set of criteria. After that, we describe in detail the development of a multi-platform stegenographic application with a new function, focusing on the methods and algorithms used. After successful implementation, the finished application is evaluated and compared with the tested, freely available software based on the set criteria.</p>","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":"9 1","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Programming and Computer Software","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1134/s0361768823080224","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

Abstract

Today, users can’t even imagine the creative and advanced methods of disguising and hiding our data. However, the free software tools available for such purposes are often outdated or rudimentary in terms of functionality, and sometimes even contain vulnerabilities. The purpose of this article is to design and implement an easy-to-use and secure data hiding application that meets modern expectations and requirements, and also has a functionality that also returns the detectability level of the data to the user. The study first explores and evaluates currently available free software based on a certain set of criteria. After that, we describe in detail the development of a multi-platform stegenographic application with a new function, focusing on the methods and algorithms used. After successful implementation, the finished application is evaluated and compared with the tested, freely available software based on the set criteria.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于随机-LSB 的多平台隐写软件的开发
摘要 如今,用户甚至无法想象有多少创造性的先进方法来伪装和隐藏我们的数据。然而,可用于此类目的的免费软件工具往往功能过时或简陋,有时甚至存在漏洞。本文的目的是设计并实现一种易于使用且安全的数据隐藏应用程序,它不仅能满足现代人的期望和要求,而且还具有向用户返回数据可探测性级别的功能。本研究首先根据一套特定的标准对目前可用的免费软件进行了探索和评估。然后,我们详细描述了具有新功能的多平台 Stegenographic 应用程序的开发过程,重点介绍了所使用的方法和算法。成功实施后,我们将根据设定的标准对完成的应用程序进行评估,并与经过测试的免费软件进行比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Programming and Computer Software
Programming and Computer Software 工程技术-计算机:软件工程
CiteScore
1.60
自引率
28.60%
发文量
35
审稿时长
>12 weeks
期刊介绍: Programming and Computer Software is a peer reviewed journal devoted to problems in all areas of computer science: operating systems, compiler technology, software engineering, artificial intelligence, etc.
期刊最新文献
Comparative Efficiency Analysis of Hashing Algorithms for Use in zk-SNARK Circuits in Distributed Ledgers Constructing the Internal Voronoi Diagram of Polygonal Figure Using the Sweepline Method RuGECToR: Rule-Based Neural Network Model for Russian Language Grammatical Error Correction Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem Analytical Review of Confidential Artificial Intelligence: Methods and Algorithms for Deployment in Cloud Computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1