Software Implementation of Modified LSB Algorithm with Shamir`s Secret Sharing

dc.citation.epage139
dc.citation.issue2
dc.citation.spage130
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.authorPavlov, M.
dc.contributor.authorYurchak, I.
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2024-03-19T10:17:50Z
dc.date.available2024-03-19T10:17:50Z
dc.date.created2022-02-28
dc.date.issued2022-02-28
dc.description.abstractToday, it is often necessary to transmit a confidential message of a small volume, while the use of complex cryptographic systems is difficult for some reasons. One of these reasons is the impossibility of using reliable products, which, as a rule, are commercial and unavailable to the average computer user. In modern information society, many services are provided with the help of computer networks and information technologies. Information presented in digital form must be reliably protected from many threats: unauthorized access and use, destruction, forgery, leakage, violation of license agreements, disclaimer of authorship, etc. Information protection is extremely important in both commercial and government spheres. The issues of developing effective methods of protecting digital information, in particular methods of computer steganography and steganalysis, are relevant and important for the state and society. To achieve the goal, it is necessary to propose a method of increasing stego-resistance, determine the effectiveness of the created solution and analyze the obtained results. The object of research is the process of protecting information embedded in a graphic econtainer. The subject of research is methods and algorithms of computer steganography and steganalysis for images. The research methods used in this work are based on steganographic algorithms.
dc.format.extent130-139
dc.format.pages10
dc.identifier.citationPavlov M. Software Implementation of Modified LSB Algorithm with Shamir`s Secret Sharing / M. Pavlov, I. Yurchak // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2022. — Vol 7. — No 2. — P. 130–139.
dc.identifier.citationenPavlov M. Software Implementation of Modified LSB Algorithm with Shamir`s Secret Sharing / M. Pavlov, I. Yurchak // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2022. — Vol 7. — No 2. — P. 130–139.
dc.identifier.doidoi.org/10.23939/acps2022.02.130
dc.identifier.issn2524-0382
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/61486
dc.language.isoen
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofAdvances in Cyber-Physical Systems, 2 (7), 2022
dc.relation.references[1] Sajid, M. M. and Tanvir, M. P. et al. (2019). “A Comparative Study of Recent Steganography Techniques for Multiple Image Formats”, Modern Education and Computer Science (MECS), 1–20. DOI: 10.5815/ijcnis.2019.01.02.
dc.relation.references[2] Mahdi, M., Shafry, M. M., Abass, F. J., Sabah, M. T. et al. (2018). “Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats”, International Journal of Engineering & Technology, 3505–3514. DOI: 10.14419/ijet.v7i4.17294.
dc.relation.references[3] Subramanian N., Elharrouss O., Al-Maadeed S. and Bouridane A. et al. (2021). “Image Steganography: A Review of the Recent Advances”. IEEE Explore. 23409–23423. DOI: 10.1109/ACCESS.2021.3053998.
dc.relation.references[4] Polinovskyi V. V., Korolyov V. Y., Gerasimenko V. A. and GorinshteinM. L. et al. (2011). “Information technology for research methods steganography and steganalysis”. Interuniversity collection “Computer-integrated technologies: education, science, production”. Lutsk, Iss. No. 5. Available at: https://icyb180.org.ua/wp-content/uploads/2012/04/informatsiyna-tehnologiya-dlya-doslidzhennya-metodiv-steganografiyi-i-stegoanalizu.pdf (Accessed: 28 September 2022).
dc.relation.references[5] Suresh, A., Shunmuganathan, K. L., et al. (2012). “Image Texture Classification using Gray LevelCo-Occurrence Matrix Based Statistical Features”. European Journal of Scientific Research, 591–597. Available at: https://www.academia.edu/36645235/Image_Texture_Classification_using_Gray_Level_Co_Occurrence_Matrix_Based_Statistical_Features (Accessed: 28 September 2022).
dc.relation.references[6] Filler, T., Fridrich, J. et al. (2011). “Design of adaptive steganographic schemes for digital images”, in Electronic Imaging, MediaWatermarking, Security, and Forensics: The International Society for Optical Engineering, San Francisco, CA. DOI: 10.1117/12.872192.
dc.relation.references[7] Lin, C.-Y., Chang, S.-F. et al. (1999). “Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process”.International Symposium on Multimedia Information Processing (ISMIP 99). Available at: https://www.ee.columbia.edu/ln/dvmm/publications/99/cylinmodelscan.pdf (Accessed: 28 September 2022).
dc.relation.references[8] Vidhya, R. and Brindha, M. et al. (2018). “Polynomial Substitution based Image Encryption using Shamir Scheme”, Proceedings of International Conference on Computational Intelligence & IoT (ICCIIoT), 311–314. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3355268 (Accessed: 28 September 2022).
dc.relation.references[9] Hineman A. and Blaum M. et al. (2021). “An efficient implementation of the Shamir secret sharing scheme”, ArXiv, 1–7. DOI: 10.48550/arXiv.2108.05982.
dc.relation.references[10] Progonov, D. et al. (2021). “Detection Of Stego ImagesWith Adaptively Embedded Data By Component Analysis Methods”, Advances in Cyber-Physical Systems, Vol. 6, Number 2, 146–154. DOI: 10.23939/acps2021.02.146.
dc.relation.referencesen[1] Sajid, M. M. and Tanvir, M. P. et al. (2019). "A Comparative Study of Recent Steganography Techniques for Multiple Image Formats", Modern Education and Computer Science (MECS), 1–20. DOI: 10.5815/ijcnis.2019.01.02.
dc.relation.referencesen[2] Mahdi, M., Shafry, M. M., Abass, F. J., Sabah, M. T. et al. (2018). "Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats", International Journal of Engineering & Technology, 3505–3514. DOI: 10.14419/ijet.v7i4.17294.
dc.relation.referencesen[3] Subramanian N., Elharrouss O., Al-Maadeed S. and Bouridane A. et al. (2021). "Image Steganography: A Review of the Recent Advances". IEEE Explore. 23409–23423. DOI: 10.1109/ACCESS.2021.3053998.
dc.relation.referencesen[4] Polinovskyi V. V., Korolyov V. Y., Gerasimenko V. A. and GorinshteinM. L. et al. (2011). "Information technology for research methods steganography and steganalysis". Interuniversity collection "Computer-integrated technologies: education, science, production". Lutsk, Iss. No. 5. Available at: https://icyb180.org.ua/wp-content/uploads/2012/04/informatsiyna-tehnologiya-dlya-doslidzhennya-metodiv-steganografiyi-i-stegoanalizu.pdf (Accessed: 28 September 2022).
dc.relation.referencesen[5] Suresh, A., Shunmuganathan, K. L., et al. (2012). "Image Texture Classification using Gray LevelCo-Occurrence Matrix Based Statistical Features". European Journal of Scientific Research, 591–597. Available at: https://www.academia.edu/36645235/Image_Texture_Classification_using_Gray_Level_Co_Occurrence_Matrix_Based_Statistical_Features (Accessed: 28 September 2022).
dc.relation.referencesen[6] Filler, T., Fridrich, J. et al. (2011). "Design of adaptive steganographic schemes for digital images", in Electronic Imaging, MediaWatermarking, Security, and Forensics: The International Society for Optical Engineering, San Francisco, CA. DOI: 10.1117/12.872192.
dc.relation.referencesen[7] Lin, C.-Y., Chang, S.-F. et al. (1999). "Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process".International Symposium on Multimedia Information Processing (ISMIP 99). Available at: https://www.ee.columbia.edu/ln/dvmm/publications/99/cylinmodelscan.pdf (Accessed: 28 September 2022).
dc.relation.referencesen[8] Vidhya, R. and Brindha, M. et al. (2018). "Polynomial Substitution based Image Encryption using Shamir Scheme", Proceedings of International Conference on Computational Intelligence & IoT (ICCIIoT), 311–314. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3355268 (Accessed: 28 September 2022).
dc.relation.referencesen[9] Hineman A. and Blaum M. et al. (2021). "An efficient implementation of the Shamir secret sharing scheme", ArXiv, 1–7. DOI: 10.48550/arXiv.2108.05982.
dc.relation.referencesen[10] Progonov, D. et al. (2021). "Detection Of Stego ImagesWith Adaptively Embedded Data By Component Analysis Methods", Advances in Cyber-Physical Systems, Vol. 6, Number 2, 146–154. DOI: 10.23939/acps2021.02.146.
dc.relation.urihttps://icyb180.org.ua/wp-content/uploads/2012/04/informatsiyna-tehnologiya-dlya-doslidzhennya-metodiv-steganografiyi-i-stegoanalizu.pdf
dc.relation.urihttps://www.academia.edu/36645235/Image_Texture_Classification_using_Gray_Level_Co_Occurrence_Matrix_Based_Statistical_Features
dc.relation.urihttps://www.ee.columbia.edu/ln/dvmm/publications/99/cylinmodelscan.pdf
dc.relation.urihttps://papers.ssrn.com/sol3/papers.cfm?abstract_id=3355268
dc.rights.holder© Національний університет “Львівська політехніка”, 2022
dc.rights.holder© Pavlov M., Yurchak I., 2022
dc.subjectsteganography
dc.subjectleast significant bit
dc.subjectShamir’s secret distribution
dc.subjectdigital image steganalysis
dc.titleSoftware Implementation of Modified LSB Algorithm with Shamir`s Secret Sharing
dc.typeArticle

Files

Original bundle

Now showing 1 - 2 of 2
Thumbnail Image
Name:
2022v7n2_Pavlov_M-Software_Implementation_130-139.pdf
Size:
1.15 MB
Format:
Adobe Portable Document Format
Thumbnail Image
Name:
2022v7n2_Pavlov_M-Software_Implementation_130-139__COVER.png
Size:
550.79 KB
Format:
Portable Network Graphics

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.75 KB
Format:
Plain Text
Description: