Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: https://evnuir.vnu.edu.ua/handle/123456789/21709
Назва: Educational example of masking textual information in a photographic signal
Автори: Holovin, Mykola
Holovina, Nina
Бібліографічний опис: Holovin, M., & Holovina, N. (2022). Educational example of masking textual information in a photographic signal. ScienceRise: Pedagogical Education, (4(49), 24–28. https://doi.org/10.15587/2519-4984.2022.261051
Журнал/збірник: ScienceRise: Pedagogical Education
Випуск/№ : 4(49)
Дата публікації: 2022
Дата внесення: 17-січ-2023
Видавництво: Journal «ScienceRise: Pedagogical Education»
Країна (код): UA
Місце видання, проведення: Journal «ScienceRise: Pedagogical Education»
Ідентифікатор ORCID: https://orcid.org/0000-0003-4516-4677
https://orcid.org/0000-0002-1152-1536
DOI: https://doi.org/10.15587/2519-4984.2022.261051
УДК: 004.72.056.52:003.27:004.438
Теми: Python
Pillow
steganography
masking information in file
educational example
Діапазон сторінок: 24-28
Короткий огляд (реферат): The paper presents a steganographic method of masking textual information in photo files. Concealment is implemented in Python. The introduction of individual letters of the text into the image is carried out by the method of "least signifi-cant bit". The program can be used for both educational and practical purposes. The Pillow graphics library was used to implement the program. This is not a specialized library for steganographic needs. The use of this library makes it possible to visualize the mechanism of hiding information in the lessons, while the conciseness of the program code gives the possibility to demonstrate it in the classroom setting. It is also important for educational purposes, that work-ing within the Pillow library allows you to see the state of an empty and filled container at the level of individual bits. To assess the practical value of the program, it was tested with texts of different lengths and with containers (photo-graphs) of various kinds. The experiment showed the correct reproduction of texts. Careful visual examination of the empty and correspondingly filled containers (photographs) revealed no differences or suspicions of text bookmarks. Of course, if the party who intercepted the masked message has guesses about how the text is hidden, then this text is easily revealed. Therefore, it is obvious, that the use of the program for practical purposes requires additional manipulations in the code, in particular related to the order of implementation of the text and the choice of location.It is also desirable to additionally encrypt the text with at least a simple method. Such encryption is possible with the usage of a separate program. Analysis of photographs and manipulation with them at the level of individualbits also has educational value in terms of disclosing a method of capturing the corresponding physical signal. The latter gives an explanation of the methods of encoding static images, noise level, the magnitude of the useful physical signal, and the limits of sensitivity of human vision
URI (Уніфікований ідентифікатор ресурсу): https://evnuir.vnu.edu.ua/handle/123456789/21709
Тип вмісту: Article
Розташовується у зібраннях:Наукові роботи (FITM)

Файли цього матеріалу:
Файл Опис РозмірФормат 
example_masking.pdf224,94 kBAdobe PDFПереглянути/відкрити


Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.