Software Implementation of Modified LSB Algorithm with Shamir`s Secret Sharing

Today, it is often necessary to transmit a confidential message of a small volume, while the use of complex cryptographic systems is difficult for some reasons. One of these reasons is the impossibility of using reliable products, which, as a rule, are commercial and unavailable to the average computer user. In modern information society, many services are provided with the help of computer networks and information technologies.

Efficiency Analysis of Wavelet Transform in Hidden Data Problems

Today embedding digital watermarks is one of the most effective means of protecting intellectual property. The paper made a comparative analysis of different wavelets, investigated under different coefficients of embedding and embedding in different sub bands for transformation methods for hidden data transmission using wavelets.

Методи виявлення стеганографічного приховання інформації в зображеннях

Стаття присвячена проблемі виявлення факту прихованої передачі інформації. Розглянуто і проаналізовано різні методи стеганоаналізу для графічних файлів.

Розроблення методики оцінювання важливості характеристик стеганографічних алгоритмів

In this paper the problem of estimating the importance of each of the characteristics of steganographic algorithms is solved. The resulting estimates are used in the analysis of the existing algorithms for information embedding and multiobjective choice of the best algorithm. The technique allows providing an equally weighted algorithms estimation, and also considers the importance of coefficients of characteristics.