Software Implementation of Modified LSB Algorithm with Shamir`s Secret Sharing

2022;
: cc. 130 - 139
1
Lviv Polytechnic National University, Ukraine
2
Національний університет «Львівська політехніка», кафедра систем автоматизованого проектування

Today, it is often necessary to transmit a confidential message of a small volume, while the use of complex cryptographic systems is difficult for some reasons. One of these reasons is the impossibility of using reliable products, which, as a rule, are commercial and unavailable to the average computer user. In modern information society, many services are provided with the help of computer networks and information technologies. Information presented in digital form must be reliably protected from many threats: unauthorized access and use, destruction, forgery, leakage, violation of license agreements, disclaimer of authorship, etc. Information protection is extremely important in both commercial and government spheres. The issues of developing effective methods of protecting digital information, in particular methods of computer steganography and steganalysis, are relevant and important for the state and society. To achieve the goal, it is necessary to propose a method of increasing stego-resistance, determine the effectiveness of the created solution and analyze the obtained results. The object of research is the process of protecting information embedded in a graphic e-container. The subject of research is methods and algorithms of computer steganography and steganalysis for images. The research methods used in this work are based on steganographic algorithms.

  1. Sajid M. M. and Tanvir M. P. et al. (2019). “A Comparative Study of Recent Steganography Techniques for Multiple Image Formats”, Modern Education and Computer Science (MECS), pp. 1–20. DOI: 10.5815/ijcnis.2019.01.02.
  2. Mahdi M., Shafry M. M., Abass F. J., Sabah M. T. et al. (2018). “Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats”, International Journal of Engineering & Technology, pp. 3505-3514. DOI: 10.14419/ijet.v7i4.17294.
  3. Subramanian N., Elharrouss O., Al-Maadeed S. and Bouridane A. et al. (2021). “Image Steganography: A Review of the Recent Advances”. IEEE Explore. pp. 23409-23423. DOI: 10.1109/ACCESS.2021.3053998.
  4. Polinovskyi V.V., Korolyov V.Y., Gerasimenko V.A. and Gorinshtein M.L. et al. (2011). “Information technology for research methods steganography and steganalysis”. Interuniversity collection "Computer-integrated technologies: education, science, production" Lutsk, 2011. Issue No. 5. Available at: https://icyb180.org.ua/wp-content/uploads/2012/04/informatsiyna-tehnolog... (Accessed: 28 September 2022).
  5. A. Suresh, K.L. Shunmuganathan, et al. (2012). “Image Texture Classification using Gray LevelCo-Occurrence Matrix Based Statistical Features”. European Journal of Scientific Research. pp. 591-597. Available at: https://www.academia.edu/36645235/Image_Texture_Classification_using_Gra... (Accessed: 28 September 2022).
  6. T. Filler, J. Fridrich. et al. (2011). “Design of adaptive steganographic schemes for digital images”, in Electronic Imaging, Media Watermarking, Security, and Forensics: The International Society for Optical Engineering, San Francisco, CA, 2011, DOI: 10.1117/12.872192.
  7. C.-Y. Lin, S.-F. Chang et al. (1999). “Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process”.International Symposium on Multimedia Information Processing (ISMIP 99). Available at: https://www.ee.columbia.edu/ln/dvmm/publications/99/cylin-modelscan.pdf (Accessed: 28 September 2022).
  8. Vidhya R. and Brindha M. et al. (2018) “Polynomial Substitution based Image Encryption using Shamir Scheme”, Proceedings of International Conference on Computational Intelligence & IoT (ICCIIoT), pp. 311-314. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3355268 (Accessed: 28 September 2022).
  9. Hineman A. and Blaum M. et al. (2021). “An efficient implementation of the Shamir secret sharing scheme”, ArXiv, pp. 1-7. DOI: 10.48550/arXiv.2108.05982.
  10. D. Progonov. et al. (2021) “Detection Of Stego Images With Adaptively Embedded Data By Component Analysis Methods”, Advances in Cyber-Physical Systems, Vol. 6, Number 2, pp. 146-154, DOI: 10.23939/acps2021.02.146.