Please use this identifier to cite or link to this item: https://evnuir.vnu.edu.ua/handle/123456789/21709
Title: Educational example of masking textual information in a photographic signal
Authors: Holovin, Mykola
Holovina, Nina
Bibliographic description (Ukraine): Holovin, M., & Holovina, N. (2022). Educational example of masking textual information in a photographic signal. ScienceRise: Pedagogical Education, (4(49), 24–28. https://doi.org/10.15587/2519-4984.2022.261051
Journal/Collection: ScienceRise: Pedagogical Education
Issue: 4(49)
Issue Date: 2022
Date of entry: 17-Jan-2023
Publisher: Journal «ScienceRise: Pedagogical Education»
Country (code): UA
Place of the edition/event: Journal «ScienceRise: Pedagogical Education»
ORCID Id: https://orcid.org/0000-0003-4516-4677
https://orcid.org/0000-0002-1152-1536
DOI: https://doi.org/10.15587/2519-4984.2022.261051
UDC: 004.72.056.52:003.27:004.438
Keywords: Python
Pillow
steganography
masking information in file
educational example
Page range: 24-28
Abstract: The paper presents a steganographic method of masking textual information in photo files. Concealment is implemented in Python. The introduction of individual letters of the text into the image is carried out by the method of "least signifi-cant bit". The program can be used for both educational and practical purposes. The Pillow graphics library was used to implement the program. This is not a specialized library for steganographic needs. The use of this library makes it possible to visualize the mechanism of hiding information in the lessons, while the conciseness of the program code gives the possibility to demonstrate it in the classroom setting. It is also important for educational purposes, that work-ing within the Pillow library allows you to see the state of an empty and filled container at the level of individual bits. To assess the practical value of the program, it was tested with texts of different lengths and with containers (photo-graphs) of various kinds. The experiment showed the correct reproduction of texts. Careful visual examination of the empty and correspondingly filled containers (photographs) revealed no differences or suspicions of text bookmarks. Of course, if the party who intercepted the masked message has guesses about how the text is hidden, then this text is easily revealed. Therefore, it is obvious, that the use of the program for practical purposes requires additional manipulations in the code, in particular related to the order of implementation of the text and the choice of location.It is also desirable to additionally encrypt the text with at least a simple method. Such encryption is possible with the usage of a separate program. Analysis of photographs and manipulation with them at the level of individualbits also has educational value in terms of disclosing a method of capturing the corresponding physical signal. The latter gives an explanation of the methods of encoding static images, noise level, the magnitude of the useful physical signal, and the limits of sensitivity of human vision
URI: https://evnuir.vnu.edu.ua/handle/123456789/21709
Content type: Article
Appears in Collections:Наукові роботи (FITM)

Files in This Item:
File Description SizeFormat 
example_masking.pdf224,94 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.