Please use this identifier to cite or link to this item:
https://evnuir.vnu.edu.ua/handle/123456789/21709
Title: | Educational example of masking textual information in a photographic signal |
Authors: | Holovin, Mykola Holovina, Nina |
Bibliographic description (Ukraine): | Holovin, M., & Holovina, N. (2022). Educational example of masking textual information in a photographic signal. ScienceRise: Pedagogical Education, (4(49), 24–28. https://doi.org/10.15587/2519-4984.2022.261051 |
Journal/Collection: | ScienceRise: Pedagogical Education |
Issue: | 4(49) |
Issue Date: | 2022 |
Submitted date: | 2022 |
Date of entry: | 17-Jan-2023 |
Publisher: | Journal «ScienceRise: Pedagogical Education» |
Country (code): | UA |
Place of the edition/event: | Journal «ScienceRise: Pedagogical Education» |
ORCID Id: | https://orcid.org/0000-0003-4516-4677 https://orcid.org/0000-0002-1152-1536 |
DOI: | https://doi.org/10.15587/2519-4984.2022.261051 |
UDC: | 004.72.056.52:003.27:004.438 |
Keywords: | Python Pillow steganography masking information in file educational example |
Page range: | 24-28 |
Abstract: | The paper presents a steganographic method of masking textual information in photo files. Concealment is implemented in Python. The introduction of individual letters of the text into the image is carried out by the method of "least signifi-cant bit". The program can be used for both educational and practical purposes. The Pillow graphics library was used to implement the program. This is not a specialized library for steganographic needs. The use of this library makes it possible to visualize the mechanism of hiding information in the lessons, while the conciseness of the program code gives the possibility to demonstrate it in the classroom setting. It is also important for educational purposes, that work-ing within the Pillow library allows you to see the state of an empty and filled container at the level of individual bits. To assess the practical value of the program, it was tested with texts of different lengths and with containers (photo-graphs) of various kinds. The experiment showed the correct reproduction of texts. Careful visual examination of the empty and correspondingly filled containers (photographs) revealed no differences or suspicions of text bookmarks. Of course, if the party who intercepted the masked message has guesses about how the text is hidden, then this text is easily revealed. Therefore, it is obvious, that the use of the program for practical purposes requires additional manipulations in the code, in particular related to the order of implementation of the text and the choice of location.It is also desirable to additionally encrypt the text with at least a simple method. Such encryption is possible with the usage of a separate program. Analysis of photographs and manipulation with them at the level of individualbits also has educational value in terms of disclosing a method of capturing the corresponding physical signal. The latter gives an explanation of the methods of encoding static images, noise level, the magnitude of the useful physical signal, and the limits of sensitivity of human vision |
URI: | https://evnuir.vnu.edu.ua/handle/123456789/21709 |
Content type: | Article |
Appears in Collections: | Наукові роботи (FITM) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
example_masking.pdf | 224,94 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.