Компоненты, модули, шаблоны и другие Расширения Joomla

UDC: 004.42

STEGANOGRAPHIC METHOD OF PROTECTING TEXT INFORMATION

Komilov O.O., Rustamova H.R.

Tajik National University

The problem of protecting information from unauthorized access arose in ancient times, and the emergence of the Internet and the formation of information and social networks made this problem even more real or important.

Today, there are several classical and modern methods of data protection, but for reliable protection it is recommended to use only these methods together.

Depending on the possibility of violating the security of information systems, physical, administrative and software, coding and legal methods of protection are used. Along with a reliable method of protecting information - encryption, there is also a steganographic method. If encryption hides information available or transmitted via a message from an outsider [1], the steganographic method, in turn, ensures the secret transfer of information, keeping the fact of transfer secret [2]. Such steganosystems are actively used to solve the following main tasks: protecting confidential information from unauthorized access, protecting intellectual property rights, eliminating monitoring and management systems of network resources [3].

Steganography (translated from Greek as “secret writing”) is a technology used to hide certain files inside other files, such as images, text, video or files of other formats. That is, in steganography, the transmitted information has no value, but contains secret information. Thus, steganography allows you to transmit important information over an open line, while the proof of its transmission is hidden, that is, it hides its existence. In fact, steganography is usually used in combination with encryption methods to ensure the confidentiality of information [4]-[5].

The purpose and objective of the work is to describe and consider the steganographic method of information protection, analyze the principle of operation of this method and, using the example of a programming language, create a practical steganographic program.

Information is an object of storage, transmission and transformation and is used for certain purposes. Any valuable information needs protection. It is not without reason that information protection is one of the most important issues in modern information systems.

The role of the Internet in ensuring security and implementing information and communication technologies is considered an important issue [6]. Indeed, after the emergence of such a computer network, the issue of information security has become very relevant. With the advent and development of digital computing technology, the issue of protecting data privacy and copyright from unauthorized access arose.

With the advent and direct application of network technologies, the number of malicious programs, data theft and other negative situations has increased. In such conditions, to maintain a computer system in working order, it is necessary to protect it from viruses, carry out secure encryption operations, use special protection programs, basic knowledge and qualified specialists. On the other hand, the demand for both basic knowledge and specialists in this field is growing.

Information security

Information security is an organized technical activity aimed at preventing risks that ultimately lead to disruption of computer systems, the rights of citizens, organizations or the state to receive information [5].

The problem of protecting information from unauthorized access arose much earlier than people had the desire to keep information secret. It can be said that the issue of information security arose from the day people became literate [7], [8].

Information acquired its significance along with the formation of human society, the emergence of private property, forms of statehood, the struggle for power and the development of human activity.

Nowadays, with the development of information technologies and computer systems, even people's lives have become dependent on ensuring the protection of information in computer systems. Examples of such objects are information and communication systems, banking systems, nuclear power plants, air and land transport control systems. For the stable and correct functioning of these systems, it is necessary to properly ensure their security.

Main objects of information protection

Information resources representing information related to secret information or state secrets are recognized as the main objects of information protection.

Information security threat

A threat to information security is recognized as movements or events that lead to unauthorized use, damage to information resources and software and hardware.

An attempt to violate the security of a computer system or network can be understood as a threat to computer information or a threat to a network. In general, in this case, a set of information from any source or any file is considered, subject to transfer to the destination. The transfer of information and the types of its violations are presented in Figure 1.

Figure 1. Displaying the encrypted text

Steganographic protection of information

On the website of the free encyclopedia Wikipedia, the concept of steganography is defined as a "secret line" and is considered one of the methods of transmitting and storing secret information. This term was first used in 1499 by Johannes Trithemius, the author of the first coding method using the algebraic method when applying non-associative structures - quasigroups [1], [9] in his treatise "Steganography".

Figure 2. Information from the Wikipedia website

If encryption hides the text of secret information, steganography hides the existence of the information itself. Information in steganography is presented in the form of a picture, an article, a shopping list, a letter, or "sudoku" (a digital table game). Steganography is used together with encryption methods and thus complements them. The advantage of steganography is that the information does not attract the reader's attention.

 

Figure 3. Steganography in practice

Both the steganography method and the encryption method must be used to conceal the transmitted information containing plain text. While steganography methods keep the fact of the information's existence secret, encryption methods make the text of the information incomprehensible to outsiders using various transformations.

Wikipedia also notes that the Sumerians[1] were among the first to use steganography. Mud tablets with inscriptions were found under a layer of dirt.

One of the most common forms of steganography can be word-letter mapping. They primarily reflect the plaintext, so that the text represents specific information to be encrypted. For example, encrypted information is displayed with the first letters of each plaintext word. Figure 4 shows an example of transferring secret information to a set of plaintext words.

Figure 4. An example of steganography in a table

Directions of steganography

In the 90s of the 20th century, several directions of steganography were defined:

  • classical steganography;
  • computer steganography;
  • numerical steganography.
  1. One of the most popular methods of classical steganography is the use of invisible colors. Text written in such colors can be read only in special cases (with heating or lighting). This method appeared around the 1st century BC and is still used today. For example, while in prison, V. I. Lenin wrote his revolutionary ideas in milk between the lines of the letter, which became visible when the letter was heated.
  2. Computer steganography as a direction of classical steganography is created on the basis of specific characteristics of computers and their factor system [3]. For example, the steganographic file system StegFS was developed for the Linux operating system [10]. Computer steganography can also include audio steganography, which was developed as a steganographic method of hiding information in the audio environment. It is noted that the human auditory system operates in a special dynamic range and there is a wide space for hiding information in audio files [11].

In the scientific work of N.O. Pryanichnikova [12], the topic of digital encoding of speech information in a steganographic algorithm was analyzed. In it, the author explores the theoretical concepts of steganography and discusses the main features of hiding secret attachments of audio files.

  1. Numerical steganography is one of the directions of classical steganography and is expressed on the basis of hiding or adding additional information to digital objects. These objects are multimedia objects (image, video, sound, 3D objects). As a result of the image of these objects, additional reflections appear (noise, nonlinear distortions of the equipment), and the main information becomes invisible.

The steganographic method has disadvantages compared to the encryption method. Although the mentioned method is effective, hiding several bits of information is expensive.

Use of steganography in practice

Today, steganography is mainly used in the computer industry, where digital data serves as a carrier of information, and networks serve as high-speed channels for its transmission. It is also used for unauthorized access in cyber attacks, phishing sites (phishing is a common online fraud method used by hackers to gain access to personal information) and fake online stores (Fig. 5).

Figure 5. An example of a phishing website that has nothing to do with the Chrome browser

Attackers can use steganography to embed malicious information into seemingly harmless files. Since steganography requires serious effort and skill, it is usually used by experienced attackers with specific goals.

Development of a program for encrypting information using the steganographic method.

Using the environment of a visual programming language, it is now very easy and simple to implement the steganographic method. For example, Golovchenko O. N. and Oganyan R. G. [14] developed a practical application in the C# programming language, which uses the encryption method using steganography. In it, a bmp graphic file is encrypted by knowing and entering the key text by the user (Fig. 6).

Figure 6. Steganographic coding

In this work, using the Embarcadero Delphi 2010 programming language, the authors developed an example of a steganographic program in which the presence of secret text is hidden using an image. The program uses several common working components, such as: TLabel, TButton, Tedit and TImage, and also shows the ability to process files [15]. The result of its work is presented below.

NOTE. For security and copyright reasons, the program text is not provided.

In the built-in steganographic program, the secret text becomes invisible and can only be seen by carefully reading each existing symbol or number in the first method (Fig. 7). In the second method, only when the mouse pointer is moved to a certain position, the secret text will be displayed (Fig. 8-9).

 

Figure 7. Importing and encryption of plain text

Figure 8. Encrypted plain text

Figure 9. Reflection of encrypted text

 

  REVIEWER:  Qosimov I.P.,

Candidate of Technical Sciences,

Associate Professor

 

REFERENCES

  1. Komilov O.O. On the Application of Quasigroups in the Trithemius Cipher. / O.O. Komilov // Bulletin of the Tajik National University. Series of Natural Sciences. - 2017. No. 1-5. – Pр.128-133.
  2. Zavyalov S.V. Steganographic Methods of Information Security. Tutorial / S. V. Zavyalov, Yu.V. Vetrov // - St. Petersburg: Publishing House of the Polytechnic University, 2012. – 190 р.
  3. Konakhovich G.F. Computer Steganography. Theory and Practice. Textbook / G. F. Konakhovich // - K.: "MK-Press", 2006. – 288 р.
  4. Ryabko B. Ya. Fundamentals of Modern Cryptography and Steganography. - 2nd ed. / B.Ya. Ryabko, A.N. Fionov // - M.: Hotline - Telecom, 2013. – 232 р.
  5. Ashurov Kh.M. Amniyati ittilooti. Dasturi method. / HM. Ashurov, O.O. Komilov, R. Olimshoev // - Dushanbe; “Er-graf”, 2018. – 113 р.
  6. Kamiliyan F.S. The role of the Internet and modeling methods in ensuring the safety of social networks. / F.S. Perfections. // Materials of the 12th international scientific-practical conference on "Modern issues of mathematical modeling and its application", dedicated to "2020-2040 announcement of 20 years of study and development of natural, exact and mathematical sciences in the field of science and education" and "75th anniversary of the National University of Tajikistan" Dushanbe, May 18, 2024. – Pр. 3-11.
  7. Simon Singh. Code book. The secret history of ciphers and their decryption. / S. Simon // AST, Astrel, 2007. – 446 р.
  8. Komilov O.O. Application of the mapping, modulo comparison and frequency analysis in cryptography. / O.O. Komilov O.O., Kh.M. Ashurov H.M., E.H. Djumaev // Bulletin of the Tajik National University. Series of natural sciences. -2017. 1/1. – Pр.84-90.
  9. Tabari A. H. Isotopy and autotopy of 5-th order diassociative quasigroups. / A. H. Tabari, O. O. Komilov. // Bulletin of the Tajik National University. Series of natural sciences. 2021. No. 1. – Pр.89-101.
  10. Konakhovich G. F. Computer steganography. Theory and practice. Book. / G. F. Konakhovich, A. Yu. Puzyrenko // K.: MK-Press, 2006. – 288 р.
  11. Pererva S. O. Review of audio steganography methods. / Pererva S.O., Trifonova E.A. // Magazine. Current scientific research in the modern world. Public organization "Institute of Social Transformation". No.: 4-2 (60). 2020. – Pр.75-78
  12. Pryanichnikova N.O. Digital coding of audio signals in steganography algorithms. / N. O. Pryanichnikova // Penza State University. Bulletin of science. No 6 (63). - 2023. – Pр.420-425
  13. Gorbatyuk T. I. Methods of linguistic steganography. / T. I. Gorbatyuk, K. A. Trifonova // Current scientific research in the modern world. Public organization "Institute of Social Transformation". No.: 5-1 (73). 2021. – Pр.143-145
  14. Golovchenko O. N. Cryptographic protection by steganography. / O. N. Golovchenko, R. G. Oganyan // Integration of sciences. Founders: Scientific and Publishing Center "Empire". No. 8 (23). 2018. – Pр.391-393
  15. Ashurov H.M. Istifodai tipi satri dar zaboni programmosozii Delphi 2010. Vasoiti talimī. / H. M. Ashurov, O. O. Komilov // Dushanbe: Andaleb-R, 2015. – 84 р.

 

STEGANOGRAPHIC PROTECTION METHOD

TEXT INFORMATION

             The topic of this article is devoted to one of the modern methods of information protection – the steganographic method of information protection. The use of this method, as well as the method of information encryption, has become very significant today with the use of information technologies. The purpose and objective of the work is to describe and consider the steganographic method of information protection, analyze the principle of operation of this method and, using the example of a programming language, create applications based on the steganographic method. The article provides brief information about the concept of information security, and also notes that the Internet and information networks play an important role in ensuring the security and application of information and communication technologies and are considered an important problem of our time. Also, as an example, the work of a practical protection program using the steganographic method, developed in the Visual C# programming language environment, is shown. The authors have developed a program for protecting text information using the steganographic method. When developing the security program, the authors used the Embarcadero Delphi 2010 programming language environment. It hides the presence of secret text using an image. The program uses several working components, such as: TLabel, TButton, Tedit and TImage, and also provides the ability to process files. It is noted that information protected by the steganographic method has a low probability of disclosure of the text transmission.

             Keywords:  information security, steganography, encryption, hacker, unauthorized access, phishing, Delphi 2010 programming language environment.

          Information about authors: Komilov Okil Odilovich - Tajik State University, candidate of physical and mathematical sciences, associate professor of the department of informations and communications tehnology. Address: 734025, Republic of Tajikistan, Dushanbe, Rudaki Ave., 17. Phone: (+992) 92-828-12-21. E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

          Rustamova Khurshedabonu Rakhimovna - Tajik State University, candidate of economic sciences, associate professor, head of the department of information and communication technology of the faculty of mechanics and mathematics of. Address: 734025, Republic of Tajikistan, Dushanbe city, Rudaki Avenue, 17. Phone: (+992) 935-75-44-77. E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it..

Article received 22.04.2024

Approved after review 03.06.2024

Accepted for publication 23.09.2024

 

[1] Sumer was an ancient people who lived in the southern part of Mesopotamia (southern Iraq). In the 4th and 3rd millennia BC, civilization - written culture appeared in them. https://ru.wikipedia.org/wiki/Steganography

   
© Tajik National University