Proceedings of the XXth Conference of Open Innovations Association FRUCT (Apr 2024)

Selection and Substantiation of the System of Criteria for Evaluating the Effectiveness of Steganographic Methods of Hiding Information in the Image

  • Oleksandr Turovsky,
  • Olha Tkachenko,
  • Ghazwan Saleem Naamo Ghno,
  • Ansam Mohammed Abed

DOI
https://doi.org/10.23919/FRUCT61870.2024.10516392
Journal volume & issue
Vol. 35, no. 1
p. 763

Abstract

Read online

Background: Safe and discreet information transmission is essential as communication routes grow increasingly complex in the digital age. Steganography has been used to hide communication behind different media. Multimedia technology has increased interest in steganographic approaches, making computer steganography a distinctive information security subject. Objective: This study examines the growing importance of steganography in the digital age, highlighting its alignment with cryptography and the data security implications of current steganometers. Methods: Steganography's history and development and digital communication breakthroughs are thoroughly examined. Contemporary computer steganography methods and digital watermarks are compared. Steganography and cryptography are being examined to improve data security across digital platforms. Results: Steganographic techniques are used in many modern sectors, each with its own embedding needs. These approaches require a rigorous assessment mechanism due to their wide use. These findings emphasize the need to create and verify a thorough set of criteria to evaluate steganographic methods, particularly those used to hide information in photographs. Conclusion: Implementing steganography in the digital world, especially with encryption, might shape safe digital communication. An effective assessment system may optimize steganographic technique selection and refining, improving information security across domains.

Keywords