Steganography and its Application Prospects in Information Protection
pdf (Georgian)

Keywords

Security
Information Protection
Steganography
Phyton

How to Cite

Beridze, B., & Donadze, M. (2025). Steganography and its Application Prospects in Information Protection. International Scientific-Practical Conference: „Modern Challenges and Achievements in Information and Communication Technologies“ Transactions, 4, 39-45. https://papers.4science.ge/index.php/mcaaict/article/view/361

Abstract

The paper discusses and characterizes computer steganography - as a creative and one of the promising components of information protection in the modern digital era. The paper describes the essence of steganography, provides its general characterization and presents the main concepts. The paper includes a detailed classification and analysis of computer steganography methods, including a comparison of digital steganography technologies LSB, DCT and Spread Spectrum. The practical part presents the software application "BSU_Stegano_v.1", which visually demonstrates the principles of steganographic methods. The paper aims to understand the perspectives of steganography, both in the context of legitimate uses and cybersecurity challenges, which contributes to improving data security practices.

pdf (Georgian)

References

Hassaballah, M., & Ali, A. A. (2020). Digital Media Steganography: Principles, Algorithms, and Advances. Academic Press

Wayner, P. (2008). Disappearing Cryptography: Information Hiding: Steganography and Watermarking (3rd ed.). Publisher Morgan Kaufmann

Fridrich, J. (2009). Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press.

Zhang, X., & Wang, S. (2006). Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Communications Letters, 10(11), 781-783

Holub, V., & Fridrich, J. (2012). Designing Steganographic Distortion Using Directional Filters. IEEE Workshop on Information Forensics and Security (WIFS), 234-239

Luo, W., Huang, F., & Huang, J. (2010). Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security, 5(2), 201-214.

Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image Steganography: A Review of the Recent Advances. IEEE Access, 9, 23409-23423.