Abstract
The paper discusses and characterizes computer steganography - as a creative and one of the promising components of information protection in the modern digital era. The paper describes the essence of steganography, provides its general characterization and presents the main concepts. The paper includes a detailed classification and analysis of computer steganography methods, including a comparison of digital steganography technologies LSB, DCT and Spread Spectrum. The practical part presents the software application "BSU_Stegano_v.1", which visually demonstrates the principles of steganographic methods. The paper aims to understand the perspectives of steganography, both in the context of legitimate uses and cybersecurity challenges, which contributes to improving data security practices.
References
Hassaballah, M., & Ali, A. A. (2020). Digital Media Steganography: Principles, Algorithms, and Advances. Academic Press
Wayner, P. (2008). Disappearing Cryptography: Information Hiding: Steganography and Watermarking (3rd ed.). Publisher Morgan Kaufmann
Fridrich, J. (2009). Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press.
Zhang, X., & Wang, S. (2006). Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Communications Letters, 10(11), 781-783
Holub, V., & Fridrich, J. (2012). Designing Steganographic Distortion Using Directional Filters. IEEE Workshop on Information Forensics and Security (WIFS), 234-239
Luo, W., Huang, F., & Huang, J. (2010). Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security, 5(2), 201-214.
Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image Steganography: A Review of the Recent Advances. IEEE Access, 9, 23409-23423.