Kompyuter tarmoqlarida uzatilayotgan axborotni kriptografik himoyalash usuli

Основное содержимое статьи

A.A. Ganiyev
O.N. Mavlonov
D.A. Shodmonov
J.I. Maxmudov

Аннотация

Mazkur maqolada Steganografik himoyadagi mavjud kamchiliklarni bartaraf etishda kriptografik himoya mexanizmlari ko‘rib chiqilgan. Steganografiyaning maqsadi maxfiy xabarlarni raqamli kontentlarga hech kim bunday xabarlar mavjudligini aniqlashga imkon bermaydigan tarzda yashirishdan iborat bo‘lib, u maxfiy xabarning tuzilishini o‘zgartirmasdan, maxfiy xabarni ochiq xabar tarkibiga yashiradi. Shuning uchun o‘zgarishni aniqlash murakkab  hisoblanadi. Steganografiya usulining bardoshligi ushbu usulning maxfiyligiga bog‘liq bo‘lib, stegotahlil usuli yashirish usulini aniqlashni maqsad qiladi. Steganografik himoyadagi mavjud kamchiliklarni bartaraf etishda kriptografik himoya mexanizmlaridan foydalanish mumkinligini inobatga olgan holda kriptografik-staganografik himoyalash usuli taklif etilgan, ushbu usul asosida ishlab chiqilgan himoya mexanizmi to‘laqonli himoyani ta’minlashi isbotlandi.

Информация о статье

Как цитировать
Ganiyev, A., Mavlonov, O., Shodmonov, D., & Maxmudov, J. (2024). Kompyuter tarmoqlarida uzatilayotgan axborotni kriptografik himoyalash usuli. Международный Журнал Теоретических и Прикладных Вопросов Цифровых Технологий, 7(1), 73–79. https://doi.org/10.62132/ijdt.v7i1.166
Раздел
Articles

Библиографические ссылки

Karthikeyan B, Kosaraju A C and Gupta S 2016 March Enhanced security in steganography using encryption and quick response code In Wireless Communications, Signal Processing and Networking (WiSPNET), International Conference on (pp. 2308-2312) IEEE.

Pillai B, Mounika M, Rao P J and Sriram P 2016 September Image steganography method using K-means clustering and encryption techniques In Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on (pp. 1206-1211) IEEE.

Hingmire A, Ojha S, Jain C, Thombare K 2016 Image steganography using adaptive b45 algorithm combined with pre-processing by twofish encryption International Educational Scientific Research Journal 2 4.

L. M. Marvel, C. G. Boncelet and C. T. Retter, “Spread spectrum image steganography,” in IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075-1083, Aug. 1999, doi: 10.1109/83.777088.

Barhoom T S and Mousa S M A 2015 A Steganography LSB technique for hiding Image within Image Using blowfish Encryption Algorithm Int. J. Res. Eng. Sci, 3 61-66.

Thomas S E, Philip S T, Nazar S, Mathew A and Joseph N 2012, May Advanced cryptographic steganography using multimedia files In International Conference on Electrical Engineering and Computer Science (ICEECS-2012).

Almuhammadi S and Al-Shaaby A 2017 A survey on recent approaches combining cryptography and steganography Computer Science Information Technology (CS IT).

Pant, V.K.; Prakash, J.; Asthana, A. Three step data security model for cloud computing based on RSA and steganography. In Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Greater Noida, India, 8–10 October 2015; pp. 490–494.

Ganivev, Abduhalil, Obid Mavlonov, and Baxtiyor Turdibekov. "Improving data hiding methods in network steganography based on packet header manipulation." 2021 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2021.

Mavlonov O. Advancements in retransmission steganography: an enhanced algorithm and its steganalysis approaches //International Scientific and Current Research Conferences. – 2023. – С. 127-131.

Наиболее читаемые статьи этого автора (авторов)