Software Development for Steganographic Information Hiding in Images Using the Cryptography Library
Students Name: Balian Roman Ivanovych
Qualification Level: master (ESP)
Speciality: Telecommunications and Radio Engineering
Institute: Institute of Information and Communication Technologies and Electronic Engineering
Mode of Study: full
Academic Year: 2024-2025 н.р.
Language of Defence: англійська
Abstract: Security and Privacy of Information have always played an important role in society, especially now, in the age of rapidly developing information technologies. Laws in most countries pay special attention to the protection of personal data and the confidentiality of communication. In this context, methods of hidden information transmission, such as steganography, are becoming more relevant. Unlike cryptography, steganography hides the very fact that a message is being sent, not just its content. This makes it a valuable tool in situations where it is important to hide that communication is happening at all. One of the most popular media for steganography is digital files—such as images or audio—that represent natural processes. These files often contain extra (redundant) data from digitization and encoding processes, which can be used to hide messages. The topic of this master’s thesis is the development of steganographic software that hides information in images using the Cryptography library for encryption. The first chapter describes the cryptographic algorithms used, especially AES (Advanced Encryption Standard), and how it works together with a steganographic method based on LSB (Least Significant Bit) modification. This method changes the smallest bit of each image pixel to embed hidden data. The chapter also explains how LSB works, its pros and cons, and why AES was chosen to encrypt the message before hiding it in the image, improving overall security. The second chapter focuses on the tools used to build the software. Special attention is given to the Cryptography library and examples of its functions. It also describes image file formats used as containers for hidden data. The chapter ends with a diagram of the program’s functionality, showing how embedding and extracting information works. The third chapter explains the actual software implementation and presents experimental results. It includes a block diagram of the overall program structure. The chapter also describes how the PyQt library was used to create a user-friendly graphical interface, and it explains key parts of the Python code. The results of software testing are discussed, along with possible improvements and future development ideas. The fourth chapter presents an economic analysis. It includes a cost calculation for the research and development process (R&D), taking into account salaries and resources. The chapter also estimates the project cost and possible profit from using the software. In addition, it assesses the scientific and technical value of the developed solution. As a result of this master’s thesis, software was created for hiding information in images using the Cryptography library. The product combines LSB steganography with AES encryption, increasing the security of hidden data. Experiments confirmed that the program works effectively. The economic analysis showed that the project is potentially cost-effective. Object of the study – steganography. Subject of the study – software for hiding data in images using the Python Cryptography library. Research area – development and analysis of steganographic methods for hiding information in digital images using cryptographic algorithms to enhance confidentiality. Purpose of the work – development of software for steganographic data hiding in images using the Cryptography library. Keywords: steganography, data hiding, digital images, cryptography, Cryptography library, AES, LSB, software. References 1. Paar, C., & Pelzl, J. Understanding Cryptography: A Textbook for Students and Practitioners [Electronic resource]. Berlin: Springer, 2010. – 372 p. Available at: https://gnanavelrec.wordpress.com/wpcontent/uploads/2019/06/2.understandingcrypt ography-by-christof-paar-.pdf 2. Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C [Electronic resource]. 2nd ed. New York: Wiley, 1996. – 784 p. Available at: https://mrajacse.wordpress.com/wp-content/uploads/2012/01/applied-cryptography- 2nd-ed-b-schneier.pdf 3. Stallings, W. Cryptography and Network Security: Principles and Practice [Electronic resource]. 7th ed. Boston: Pearson, 2017. – 752 p. Available at: https://www.uoitc.edu.iq/images/documents/informatics- institute/Competitive_exam/Cryptography_and_Network_Security.pdf