Aplikimi i teknikës së steganografisë në harta gjeologjike
Abstrakti
Të dhënat e ndjeshme nga studimet gjeologjike, si përshembull informacione mbi vendndodhjen e burimeve të pasura minerale mund të fshihen brenda hartës për t'u mbrojtur nga persona të paautorizuar. Ky artikull paraqet aplikimin e teknikës së steganografisë në hartë nëpërmjet një programi të quajtur MapSpace. Qëllimi është të ofrojë një mënyrë sa me të sigurt për të mbrojtur, menaxhuar dhe për të deshifruar të dhënat e përdoruesve të aplikacionit nëpërmjet imazheve. Përdorimi i steganografisë në hartë siguron që informacioni të jenë i padukshëm për të tjerët, ndërsa aftësia për ta menaxhuar dhe për ta lexuar atë brenda programit siguron një përvojë të sigurt për aplikuesit. Rezultati është harta e gjeneruar nga programi pa asnjë ndryshim të dukshëm në rezolucion nga origjinali.
Fjalët kyçe:
bazë të dhënash, steganografia, hartë, fshehje, të dhënatShkarkimet
References
-
Provos, N., & Honeyman, P. (2003, June). "Hide and seek: An introduction to steganography." Privacy, 1(3), 32-44.
-
Giarimpampa, D. (2019). Least significant bit steganography method for the digital data protection in the barcode. AIP Conference Proceedings, 2169(1), 040009. DOI: [DOI]https://pubs.aip.org/aip/acp/article/2169/1/040009/611081/Least-significant-bit-steganography-method-for-the
-
Singh, A., & Kaur, A. (2019). "Spread spectrum image steganography." Retrieved from https://www.researchgate.net/publication/5583605_Spread_spectrum_image_steganography
-
“Blind Image Steganalytic Optimization by using Machine Learning”. Halmstad 2018-08-05 Despoina Giarimpampa https://www.divaportal.org/smash/get/diva2:1255395/FULLTEXT01.pdf
-
“IMAGE STEGANOGRAPHY APPLICATIONS FOR SECURE COMMUNICATION” by Tayana Morkel, May 2012
-
https://repository.up.ac.za/bitstream/handle/2263/29906/dissertation.pdf?sequence=1&isAllowed=y
-
“Trithemius, Johannes”, January 2017. DOI:10.1007/978-3-319-02848-4_570-1 In book: Encyclopedia of Renaissance Philosophy (pp.1-3)
-
https://www.researchgate.net/publication/314136305_Trithemius_Johannes
-
”Using Artificial Intelligence Approaches for Image Steganography: A Review”. April 2020. DOI:10.1007/978- 981-15-3075-3_16. In book: Internet of Things—Applications and Future (pp.239-247) https://www.researchgate.net/publication/340422624_Using_Artificial_Intelligence_Approaches_for_Image_Stegan ography_A_Review
-
“Steganography Method Implementaiton in Computer Science”. November 2021
-
“Image Steganography in Cryptography”. 22 Aug, 2023 https://www.geeksforgeeks.org/image-steganography-in-cryptography/
-
“LSB++: An improvement to LSB+ steganography”. November 2011. DOI:10.1109/TENCON.2011.6129126 https://www.researchgate.net/publication/241634241_LSB_An_improvement_to_LSB_steganography
References
Provos, N., & Honeyman, P. (2003, June). "Hide and seek: An introduction to steganography." Privacy, 1(3), 32-44.
Giarimpampa, D. (2019). Least significant bit steganography method for the digital data protection in the barcode. AIP Conference Proceedings, 2169(1), 040009. DOI: [DOI]https://pubs.aip.org/aip/acp/article/2169/1/040009/611081/Least-significant-bit-steganography-method-for-the
Singh, A., & Kaur, A. (2019). "Spread spectrum image steganography." Retrieved from https://www.researchgate.net/publication/5583605_Spread_spectrum_image_steganography
“Blind Image Steganalytic Optimization by using Machine Learning”. Halmstad 2018-08-05 Despoina Giarimpampa https://www.divaportal.org/smash/get/diva2:1255395/FULLTEXT01.pdf
“IMAGE STEGANOGRAPHY APPLICATIONS FOR SECURE COMMUNICATION” by Tayana Morkel, May 2012
https://repository.up.ac.za/bitstream/handle/2263/29906/dissertation.pdf?sequence=1&isAllowed=y
“Trithemius, Johannes”, January 2017. DOI:10.1007/978-3-319-02848-4_570-1 In book: Encyclopedia of Renaissance Philosophy (pp.1-3)
https://www.researchgate.net/publication/314136305_Trithemius_Johannes
”Using Artificial Intelligence Approaches for Image Steganography: A Review”. April 2020. DOI:10.1007/978- 981-15-3075-3_16. In book: Internet of Things—Applications and Future (pp.239-247) https://www.researchgate.net/publication/340422624_Using_Artificial_Intelligence_Approaches_for_Image_Stegan ography_A_Review
“Steganography Method Implementaiton in Computer Science”. November 2021
“Image Steganography in Cryptography”. 22 Aug, 2023 https://www.geeksforgeeks.org/image-steganography-in-cryptography/
“LSB++: An improvement to LSB+ steganography”. November 2011. DOI:10.1109/TENCON.2011.6129126 https://www.researchgate.net/publication/241634241_LSB_An_improvement_to_LSB_steganography