224 research outputs found

    A Modified Method of Encrypting Test Data with Elliptic Curves Using a Unique Alphabetic Key String

    Get PDF
    In the paper presents the mathematics of elliptic curves. As well as the derivation of addition formulas and doubling elliptic points. A description of the encryption and decryption algorithm is presented. The work of the developed program based on the mathematics of elliptic curves in the console is shown

    Designing the Graphic Interface of the System for Covering Information Based on Discrete Transformations by Means of Koh and Zhao Algorithm

    Get PDF
    This article discusses the design of a graphical interface system for hiding information based on discrete transformations using the Koch and Zhao algorithm. The degree of suitability of the container for modification, modeling attacks and determining resistance to them have been analyzed

    Designing Gui System for Hiding Information Based on a Consistent Algorithm of Steganography

    Get PDF
    This article discusses designing the GUI system for hiding information based on a consistent algorithm of steganography. The degree of suitability of containers for modifications is analyzed. The description of modeling scams, resiliency and determination of algorithm’s efficiency is done

    Designing Gui System for Hiding Information Using Hyperbolic Functions

    Get PDF
    This article discusses designing the GUI system for hiding information using hyperbolic functions. The analysis of the degree of suitability of a container for modifications, modeling and determination of resistance to them

    Developing a System for Hidden Information Using a Transposition Cipher

    Get PDF
    This article discusses: an algorithm for hiding data using a permutation cipher and the main functions of the developed software product

    Development of a System for Hidden Information in a Sound Environment

    Get PDF
    This article discusses various algorithms for hiding information in a sound environment and their advantages. In the course of research, the optimal version of the algorithm has been chosen
    corecore