scholarly journals An analysis of the possibility of realization steganography in C#

2021 ◽  
Vol 21 ◽  
pp. 383-390
Author(s):  
Piotr Pawlak ◽  
Jakub Podgórniak ◽  
Grzegorz Kozieł

The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the analysis of the possibility of implementing digital images steganography with the use of the C # programming language. Firstly, existing libraries and mathematical transformations which can help with performing steganography were found. Also, own code solutions were implemented. In order to objectively evaluate the methods of data hiding, the parameters describing the degree of distortion of transforms and hidden images were calculated. Subsequently, optimal solutions for specific problems were identified and demonstrational data hiding was performed. Based on the obtained results, it can be concluded that it is possible to successfully implement steganography in the C # language. There are many ready-made libraries and tools, the effectiveness of which has been verified in the conducted analysis. Due to the contradictory of stenographic requirements, it is not possible to meet all of them optimally, i.e. undetectability, resistance to destruction and information capacity. For this reason, it is not possible to clearly indicate the best solutions. In order to achieve satisfactory results, one should look for compromises between the set requirements.

2013 ◽  
Vol 380-384 ◽  
pp. 1734-1737
Author(s):  
Xiang Ping Xiao

As its international status, mastering C programming language is very important, for example the java language, popular and widely used at present, which has all kinds of connections with C programming language. In the C language, the bubbling sort, which has the knowledge of the cycle and array, has been seen as classic examples to explain, and also is used in a variety of computer exams. One important reason is the bubbling sort itself more classic; another is that it is not easy for students to grasp and understand the bubbling sort. This paper will explore a new teaching method--introduction of mathematical thought--to help students to understand and master the bubbling sort.


2020 ◽  
Vol 30 (3) ◽  
pp. 28-33 ◽  
Author(s):  
S. A. Pryadko ◽  
A. Yu. Troshin ◽  
V. D. Kozlov ◽  
A. E. Ivanov

The article describes various options for speeding up calculations on computer systems. These features are closely related to the architecture of these complexes. The objective of this paper is to provide necessary information when selecting the capability for the speeding process of solving the computation problem. The main features implemented using the following models are described: programming in systems with shared memory, programming in systems with distributed memory, and programming on graphics accelerators (video cards). The basic concept, principles, advantages, and disadvantages of each of the considered programming models are described. All standards for writing programs described in the article can be used both on Linux and Windows operating systems. The required libraries are available and compatible with the C/C++ programming language. The article concludes with recommendations on the use of a particular technology, depending on the type of task to be solved.


Author(s):  
Miroslava Mihajlov Carević ◽  
Miloš Ilić ◽  
Milena Petrović ◽  
Nebojša Denić

In this paper we deal with a method for the determination of numbers in a Pascal triangle that are simultaneously triangular, tetrahedral and pentaedroidni. The collected results, obtained by mathematical analysis, were verified by computer. For this purpose, we used the C# programming language as well as the computer laboratory within our University in order to test the results. The results collected by computer confirmed the accuracy of the results obtained by mathematical analysis.


Sign in / Sign up

Export Citation Format

Share Document