Issue |
E3S Web of Conf.
Volume 458, 2023
International Scientific Conference Energy Management of Municipal Facilities and Environmental Technologies (EMMFT-2023)
|
|
---|---|---|
Article Number | 09027 | |
Number of page(s) | 7 | |
Section | IT and Mathematical Modeling in Energy Systems | |
DOI | https://doi.org/10.1051/e3sconf/202345809027 | |
Published online | 07 December 2023 |
The principles of building a parallel program for steganographic file protection
1 Kazan National Research Technical University named after A. N. Tupolev – KAI, Kazan, Russia
2 Kazan State Power Engineering University, Kazan, Russia
3 Kazan Federal University, Kazan, Russia
4 Kazan National Research Technological University, Kazan, Russia
* Corresponding author: marat_nu1@mail.ru
In the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms. This paper delves into the potential of steganography as a robust tool for ensuring confidentiality by embedding data covertly within other files. Recognizing the limitations of traditional steganographic techniques in the face of expansive contemporary data sets, the paper explores the amalgamation of parallel programming with steganographic processes. Such a fusion promises to distribute computational tasks effectively, thereby reducing the overall execution time. Detailed discussions underscore the significance of data decomposition, process synchronization, and thread coordination, illustrating how parallel algorithms can markedly expedite concealed data embedding and extraction. However, inherent challenges like minimizing thread communication, optimizing shared data access, and preventing race conditions are brought to the fore. Solutions are proposed through diverse methods, tools, and design strategies aimed at streamlining workload distribution and enhancing task execution. In conclusion, the paper emphasizes that blending steganography with parallel programming can potentially revolutionize data protection systems, with continual refinements in techniques and methods driving the domain towards offering more potent solutions for electronic data confidentiality and security.
© The Authors, published by EDP Sciences, 2023
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.