INTEGRATED ENCRYPTION-STEGANOGRAPHY PROTECTION OF MULTIMEDIA CONTENT AND DATA IN E-LEARNING SISTEMS

Main Article Content

Inna ROZLOMII
Andrii YARMILKO

Abstract

Introduction. The article focuses on the modern research and the practice of using
information security tools in e-learning systems. It has been noted that, in most cases, e-learning
systems ensure the confidentiality and addressability of information processes and the security of
educational materials when using open communication channels. However, a comprehensive
approach to e-learning systems protection needs to be better researched.
Purpose. Developing a data and multimedia content protection method in e-learning systems
using an integrated cryptographic-steganographic approach.
Methods. Steganography, cryptography.
Results. The strengthening of data and multimedia content protection in e-learning systems was
proposed using an integrated cryptographic-steganographic approach. This method applies the digital
watermark construction algorithm based on matrix cryptographic transformation operations. The
complex application of two protection methods is aimed at increasing the steganographic stability of
the digital watermark embedding algorithm by complicating the task of selecting the bit inversion
parameter in the bytes intended for embedding identification features. An additional protective effect
is provided by the non-obviousness of the choice of the byte in the file container for embedding a
digital watermark and the possibility of their identification only using cryptographic procedures by
authorized users. This approach is productive in forming a trust strategy in online materials and
remote activities in the educational field. Incorporating the proposed security mechanisms into
existing and developing e-learning systems is offered by snippets or plugins adding.
Conclusion. The practical implementation of software tools according to the developed method
should contribute to the increase of trust between the participants of the e-learning system due to the
possibility of identifying stolen or compromised ideas and innovations in the content of the
educational resources, fixing the status of compromised users among both students and teachers.

Article Details

How to Cite
ROZLOMII, I., & YARMILKO , A. (2022). INTEGRATED ENCRYPTION-STEGANOGRAPHY PROTECTION OF MULTIMEDIA CONTENT AND DATA IN E-LEARNING SISTEMS. Cherkasy University Bulletin: Applied Mathematics. Informatics, (1). https://doi.org/10.31651/2076-5886-2022-1-50-61
Section
Інформатика
Author Biographies

Inna ROZLOMII, Bohdan Khmelnytsky National University of Cherkasy

Ph. D., Senior Lecturer, Bohdan Khmelnytsky National University of Cherkasy

Andrii YARMILKO , Bohdan Khmelnytsky National University of Cherkasy

Ph. D., Ass. Prof., Docent, Bohdan Khmelnytsky National University of Cherkasy

References

Shahmoradi, L., Changizi, V., Mehraeen, E., Bashiri, A., Jannat, B., & Hosseini, M. (2018). The

challenges of E-learning system: Higher educational institutions perspective. Journal of education and

health promotion, 7.

Masud, M. A. H., & Huang, X. (2012). An e-learning system architecture based on cloud

computing. International Journal of Information and Communication Engineering, 6(2), 255-259.

Zuev, V. I. (2012). E-learning security models. Management Information Systems, 7(2), 024-028.

Aljawarneh, S. (2011). A web engineering security methodology for e-learning systems. Network

Security, 2011(3), 12-15.

Hasan, S. H., Alghazzawi, D. M., & Zafar, A. (2014). E-Learning systems and their Security. BRIS

Journal of Adv. S & T (ISSN. 0971-9563) vol, 2, 83-92.

Riahi, G. (2015). E-learning systems based on cloud computing: A review. Procedia Computer

Science, 62, 352-359.

Banerjee, S., & Karforma, S. (2017). Object oriented modeling for authentication of certificate in elearning

using digital watermarking. International Journal of Advanced Research in Computer

Science, 8(8).

Al-Ajlan, A. S. (2014). E-Learning Certificate Using Digital Watermarking Technology. IOSR J.

Comput. Eng, 16(4), 81-93.

Banerjee, S., & Karforma, S. (2016). Authentication of certificate in e-learning using secret key digital

watermarking. International Journal of Information Science and Computing, 3(2), 53-58.

Ghobadi, A. R., Boroujerdizadeh, A., Yaribakht, A. H., & Abd Manaf, A. (2012, September). How

watermarking secures e-learning system. In 2012 International Conference on E-Learning and ETechnologies

in Education (ICEEE) (pp. 99-104). IEEE.

Heniedy, H. S., Ouda, O. M., & Khozium, M. O. (2020). Sequring the e-learning materials using digital

watermarking approach. Vol.9, No, 11, pp.1559-1563, November, 2020.

Zemtsov, A. (2020, November). Data Protection of Multimedia Content for E-Learning Using Discrete

Wavelet Transform. In 8th Scientific Conference on Information Technologies for Intelligent Decision

Making Support (ITIDS 2020) (pp. 268-273). Atlantis Press.

Evsutin, O., Melman, A., & Meshcheryakov, R. (2020). Digital steganography and watermarking for

digital images: A review of current research directions. IEEE Access, 8, 166589-166611.

Saeed, F., & Dixit, A. (2018, September). Digital Watermarking Techniques for Content Integrity on ELearning

Systems. In 2018 International Conference on Computing, Power and Communication

Technologies (GUCON) (pp. 748-753). IEEE.

Rashid, A. (2016). Digital watermarking applications and techniques: a brief review. International

Journal of Computer Applications Technology and Research, 5(3), 147-150.

Thangadurai, K., & Devi, G. S. (2014, January). An analysis of LSB based image steganography

techniques. In 2014 International Conference on Computer Communication and Informatics (pp. 1-4).

IEEE.

Jung, K. H., & Yoo, K. Y. (2015). Steganographic method based on interpolation and LSB substitution

of digital images. Multimedia Tools and Applications, 74(6), 2143-2155.

Rozlomii, I. O., Kosenyuk, H. V. (2017) Sposib formuvannia tsyfrovoho vodianoho znaku dlia

elektronnykh dokumentiv na osnovi operatsii matrychnoho kryptohrafichnoho peretvorennia [Method

of forming a digital watermark for electronic documents based on operations of matrix cryptographic

transformation]. Visnyk Khelnytskoho natsionalnoho universytetu. Tekhnichni nauky, 4(251), 229–233

[In Ukrainian].

Kulyk, S. V., Lyuta, M. V., & Rozlomii, I. O. (2017) Doslidzhennia nanesennia QR-kodu dlia zakhystu

hrafichnykh zobrazhen [Studying of the techniques of a QR-code using to protect graphic images].

Visnyk Khelnytskoho natsionalnoho universytetu. Tekhnichni nauky, 5(253), 244–248 [in Ukrainian].

Rozlomii I.O. (2016) Metody obchyslennia khesh-funktsii elektronnoho dokumentu na osnovi

matrychnykh kryptohrafichnykh peretvoren [Methods for calculating the hash function of electronic

document on the basis of matrix cryptographic transformations]. Visnyk Cherkaskoho derzhavnoho

tekhnolohichnoho universytetu. Tekhnichni nauky. 4. 88–94 [in Ukrainian].