INTEGRATED ENCRYPTION-STEGANOGRAPHY PROTECTION OF MULTIMEDIA CONTENT AND DATA IN E-LEARNING SISTEMS
Main Article Content
Abstract
Introduction. The article focuses on the modern research and the practice of using
information security tools in e-learning systems. It has been noted that, in most cases, e-learning
systems ensure the confidentiality and addressability of information processes and the security of
educational materials when using open communication channels. However, a comprehensive
approach to e-learning systems protection needs to be better researched.
Purpose. Developing a data and multimedia content protection method in e-learning systems
using an integrated cryptographic-steganographic approach.
Methods. Steganography, cryptography.
Results. The strengthening of data and multimedia content protection in e-learning systems was
proposed using an integrated cryptographic-steganographic approach. This method applies the digital
watermark construction algorithm based on matrix cryptographic transformation operations. The
complex application of two protection methods is aimed at increasing the steganographic stability of
the digital watermark embedding algorithm by complicating the task of selecting the bit inversion
parameter in the bytes intended for embedding identification features. An additional protective effect
is provided by the non-obviousness of the choice of the byte in the file container for embedding a
digital watermark and the possibility of their identification only using cryptographic procedures by
authorized users. This approach is productive in forming a trust strategy in online materials and
remote activities in the educational field. Incorporating the proposed security mechanisms into
existing and developing e-learning systems is offered by snippets or plugins adding.
Conclusion. The practical implementation of software tools according to the developed method
should contribute to the increase of trust between the participants of the e-learning system due to the
possibility of identifying stolen or compromised ideas and innovations in the content of the
educational resources, fixing the status of compromised users among both students and teachers.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
Shahmoradi, L., Changizi, V., Mehraeen, E., Bashiri, A., Jannat, B., & Hosseini, M. (2018). The
challenges of E-learning system: Higher educational institutions perspective. Journal of education and
health promotion, 7.
Masud, M. A. H., & Huang, X. (2012). An e-learning system architecture based on cloud
computing. International Journal of Information and Communication Engineering, 6(2), 255-259.
Zuev, V. I. (2012). E-learning security models. Management Information Systems, 7(2), 024-028.
Aljawarneh, S. (2011). A web engineering security methodology for e-learning systems. Network
Security, 2011(3), 12-15.
Hasan, S. H., Alghazzawi, D. M., & Zafar, A. (2014). E-Learning systems and their Security. BRIS
Journal of Adv. S & T (ISSN. 0971-9563) vol, 2, 83-92.
Riahi, G. (2015). E-learning systems based on cloud computing: A review. Procedia Computer
Science, 62, 352-359.
Banerjee, S., & Karforma, S. (2017). Object oriented modeling for authentication of certificate in elearning
using digital watermarking. International Journal of Advanced Research in Computer
Science, 8(8).
Al-Ajlan, A. S. (2014). E-Learning Certificate Using Digital Watermarking Technology. IOSR J.
Comput. Eng, 16(4), 81-93.
Banerjee, S., & Karforma, S. (2016). Authentication of certificate in e-learning using secret key digital
watermarking. International Journal of Information Science and Computing, 3(2), 53-58.
Ghobadi, A. R., Boroujerdizadeh, A., Yaribakht, A. H., & Abd Manaf, A. (2012, September). How
watermarking secures e-learning system. In 2012 International Conference on E-Learning and ETechnologies
in Education (ICEEE) (pp. 99-104). IEEE.
Heniedy, H. S., Ouda, O. M., & Khozium, M. O. (2020). Sequring the e-learning materials using digital
watermarking approach. Vol.9, No, 11, pp.1559-1563, November, 2020.
Zemtsov, A. (2020, November). Data Protection of Multimedia Content for E-Learning Using Discrete
Wavelet Transform. In 8th Scientific Conference on Information Technologies for Intelligent Decision
Making Support (ITIDS 2020) (pp. 268-273). Atlantis Press.
Evsutin, O., Melman, A., & Meshcheryakov, R. (2020). Digital steganography and watermarking for
digital images: A review of current research directions. IEEE Access, 8, 166589-166611.
Saeed, F., & Dixit, A. (2018, September). Digital Watermarking Techniques for Content Integrity on ELearning
Systems. In 2018 International Conference on Computing, Power and Communication
Technologies (GUCON) (pp. 748-753). IEEE.
Rashid, A. (2016). Digital watermarking applications and techniques: a brief review. International
Journal of Computer Applications Technology and Research, 5(3), 147-150.
Thangadurai, K., & Devi, G. S. (2014, January). An analysis of LSB based image steganography
techniques. In 2014 International Conference on Computer Communication and Informatics (pp. 1-4).
IEEE.
Jung, K. H., & Yoo, K. Y. (2015). Steganographic method based on interpolation and LSB substitution
of digital images. Multimedia Tools and Applications, 74(6), 2143-2155.
Rozlomii, I. O., Kosenyuk, H. V. (2017) Sposib formuvannia tsyfrovoho vodianoho znaku dlia
elektronnykh dokumentiv na osnovi operatsii matrychnoho kryptohrafichnoho peretvorennia [Method
of forming a digital watermark for electronic documents based on operations of matrix cryptographic
transformation]. Visnyk Khelnytskoho natsionalnoho universytetu. Tekhnichni nauky, 4(251), 229–233
[In Ukrainian].
Kulyk, S. V., Lyuta, M. V., & Rozlomii, I. O. (2017) Doslidzhennia nanesennia QR-kodu dlia zakhystu
hrafichnykh zobrazhen [Studying of the techniques of a QR-code using to protect graphic images].
Visnyk Khelnytskoho natsionalnoho universytetu. Tekhnichni nauky, 5(253), 244–248 [in Ukrainian].
Rozlomii I.O. (2016) Metody obchyslennia khesh-funktsii elektronnoho dokumentu na osnovi
matrychnykh kryptohrafichnykh peretvoren [Methods for calculating the hash function of electronic
document on the basis of matrix cryptographic transformations]. Visnyk Cherkaskoho derzhavnoho
tekhnolohichnoho universytetu. Tekhnichni nauky. 4. 88–94 [in Ukrainian].