A Cost Effective Image Steganography Application for Document Security
Management Science and Information Technology
Volume 2, Issue 2, April 2017, Pages: 6-13
Received: May 25, 2017; Accepted: Jun. 6, 2017; Published: Jul. 13, 2017
Views 1598      Downloads 63
Authors
Amaobi Uwaleke Michael, Department of Information Management Technology, Federal University of Technology, Owerri, Nigeria
Amadi Emmanuel Chukwudi, Department of Information Management Technology, Federal University of Technology, Owerri, Nigeria
Nwokonkwo Obi Chukwuemeka, Department of Information Management Technology, Federal University of Technology, Owerri, Nigeria
Article Tools
Follow on us
Abstract
Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In image steganography, a document is not just encrypted or locked as conventional security techniques could provide, which could leave room for hacking attempts; rather the documents are disguised from their original nature (document hiding behind an image) and as such hacking attempt may not be considered. The image can only be retrieved by individuals with the applications running on their computers. This paper presents an easy to use light weight application that can be used to secure documents within images. This application is developed using C programming language and can be applied in any organization ranging from educational institutions, government agencies financial institutions and private agencies.
Keywords
Encrypted, Steganography, Image, Document, Image
To cite this article
Amaobi Uwaleke Michael, Amadi Emmanuel Chukwudi, Nwokonkwo Obi Chukwuemeka, A Cost Effective Image Steganography Application for Document Security, Management Science and Information Technology. Vol. 2, No. 2, 2017, pp. 6-13. doi: 10.11648/j.msit.20170202.11
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Sedighi, V., Fridrich, J., & Cogranne, R. (2016). Toss that BOSSbase, Alice!. Electronic Imaging, 2016 (8), 1-9.
[2]
Bender, W., Gruhl, D., Morimoto, N. & Lu, A., (1996). Techniques for data hiding. IBM Systems Journal, 35 (2).
[3]
Dunbar, B. (2002). Steganographic techniques and their use in an Open-Systems environment. SANS Institute, January.
[4]
Moerland, T.(2001). Steganography and Steganalysis. Leiden Institute of Advanced Computing Science. Accessed September 12, 2012. Available from www.liacs.nl/home/ tmoerl/privtech.pdf
[5]
Silman, J.,(2001). Steganography and Steganalysis: An Overview. SANS Institute.
[6]
Wang, H & Wang, S. (2004). Cyber warfare: Steganography vs. Steganalysis. Communications of the ACM, 47 (10) October.
[7]
Anderson, R. J. & Petitcolas, F. A. (1998). On the limits of steganography. IEEE Journal of selected Areas in Communications, (May): 22.
[8]
Marvel, L. M., Boncelet Jr., C. G. & Retter, C. (1999). Spread Spectrum Steganography. IEEE Transactions on image processing, 8 (08).
[9]
Mondal, Saikat, Rameswar Debnath, and Borun Kumar Mondal. "An improved color image steganography technique in spatial domain." Electrical and Computer Engineering (ICECE), 2016 9th International Conference on. IEEE, 2016.
[10]
Artz, D. (2001). Digital Steganography: Hiding Data within Data. IEEE Internet Computing Journal, (June).
[11]
Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, (1999) “Information Hiding – A Survey”, Proceedings of the IEEE, special issue on protection of multimedia content, pp. 1062-1078.
[12]
C. P. Sumathi, T. Santanam and G. Umamaheswari (2013) A Study of Various Steganographic Techniques Used for Information Hiding. International Journal of Computer Science & Engineering Survey (IJCSES) Vol. 4, No. 6.
[13]
Stefan Katzenbeiser & Fabien A. P. Petitcolas (1999), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Computer Security series, Boston, London.
[14]
Lee, Y. K. & Chen, L. H. (2000). High capacity image steganographic model. Visual Image Signal Processing, 147 (03), June. Maes (Ed.).
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186