| Peer-Reviewed

A Cost Effective Image Steganography Application for Document Security

Received: 25 May 2017    Accepted: 6 June 2017    Published: 13 July 2017
Views:       Downloads:
Abstract

Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In image steganography, a document is not just encrypted or locked as conventional security techniques could provide, which could leave room for hacking attempts; rather the documents are disguised from their original nature (document hiding behind an image) and as such hacking attempt may not be considered. The image can only be retrieved by individuals with the applications running on their computers. This paper presents an easy to use light weight application that can be used to secure documents within images. This application is developed using C programming language and can be applied in any organization ranging from educational institutions, government agencies financial institutions and private agencies.

Published in Management Science and Information Technology (Volume 2, Issue 2)
DOI 10.11648/j.msit.20170202.11
Page(s) 6-13
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Encrypted, Steganography, Image, Document, Image

References
[1] Sedighi, V., Fridrich, J., & Cogranne, R. (2016). Toss that BOSSbase, Alice!. Electronic Imaging, 2016 (8), 1-9.
[2] Bender, W., Gruhl, D., Morimoto, N. & Lu, A., (1996). Techniques for data hiding. IBM Systems Journal, 35 (2).
[3] Dunbar, B. (2002). Steganographic techniques and their use in an Open-Systems environment. SANS Institute, January.
[4] Moerland, T.(2001). Steganography and Steganalysis. Leiden Institute of Advanced Computing Science. Accessed September 12, 2012. Available from www.liacs.nl/home/ tmoerl/privtech.pdf
[5] Silman, J.,(2001). Steganography and Steganalysis: An Overview. SANS Institute.
[6] Wang, H & Wang, S. (2004). Cyber warfare: Steganography vs. Steganalysis. Communications of the ACM, 47 (10) October.
[7] Anderson, R. J. & Petitcolas, F. A. (1998). On the limits of steganography. IEEE Journal of selected Areas in Communications, (May): 22.
[8] Marvel, L. M., Boncelet Jr., C. G. & Retter, C. (1999). Spread Spectrum Steganography. IEEE Transactions on image processing, 8 (08).
[9] Mondal, Saikat, Rameswar Debnath, and Borun Kumar Mondal. "An improved color image steganography technique in spatial domain." Electrical and Computer Engineering (ICECE), 2016 9th International Conference on. IEEE, 2016.
[10] Artz, D. (2001). Digital Steganography: Hiding Data within Data. IEEE Internet Computing Journal, (June).
[11] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, (1999) “Information Hiding – A Survey”, Proceedings of the IEEE, special issue on protection of multimedia content, pp. 1062-1078.
[12] C. P. Sumathi, T. Santanam and G. Umamaheswari (2013) A Study of Various Steganographic Techniques Used for Information Hiding. International Journal of Computer Science & Engineering Survey (IJCSES) Vol. 4, No. 6.
[13] Stefan Katzenbeiser & Fabien A. P. Petitcolas (1999), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Computer Security series, Boston, London.
[14] Lee, Y. K. & Chen, L. H. (2000). High capacity image steganographic model. Visual Image Signal Processing, 147 (03), June. Maes (Ed.).
Cite This Article
  • APA Style

    Amaobi Uwaleke Michael, Amadi Emmanuel Chukwudi, Nwokonkwo Obi Chukwuemeka. (2017). A Cost Effective Image Steganography Application for Document Security. Management Science and Information Technology, 2(2), 6-13. https://doi.org/10.11648/j.msit.20170202.11

    Copy | Download

    ACS Style

    Amaobi Uwaleke Michael; Amadi Emmanuel Chukwudi; Nwokonkwo Obi Chukwuemeka. A Cost Effective Image Steganography Application for Document Security. Manag. Sci. Inf. Technol. 2017, 2(2), 6-13. doi: 10.11648/j.msit.20170202.11

    Copy | Download

    AMA Style

    Amaobi Uwaleke Michael, Amadi Emmanuel Chukwudi, Nwokonkwo Obi Chukwuemeka. A Cost Effective Image Steganography Application for Document Security. Manag Sci Inf Technol. 2017;2(2):6-13. doi: 10.11648/j.msit.20170202.11

    Copy | Download

  • @article{10.11648/j.msit.20170202.11,
      author = {Amaobi Uwaleke Michael and Amadi Emmanuel Chukwudi and Nwokonkwo Obi Chukwuemeka},
      title = {A Cost Effective Image Steganography Application for Document Security},
      journal = {Management Science and Information Technology},
      volume = {2},
      number = {2},
      pages = {6-13},
      doi = {10.11648/j.msit.20170202.11},
      url = {https://doi.org/10.11648/j.msit.20170202.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.msit.20170202.11},
      abstract = {Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In image steganography, a document is not just encrypted or locked as conventional security techniques could provide, which could leave room for hacking attempts; rather the documents are disguised from their original nature (document hiding behind an image) and as such hacking attempt may not be considered. The image can only be retrieved by individuals with the applications running on their computers. This paper presents an easy to use light weight application that can be used to secure documents within images. This application is developed using C programming language and can be applied in any organization ranging from educational institutions, government agencies financial institutions and private agencies.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - A Cost Effective Image Steganography Application for Document Security
    AU  - Amaobi Uwaleke Michael
    AU  - Amadi Emmanuel Chukwudi
    AU  - Nwokonkwo Obi Chukwuemeka
    Y1  - 2017/07/13
    PY  - 2017
    N1  - https://doi.org/10.11648/j.msit.20170202.11
    DO  - 10.11648/j.msit.20170202.11
    T2  - Management Science and Information Technology
    JF  - Management Science and Information Technology
    JO  - Management Science and Information Technology
    SP  - 6
    EP  - 13
    PB  - Science Publishing Group
    UR  - https://doi.org/10.11648/j.msit.20170202.11
    AB  - Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In image steganography, a document is not just encrypted or locked as conventional security techniques could provide, which could leave room for hacking attempts; rather the documents are disguised from their original nature (document hiding behind an image) and as such hacking attempt may not be considered. The image can only be retrieved by individuals with the applications running on their computers. This paper presents an easy to use light weight application that can be used to secure documents within images. This application is developed using C programming language and can be applied in any organization ranging from educational institutions, government agencies financial institutions and private agencies.
    VL  - 2
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Department of Information Management Technology, Federal University of Technology, Owerri, Nigeria

  • Department of Information Management Technology, Federal University of Technology, Owerri, Nigeria

  • Department of Information Management Technology, Federal University of Technology, Owerri, Nigeria

  • Sections