Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In image steganography, a document is not just encrypted or locked as conventional security techniques could provide, which could leave room for hacking attempts; rather the documents are disguised from their original nature (document hiding behind an image) and as such hacking attempt may not be considered. The image can only be retrieved by individuals with the applications running on their computers. This paper presents an easy to use light weight application that can be used to secure documents within images. This application is developed using C programming language and can be applied in any organization ranging from educational institutions, government agencies financial institutions and private agencies.
Published in | Management Science and Information Technology (Volume 2, Issue 2) |
DOI | 10.11648/j.msit.20170202.11 |
Page(s) | 6-13 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2024. Published by Science Publishing Group |
Encrypted, Steganography, Image, Document, Image
[1] | Sedighi, V., Fridrich, J., & Cogranne, R. (2016). Toss that BOSSbase, Alice!. Electronic Imaging, 2016 (8), 1-9. |
[2] | Bender, W., Gruhl, D., Morimoto, N. & Lu, A., (1996). Techniques for data hiding. IBM Systems Journal, 35 (2). |
[3] | Dunbar, B. (2002). Steganographic techniques and their use in an Open-Systems environment. SANS Institute, January. |
[4] | Moerland, T.(2001). Steganography and Steganalysis. Leiden Institute of Advanced Computing Science. Accessed September 12, 2012. Available from www.liacs.nl/home/ tmoerl/privtech.pdf |
[5] | Silman, J.,(2001). Steganography and Steganalysis: An Overview. SANS Institute. |
[6] | Wang, H & Wang, S. (2004). Cyber warfare: Steganography vs. Steganalysis. Communications of the ACM, 47 (10) October. |
[7] | Anderson, R. J. & Petitcolas, F. A. (1998). On the limits of steganography. IEEE Journal of selected Areas in Communications, (May): 22. |
[8] | Marvel, L. M., Boncelet Jr., C. G. & Retter, C. (1999). Spread Spectrum Steganography. IEEE Transactions on image processing, 8 (08). |
[9] | Mondal, Saikat, Rameswar Debnath, and Borun Kumar Mondal. "An improved color image steganography technique in spatial domain." Electrical and Computer Engineering (ICECE), 2016 9th International Conference on. IEEE, 2016. |
[10] | Artz, D. (2001). Digital Steganography: Hiding Data within Data. IEEE Internet Computing Journal, (June). |
[11] | Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, (1999) “Information Hiding – A Survey”, Proceedings of the IEEE, special issue on protection of multimedia content, pp. 1062-1078. |
[12] | C. P. Sumathi, T. Santanam and G. Umamaheswari (2013) A Study of Various Steganographic Techniques Used for Information Hiding. International Journal of Computer Science & Engineering Survey (IJCSES) Vol. 4, No. 6. |
[13] | Stefan Katzenbeiser & Fabien A. P. Petitcolas (1999), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Computer Security series, Boston, London. |
[14] | Lee, Y. K. & Chen, L. H. (2000). High capacity image steganographic model. Visual Image Signal Processing, 147 (03), June. Maes (Ed.). |
APA Style
Amaobi Uwaleke Michael, Amadi Emmanuel Chukwudi, Nwokonkwo Obi Chukwuemeka. (2017). A Cost Effective Image Steganography Application for Document Security. Management Science and Information Technology, 2(2), 6-13. https://doi.org/10.11648/j.msit.20170202.11
ACS Style
Amaobi Uwaleke Michael; Amadi Emmanuel Chukwudi; Nwokonkwo Obi Chukwuemeka. A Cost Effective Image Steganography Application for Document Security. Manag. Sci. Inf. Technol. 2017, 2(2), 6-13. doi: 10.11648/j.msit.20170202.11
@article{10.11648/j.msit.20170202.11, author = {Amaobi Uwaleke Michael and Amadi Emmanuel Chukwudi and Nwokonkwo Obi Chukwuemeka}, title = {A Cost Effective Image Steganography Application for Document Security}, journal = {Management Science and Information Technology}, volume = {2}, number = {2}, pages = {6-13}, doi = {10.11648/j.msit.20170202.11}, url = {https://doi.org/10.11648/j.msit.20170202.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.msit.20170202.11}, abstract = {Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In image steganography, a document is not just encrypted or locked as conventional security techniques could provide, which could leave room for hacking attempts; rather the documents are disguised from their original nature (document hiding behind an image) and as such hacking attempt may not be considered. The image can only be retrieved by individuals with the applications running on their computers. This paper presents an easy to use light weight application that can be used to secure documents within images. This application is developed using C programming language and can be applied in any organization ranging from educational institutions, government agencies financial institutions and private agencies.}, year = {2017} }
TY - JOUR T1 - A Cost Effective Image Steganography Application for Document Security AU - Amaobi Uwaleke Michael AU - Amadi Emmanuel Chukwudi AU - Nwokonkwo Obi Chukwuemeka Y1 - 2017/07/13 PY - 2017 N1 - https://doi.org/10.11648/j.msit.20170202.11 DO - 10.11648/j.msit.20170202.11 T2 - Management Science and Information Technology JF - Management Science and Information Technology JO - Management Science and Information Technology SP - 6 EP - 13 PB - Science Publishing Group UR - https://doi.org/10.11648/j.msit.20170202.11 AB - Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In image steganography, a document is not just encrypted or locked as conventional security techniques could provide, which could leave room for hacking attempts; rather the documents are disguised from their original nature (document hiding behind an image) and as such hacking attempt may not be considered. The image can only be retrieved by individuals with the applications running on their computers. This paper presents an easy to use light weight application that can be used to secure documents within images. This application is developed using C programming language and can be applied in any organization ranging from educational institutions, government agencies financial institutions and private agencies. VL - 2 IS - 2 ER -