Development of a data security model using Steganography
Keywords:
steganography, cryptography, encryption, decryption, secrecyAbstract
This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each other.
References
Alain, C.B. (2001). A study of steganography and Ther Art of Hiding Information. East Carolina University. Retrieved on Feb 15th, 2009 from http://www.stegDTEC682.pdf
Acken, J. (1998). How Watermarking adds Value to Digital content. Communications of the ACM, 41(7), 75-77.
Bender, W. (1996). Techniques for Data Hiding”, IBM Systems Journal, 35 (3), 313-336.
Krinn, J. (2000). Introduction to Steganography. Journal of Military Science, in French URL: http://rr.sans.org/convertchannelssteganography.php
Sellars, D. (2010), An Introduction to Steganography, URL: http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellarsstego.html, retrieved on 24th June, 2015.
SANS Institute (2002). A Detailed look at Steganographic Techniques and their use in an OpenSystems Environment. InfoSec Reading Room, URL: http://www.sans.org/readingroom/whitepapers/covert/, retrieved on 24th June 2015.
Petitcolas, F.A.P. (2000). Information Hiding: Techniques for Steganography and Digital Watermarking, retrieved on 24th June, 2015 from http://www.petitcolas.net/fabien/steganog raphy
Aelphaeis, M. (2006). Steganography FAQ. http://zone-h.org. Retrieved on Feb 16th, 2009.
Arnold, M., Schnucker, M. and Wolthusen, S.D. (2003). Techniques and Applications of Digital Watermarking and Content Protection. Artech House, Norwood, Massachusetts.
Efozia, F.N. (2008). Design and Implementation of a Steganographic software. MSc research work, University of Benin.
Anigbogu, S.O. (2003). Introduction to computer science and programming languages. Christon International Company ltd, Awka, Anambra state.
Kerckhoffs. A. (1883). iLab Cryptographie Militaire (Military Cryptography), Sciences.
Johnson, F. and Jajodia, S. (1998). Exporing Steganography: Seeing the unseen. IEEE Computer Magazine, 31(2), 26-34, February Ed.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.