Development of a data security model using Steganography

Authors

  • Yange TS Department of Mathematics/Statistics/Computer Science, Federal University of Agriculture, Makurdi, Nigeria
  • Agana MA Department of Mathematics/Statistics/Computer Science, Federal University of Agriculture, Makurdi, Nigeria

Keywords:

steganography, cryptography, encryption, decryption, secrecy

Abstract

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each other.

References

Alain, C.B. (2001). A study of steganography and Ther Art of Hiding Information. East Carolina University. Retrieved on Feb 15th, 2009 from http://www.stegDTEC682.pdf

Acken, J. (1998). How Watermarking adds Value to Digital content. Communications of the ACM, 41(7), 75-77.

Bender, W. (1996). Techniques for Data Hiding”, IBM Systems Journal, 35 (3), 313-336.

Krinn, J. (2000). Introduction to Steganography. Journal of Military Science, in French URL: http://rr.sans.org/convertchannelssteganography.php

Sellars, D. (2010), An Introduction to Steganography, URL: http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellarsstego.html, retrieved on 24th June, 2015.

SANS Institute (2002). A Detailed look at Steganographic Techniques and their use in an OpenSystems Environment. InfoSec Reading Room, URL: http://www.sans.org/readingroom/whitepapers/covert/, retrieved on 24th June 2015.

Petitcolas, F.A.P. (2000). Information Hiding: Techniques for Steganography and Digital Watermarking, retrieved on 24th June, 2015 from http://www.petitcolas.net/fabien/steganog raphy

Aelphaeis, M. (2006). Steganography FAQ. http://zone-h.org. Retrieved on Feb 16th, 2009.

Arnold, M., Schnucker, M. and Wolthusen, S.D. (2003). Techniques and Applications of Digital Watermarking and Content Protection. Artech House, Norwood, Massachusetts.

Efozia, F.N. (2008). Design and Implementation of a Steganographic software. MSc research work, University of Benin.

Anigbogu, S.O. (2003). Introduction to computer science and programming languages. Christon International Company ltd, Awka, Anambra state.

Kerckhoffs. A. (1883). iLab Cryptographie Militaire (Military Cryptography), Sciences.

Johnson, F. and Jajodia, S. (1998). Exporing Steganography: Seeing the unseen. IEEE Computer Magazine, 31(2), 26-34, February Ed.

http://www.jjtc.com/pub/r2026.pdf.

Downloads

Published

2024-02-26

How to Cite

Yange, T. S., & Agana, M. A. (2024). Development of a data security model using Steganography. COMPUSOFT: An International Journal of Advanced Computer Technology, 6(06), 2355–2362. Retrieved from https://ijact.in/index.php/j/article/view/406

Issue

Section

Review Article

Similar Articles

<< < 1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.