Implementation of Email System With Steganography

Authors

  • Nisar U Department of Computing, Coventry University, Coventry, United Kingdom
  • Stewart C Department of Computing, Coventry University, Coventry, United Kingdom

DOI:

https://doi.org/10.26438/ijcse/v7i1.168173

Keywords:

AES, LSB, Steganography, Cryptography

Abstract

Email Systems are widely used as the means of communication. Organizations in order to seek more security tend to lean towards more secure ways of communication. This project facilitates the means of communication in a more secure format. The system being developed uses the technique called ‘Steganography’. Steganography hides the data behind an image so any intruder or hacker can only see the image and not the critical data. This is the secure means of sending information. To make it even more secure the steganographic image is then protected by a password using the technique called ‘Cryptography’. This can be implemented by developing 3 tools, first of which will hide data behind image, then the next tool encrypts it with a password and the final tool is used to send it over internet. This system will not only provide the best secure communication of data but it also makes the use of three different tools embedded in a single system.

References

[1] Stephen Thomas, ‘SSL and TLS essentials’, Securing the web, 2000.

[2] Morkel, T., Eloff, J. H., and Olivier, M. S, “An overview of image steganography”, In ISSA, pp.1-11, 2005.

[3] Moreland, T, ‘Steganography and Steganalysis’, Leiden Institute of Advanced Computing Science, 2003.

[4] Wang, H. and Wang, S, ‘Cyber warfare: steganography vs. steganalysis’. Communications of the ACM, 47(10), pp.76-82, 2004

[5] Currie III, D. L., & Irvine, C. E. ‘Surmounting the effects of lossy compression on Steganography’,NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF COMPUTER SCIENCE, 1996.

[6] Artz, D, ‘Digital steganography: hiding data within data’, internet computing, IEEE, 5(3), pp. 75-80, 2001.

[7] Ahsan, K., and Kundur, D, ‘Practical data hiding in TCP/IP’, InProc. Workshop on Multimedia Security at ACM Multimedia (Vol. 2, No. 7) December, 2002.

[8] K. Nandhini, B. Gomathi, ‘Open Access Article Implementation of LSB Based Steganography Algorithms in FPGA, Research Paper Journal (IJSRNSC), Vol.6 , Issue.5 pp.32-37, Oct-2018

[9] Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., & Whiting, D, ‘Improved cryptanalysis of Rijndael’. In Fast software encryption January pp. 213-230,2001.

[10] Garfinkel, S. L, ‘Public key cryptography’, Computer, 29(6), pp.101-104, 1996.

[11] Sarmah, D. K., and Bajpai, N. ‘Proposed System for data hiding using Cryptography and Steganography’, in International Journal of Computer Applications, 8(9), pp. 7-10, 2010.

[12] Johnson, N. F., and Jajodia, S. ‘Exploring steganography: Seeing the unseen’, Computer, 31(2), pp. 26-34, 1998.

[13] Geer, D, ‘Taking steps to secure web services’, Computer, 36(10), pp. 14-16, 2003.

[14] Sunner, M, ‘Email security best practice’, Network Security, pp. 4-7, 2005.

[15] Levi, A., and Koç, Ç. K, ‘Inside risks: Risks in email security’, .Communications of the ACM, 44(8), 112, 2001.

[16] JJTC, Steganography. Technical Report [online] available from http://www.jjtc.com/pub/tr_95 _11_nfj/sec401.html 29 November 2015.

[17] Salomon, D, ‘Data privacy and security: encryption and information hiding’. Springer Science & Business Media, 2003.

[18] Katzenbeisser, S., and Petitcolas, F, ‘Information hiding techniques for steganography and digital watermarking’. Artech house, 2000.

[19] Westfeld, A, ‘Steganography for radio amateurs—A DSSS based approach for slow scan television’. In Information Hiding January pp. 201-215, 2007.

[20] Codr, J. (2009). ‘Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide’. Retrieved January, 8, 2010.

[21] Anderson, R.J. and Petitcolas, F.A, ‘On the limits of steganography’. Selected Areas in Communications, IEEE Journal on, 16(4), pp.474-481, 1998.

[22] Harshal V. Patil1, B. H. Barhate, ‘Open Access Article A Review Paper on Data Hiding Techniques: Stegnography, Review Paper Journal Paper (IJSRCSE), Vol.06 , Special Issue.01, pp.64-67, Jan-2018.

Downloads

Published

2019-01-31
CITATION
DOI: 10.26438/ijcse/v7i1.168173
Published: 2019-01-31

How to Cite

[1]
U. Nisar and C. Stewart, “Implementation of Email System With Steganography”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 168–173, Jan. 2019.

Issue

Section

Research Article