International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 102 | Views: 351

Research Paper | Information Technology | Nigeria | Volume 3 Issue 4, April 2014 | Popularity: 6.2 / 10


     

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.


Abstract: Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. This paper looks at how documents within an institution can be concealed using images within the institutions network. This application developed using C programming language is low cost and stand alone and user friendly. The process of encryption is done on the users computer before the document is sent over the institutions network to its intended recipient. This process of encrypting and decrypting images makes a hacker or casual user unable to read documents that is not originally intended for such user.


Keywords: steganography, image, encrypting, decryption, image


Edition: Volume 3 Issue 4, April 2014


Pages: 528 - 535



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ahaiwe J., "Document Security within Institutions Using Image Steganography Technique", International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, pp. 528-535, https://www.ijsr.net/getabstract.php?paperid=13041401, DOI: https://www.doi.org/10.21275/13041401



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson, Jesline Abraham

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 104

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 8, August 2016

Pages: 1103 - 1107

Up in the Air: Cloud Computing Security and RSA Algorithm

Pooja Bharadwaj, Shivani Mankotia

Share this Article
Top