Downloads: 102 | Views: 351
Research Paper | Information Technology | Nigeria | Volume 3 Issue 4, April 2014 | Popularity: 6.2 / 10
Document Security within Institutions Using Image Steganography Technique
Ahaiwe J.
Abstract: Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. This paper looks at how documents within an institution can be concealed using images within the institutions network. This application developed using C programming language is low cost and stand alone and user friendly. The process of encryption is done on the users computer before the document is sent over the institutions network to its intended recipient. This process of encrypting and decrypting images makes a hacker or casual user unable to read documents that is not originally intended for such user.
Keywords: steganography, image, encrypting, decryption, image
Edition: Volume 3 Issue 4, April 2014
Pages: 528 - 535
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Information Technology, India, Volume 11 Issue 10, October 2022
Pages: 959 - 963Medical Data Security using RSA and Visual Cryptography
Bency Wilson, Jesline Abraham
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 1850 - 1857Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms
Jeevan Manda
Downloads: 104
Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014
Pages: 1360 - 1367Implementation of Location based Encryption in GSM Cellular Network using OPNET
Vijay S. More, Uma R. Godase
Downloads: 106
Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016
Pages: 1865 - 1867Survey on Cloud Computing Security Algorithms
Akash Kanthale, S. P. Potdar
Downloads: 106
Survey Paper, Information Technology, India, Volume 5 Issue 8, August 2016
Pages: 1103 - 1107Up in the Air: Cloud Computing Security and RSA Algorithm
Pooja Bharadwaj, Shivani Mankotia