Open Access   Article Go Back

Implementation of Email System With Steganography

Uzair Nisar1 , Craig Stewart2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 168-173, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.168173

Online published on Jan 31, 2019

Copyright © Uzair Nisar, Craig Stewart . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Uzair Nisar, Craig Stewart, “Implementation of Email System With Steganography,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.168-173, 2019.

MLA Style Citation: Uzair Nisar, Craig Stewart "Implementation of Email System With Steganography." International Journal of Computer Sciences and Engineering 7.1 (2019): 168-173.

APA Style Citation: Uzair Nisar, Craig Stewart, (2019). Implementation of Email System With Steganography. International Journal of Computer Sciences and Engineering, 7(1), 168-173.

BibTex Style Citation:
@article{Nisar_2019,
author = {Uzair Nisar, Craig Stewart},
title = {Implementation of Email System With Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {168-173},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3480},
doi = {https://doi.org/10.26438/ijcse/v7i1.168173}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.168173}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3480
TI - Implementation of Email System With Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - Uzair Nisar, Craig Stewart
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 168-173
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
475 367 downloads 227 downloads
  
  
           

Abstract

Email Systems are widely used as the means of communication. Organizations in order to seek more security tend to lean towards more secure ways of communication. This project facilitates the means of communication in a more secure format. The system being developed uses the technique called ‘Steganography’. Steganography hides the data behind an image so any intruder or hacker can only see the image and not the critical data. This is the secure means of sending information. To make it even more secure the steganographic image is then protected by a password using the technique called ‘Cryptography’. This can be implemented by developing 3 tools, first of which will hide data behind image, then the next tool encrypts it with a password and the final tool is used to send it over internet. This system will not only provide the best secure communication of data but it also makes the use of three different tools embedded in a single system.

Key-Words / Index Term

AES,LSB,Steganography,Cryptography

References

[1] Stephen Thomas, ‘SSL and TLS essentials’, Securing the web, 2000.
[2] Morkel, T., Eloff, J. H., and Olivier, M. S, “An overview of image steganography”, In ISSA, pp.1-11, 2005.
[3] Moreland, T, ‘Steganography and Steganalysis’, Leiden Institute of Advanced Computing Science, 2003.
[4] Wang, H. and Wang, S, ‘Cyber warfare: steganography vs. steganalysis’. Communications of the ACM, 47(10), pp.76-82, 2004
[5] Currie III, D. L., & Irvine, C. E. ‘Surmounting the effects of lossy compression on Steganography’,NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF COMPUTER SCIENCE, 1996.
[6] Artz, D, ‘Digital steganography: hiding data within data’, internet computing, IEEE, 5(3), pp. 75-80, 2001.
[7] Ahsan, K., and Kundur, D, ‘Practical data hiding in TCP/IP’, InProc. Workshop on Multimedia Security at ACM Multimedia (Vol. 2, No. 7) December, 2002.
[8] K. Nandhini, B. Gomathi, ‘Open Access Article Implementation of LSB Based Steganography Algorithms in FPGA, Research Paper Journal (IJSRNSC), Vol.6 , Issue.5 pp.32-37, Oct-2018
[9] Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., & Whiting, D, ‘Improved cryptanalysis of Rijndael’. In Fast software encryption January pp. 213-230,2001.
[10] Garfinkel, S. L, ‘Public key cryptography’, Computer, 29(6), pp.101-104, 1996.
[11] Sarmah, D. K., and Bajpai, N. ‘Proposed System for data hiding using Cryptography and Steganography’, in International Journal of Computer Applications, 8(9), pp. 7-10, 2010.
[12] Johnson, N. F., and Jajodia, S. ‘Exploring steganography: Seeing the unseen’, Computer, 31(2), pp. 26-34, 1998.
[13] Geer, D, ‘Taking steps to secure web services’, Computer, 36(10), pp. 14-16, 2003.
[14] Sunner, M, ‘Email security best practice’, Network Security, pp. 4-7, 2005.
[15] Levi, A., and Koç, Ç. K, ‘Inside risks: Risks in email security’, .Communications of the ACM, 44(8), 112, 2001.
[16] JJTC, Steganography. Technical Report [online] available from http://www.jjtc.com/pub/tr_95 _11_nfj/sec401.html 29 November 2015.
[17] Salomon, D, ‘Data privacy and security: encryption and information hiding’. Springer Science & Business Media, 2003.
[18] Katzenbeisser, S., and Petitcolas, F, ‘Information hiding techniques for steganography and digital watermarking’. Artech house, 2000.
[19] Westfeld, A, ‘Steganography for radio amateurs—A DSSS based approach for slow scan television’. In Information Hiding January pp. 201-215, 2007.
[20] Codr, J. (2009). ‘Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide’. Retrieved January, 8, 2010.
[21] Anderson, R.J. and Petitcolas, F.A, ‘On the limits of steganography’. Selected Areas in Communications, IEEE Journal on, 16(4), pp.474-481, 1998.
[22] Harshal V. Patil1, B. H. Barhate, ‘Open Access Article A Review Paper on Data Hiding Techniques: Stegnography, Review Paper Journal Paper (IJSRCSE), Vol.06 , Special Issue.01, pp.64-67, Jan-2018.