Implementation of Email System With Steganography
Uzair Nisar1 , Craig Stewart2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-1 , Page no. 168-173, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.168173
Online published on Jan 31, 2019
Copyright © Uzair Nisar, Craig Stewart . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Uzair Nisar, Craig Stewart, “Implementation of Email System With Steganography,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.168-173, 2019.
MLA Style Citation: Uzair Nisar, Craig Stewart "Implementation of Email System With Steganography." International Journal of Computer Sciences and Engineering 7.1 (2019): 168-173.
APA Style Citation: Uzair Nisar, Craig Stewart, (2019). Implementation of Email System With Steganography. International Journal of Computer Sciences and Engineering, 7(1), 168-173.
BibTex Style Citation:
@article{Nisar_2019,
author = {Uzair Nisar, Craig Stewart},
title = {Implementation of Email System With Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {168-173},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3480},
doi = {https://doi.org/10.26438/ijcse/v7i1.168173}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.168173}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3480
TI - Implementation of Email System With Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - Uzair Nisar, Craig Stewart
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 168-173
IS - 1
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
475 | 367 downloads | 227 downloads |
Abstract
Email Systems are widely used as the means of communication. Organizations in order to seek more security tend to lean towards more secure ways of communication. This project facilitates the means of communication in a more secure format. The system being developed uses the technique called ‘Steganography’. Steganography hides the data behind an image so any intruder or hacker can only see the image and not the critical data. This is the secure means of sending information. To make it even more secure the steganographic image is then protected by a password using the technique called ‘Cryptography’. This can be implemented by developing 3 tools, first of which will hide data behind image, then the next tool encrypts it with a password and the final tool is used to send it over internet. This system will not only provide the best secure communication of data but it also makes the use of three different tools embedded in a single system.
Key-Words / Index Term
AES,LSB,Steganography,Cryptography
References
[1] Stephen Thomas, ‘SSL and TLS essentials’, Securing the web, 2000.
[2] Morkel, T., Eloff, J. H., and Olivier, M. S, “An overview of image steganography”, In ISSA, pp.1-11, 2005.
[3] Moreland, T, ‘Steganography and Steganalysis’, Leiden Institute of Advanced Computing Science, 2003.
[4] Wang, H. and Wang, S, ‘Cyber warfare: steganography vs. steganalysis’. Communications of the ACM, 47(10), pp.76-82, 2004
[5] Currie III, D. L., & Irvine, C. E. ‘Surmounting the effects of lossy compression on Steganography’,NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF COMPUTER SCIENCE, 1996.
[6] Artz, D, ‘Digital steganography: hiding data within data’, internet computing, IEEE, 5(3), pp. 75-80, 2001.
[7] Ahsan, K., and Kundur, D, ‘Practical data hiding in TCP/IP’, InProc. Workshop on Multimedia Security at ACM Multimedia (Vol. 2, No. 7) December, 2002.
[8] K. Nandhini, B. Gomathi, ‘Open Access Article Implementation of LSB Based Steganography Algorithms in FPGA, Research Paper Journal (IJSRNSC), Vol.6 , Issue.5 pp.32-37, Oct-2018
[9] Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., & Whiting, D, ‘Improved cryptanalysis of Rijndael’. In Fast software encryption January pp. 213-230,2001.
[10] Garfinkel, S. L, ‘Public key cryptography’, Computer, 29(6), pp.101-104, 1996.
[11] Sarmah, D. K., and Bajpai, N. ‘Proposed System for data hiding using Cryptography and Steganography’, in International Journal of Computer Applications, 8(9), pp. 7-10, 2010.
[12] Johnson, N. F., and Jajodia, S. ‘Exploring steganography: Seeing the unseen’, Computer, 31(2), pp. 26-34, 1998.
[13] Geer, D, ‘Taking steps to secure web services’, Computer, 36(10), pp. 14-16, 2003.
[14] Sunner, M, ‘Email security best practice’, Network Security, pp. 4-7, 2005.
[15] Levi, A., and Koç, Ç. K, ‘Inside risks: Risks in email security’, .Communications of the ACM, 44(8), 112, 2001.
[16] JJTC, Steganography. Technical Report [online] available from http://www.jjtc.com/pub/tr_95 _11_nfj/sec401.html 29 November 2015.
[17] Salomon, D, ‘Data privacy and security: encryption and information hiding’. Springer Science & Business Media, 2003.
[18] Katzenbeisser, S., and Petitcolas, F, ‘Information hiding techniques for steganography and digital watermarking’. Artech house, 2000.
[19] Westfeld, A, ‘Steganography for radio amateurs—A DSSS based approach for slow scan television’. In Information Hiding January pp. 201-215, 2007.
[20] Codr, J. (2009). ‘Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide’. Retrieved January, 8, 2010.
[21] Anderson, R.J. and Petitcolas, F.A, ‘On the limits of steganography’. Selected Areas in Communications, IEEE Journal on, 16(4), pp.474-481, 1998.
[22] Harshal V. Patil1, B. H. Barhate, ‘Open Access Article A Review Paper on Data Hiding Techniques: Stegnography, Review Paper Journal Paper (IJSRCSE), Vol.06 , Special Issue.01, pp.64-67, Jan-2018.