SECURE FILE TRANSMISSION SYSTEM USING STEGANOGRAPHIC ALGORITHM: DATA EMBBEDMENT USING JPEG


  • Department: Computer Science
  • Project ID: CPU0321
  • Access Fee: ₦5,000
  • Pages: 50 Pages
  • Chapters: 5 Chapters
  • Format: Microsoft Word
  • Views: 1,263
Get this Project Materials

ABSTRACT

Images are the most populous cover files for steganography algorithm because of their large amount of redundant bits that are suitable in the transmission of information over the internet. The joint photographic Expert Group (JPEG) is example of images formats that uses the compression techniques. The JPEG is the most populous image file format on the internet and the image sizes are smaller because of the compression thereby making it a least suspicious algorithm in use. 

Chpater one 
1.1 Introduction 
They have being several research contribution to the work of steganography with different approaches of hiding information or messages in carrier file and transmitting the carrier file as stego image to the intended recipient at a destination without human perception. 
Steganography is the art and science of invisible or hidden communication. Steganography is a method of hiding sensitive or confidential information or messages in carrier files in a way that no one apart from the sender and intended receiver no one even realizes that there is a hidden message inside the message cover (Conway M. 2003). 
Steganograpahy techniques are used to address digital right, information security and conceal secrets. Most steganographic systems in recent times use the images as cover media because digital images are mostly transmitted over the Internet communication (N.J Johnson and S. Jojodia 1998). 
Steganography and cryptography are two different techniques for hiding information that provides confidentiality, integrity and availability of data. Steganography as a technique is aimed at transmitting a message on a channel, where some other kind of information is already transmitted (J. Huang etal 2011). The goals being to hide messages inside other innocent or harmless digital media in a way that does not allow any person to even detect the presence of secret message.

  • Department: Computer Science
  • Project ID: CPU0321
  • Access Fee: ₦5,000
  • Pages: 50 Pages
  • Chapters: 5 Chapters
  • Format: Microsoft Word
  • Views: 1,263
Get this Project Materials
whatsappWhatsApp Us