DESIGN AND IMPLEMENTATION OF A STEGANOGRAPHIC SYSTEM: SECURITY ENCRPTION SYSTEM

By

Author

Presented To

Department of Computer Science

The research work is motivated by the challenges of transmitting sensitive information from the sender to a targeted recipient with an interception of a third party or adversary considering the security challenges of confidentiality, integrity and availability of data in Nigeria. 
Chapter one 
1.0 Background of the study 
In this digital world of information transmission, information is the heart of computers, transmission and global economy transaction. In ensuring the security of data and information (confidentiality integrity, accuracy and authenticity) as characteristics of information, the concept of data and information hiding have attracted people to come up with creative solutions to protecting sensitive information from being intercepted or falling into wrong hands. The problem of protecting this sensitive information from unintended users is becoming complex. 
In a modern society, and Nigeria in particular, the protection of sensitive information involves many, interdependent policies and technological issues relating to information confidentiality, integrity, authenticity, anonymity, utility (Gideon Gbaden Amah 2015). 
Many users would prefer to use the Internet as their primary medium of transmission with the advancement in technologies since the introduction of cashless economy in Nigeria where the Internet is the main medium of transaction across the Nigerian state. 
Data security means the protection of data from unauthorized user (hackers, attackers or adversaries) and providing high security so as to prevent modification and interception of sensitive information (Gideon Gbaden Amah 2015) in transmission. The security of sensitive information has attracted more attention in recent times due to massive increase in transfer, research and transaction over the Internet. 
In improving security of information transmission and transaction over the Internet, so many techniques for hiding sensitive information are increasing day by day with more sophisticated approaches. The digital media used for this secret (hidden) transmission and transaction include text, images, audio, video, and protocol which provides excellent carriers for hidden information. Due to the growth of information transmission and transaction, the security of sensitive information has become a major concern (S. A Laskar, etal 1990). The deployed techniques for improvement of security of information include, watermarking, fingerprinting, cryptography, and steganography etc. Watermarking and fingerprinting are closely related technologies to steganography (Kavith Kadam 2013), which are primary concerned with the protection of intellectual property right. 
Watermarking marks all the instance of an object in the same way. Signature is the kind of information hidden in water making to signify that the originality or ownership for the purpose of copyright property. Fingerprinting embeds different unique mask (Kavith Kadam 2012) in distinct copies of the carrier object that are supplied to different customers. With this, the intellectual owner identifies the customer that break or violates their licensing agreement by supplying the property to third parties. Cryptography is a techniques used in securing the secrecy of transmitted information. It is not often enough to keep the contents of a message secret. Various methods have been developed in encrypting and decrypting data in order to keep the information secret. It may also be necessary to keep the existence of information secret. Steganography is a technique used in keeping the existence of an information secret.

About E-Project Material Centre


E-Project Material Centre is a web service aimed at successfully assisting final year students with quality, well researched, reliable and ready made project work. Our materials are recent, complete (chapter 1 to Minimum of Chapter 5, with references) and well written.INSTANT ACCESS! INSTANT DOWNLOAD. Simply select your department, choose from our list of topics available and explore your data

Why Students Love to Use E-Project Material ?


Guaranteed Delivery Getting your project delivered on time is essential. You cannot afford to turn in your project past the deadline. That is why you must get your project online from a company that guarantees to meet your deadline. e-Project Topics Material Centre is happy to offer instant delivery of projects listed on our website. We can handle just about any deadline you send our way. Satisfaction Guaranteed We always do whatever is necessary to ensure every customer's satisfaction

Disclaimer


E-Project Topics Material Centre will only provide projects as a reference for your research. The projects ordered and produced should be used as a guide or framework for your own project. The contents of the projects should be able to help you in generating new ideas and thoughts for your own project. It is the aim of e-Project Topics Centre to only provide guidance by which the projects should be pursued. We are neither encouraging any form of plagiarism nor are we advocating the use of the projects produced herein for cheating.

Terms and Condition


Using our service is LEGAL and IS NOT prohibited by any university/college policies You are allowed to use the original model papers you will receive in the following ways:
  • As a source for additional understanding of the subject
  • As a source for ideas for you own research (if properly referenced)
  • For PROPER paraphrasing ( see your university definition of plagiarism and acceptable paraphrase) Direct citing ( if referenced properly)
Thank you so much for your respect to the authors copyright
X

Need Help Finding or Downloading Your Project Material?

If you don't see the topic you're looking for or You need urgent/express attention, click the WhatsApp Icon/link below to contact ADMIN and get the material you need instantly. We are always available online to attend to your needs. Thanks