Abstract of Document Security within Institutions Using Image
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 102

Research Paper | Information Technology | Nigeria | Volume 3 Issue 4, April 2014

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. This paper looks at how documents within an institution can be concealed using images within the institutions network. This application developed using C programming language is low cost and stand alone and user friendly. The process of encryption is done on the users computer before the document is sent over the institutions network to its intended recipient. This process of encrypting and decrypting images makes a hacker or casual user unable to read documents that is not originally intended for such user.

Keywords: steganography, image, encrypting, decryption, image

Edition: Volume 3 Issue 4, April 2014

Pages: 528 - 535

Share this Article

How to Cite this Article?

Ahaiwe J., "Document Security within Institutions Using Image Steganography Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=13041401, Volume 3 Issue 4, April 2014, 528 - 535

Enter Your Email Address


Similar Articles with Keyword 'steganography'

Downloads: 113

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2750 - 2753

Review on Different Methods of Image Steganography

Priyanka Dongardive, Neelesh Gupta, Meha Khare

Share this Article

Downloads: 117

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 461 - 465

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Share this Article

Similar Articles with Keyword 'image'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'encrypting'

Downloads: 114

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2443 - 2447

Separable Reversible Data Hiding In Image Using a Keyless Approach

Jitbahan Samanta, G. Sujatha

Share this Article

Downloads: 129

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 724 - 727

Survey: Using Multiple Storage Clouds for Data Security on Cloud

Sandeep Nehe, M. B. Vaidya

Share this Article

Similar Articles with Keyword 'decryption'

Downloads: 104

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article
Top