Research Paper | Information Technology | Nigeria | Volume 3 Issue 4, April 2014
Document Security within Institutions Using Image Steganography Technique
Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. This paper looks at how documents within an institution can be concealed using images within the institutions network. This application developed using C programming language is low cost and stand alone and user friendly. The process of encryption is done on the users computer before the document is sent over the institutions network to its intended recipient. This process of encrypting and decrypting images makes a hacker or casual user unable to read documents that is not originally intended for such user.
Keywords: steganography, image, encrypting, decryption, image
Edition: Volume 3 Issue 4, April 2014
Pages: 528 - 535
How to Cite this Article?
Ahaiwe J., "Document Security within Institutions Using Image Steganography Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=13041401, Volume 3 Issue 4, April 2014, 528 - 535
Similar Articles with Keyword 'steganography'
Review on Different Methods of Image Steganography
Priyanka Dongardive, Neelesh Gupta, Meha Khare
Data Hiding Using Steganography: A Review
Nishigandha P. Mangle, Prof. Sanjay S. Dhopte
Similar Articles with Keyword 'image'
An Approach for Canny Edge Detection Algorithm on Face Recognition
A. D. Chitra, Dr. P. Ponmuthuramalingam
Android Notes using Finger Print Authentication
Vaibhav Garg, Siddharth Yadav, Rishabh Kamal
Similar Articles with Keyword 'encrypting'
Separable Reversible Data Hiding In Image Using a Keyless Approach
Jitbahan Samanta, G. Sujatha
Survey: Using Multiple Storage Clouds for Data Security on Cloud
Sandeep Nehe, M. B. Vaidya
Similar Articles with Keyword 'decryption'
Implementation of Location based Encryption in GSM Cellular Network using OPNET
Vijay S. More, Uma R. Godase
Survey on Cloud Computing Security Algorithms
Akash Kanthale, S. P. Potdar