Developing an End-to-End Secure Emailing Add-in using Steganography

Developing an End-to-End Secure Emailing Add-in using Steganography

Thanks to the emergence and spread of the internet, email is one of the main and fastest communication tools in both daily andbusiness life. The amount and the importance of data exchanged in emailing have been continuously increasing. This brings thesecurity-related issues. To be able to protect the security of the information, there has been a need to develop innovative ways.Although most email servers are already including some measures, there could some cases in which higher level security measureswould be needed. In this paper, we propose an end-to-end secure emailing add-in using the steganographic method, which involvescommunicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The purpose of the systemoutlined in this paper is to implement the concept of “information confidentially” through both steganographic and cryptographictechniques. This system is integrated into one of the most commonly used commercial emailing software, Microsoft Outlook as an add-in.

___

  • Kaushal, Singh V.P., Bamal R. (2013). Steganography: A Modern Day Art and Science For Data Hiding, International Journal of Latest Research in Science and Technology, 2(4), 9-14
  • Gupta, Shailender, Ankur Goyal, and Bharat Bhushan. "Information hiding using least significant bit steganography and cryptography." International Journal of Modern Education and Computer Science 4.6 (2012): 27.
  • Johnson N.F., Jajodia S. (1998). Exploring Steganography: Seeing the Unseen, IEEE, 31(2), 26-34
  • Zielińska, E., Mazurczyk, W., & Szczypiorski, K. (2014). Trends in steganography Communications of the ACM, 57(3), 86-95
  • Sheelu, Ahuja, B., (2013), “An Overview of Steganography”, IOSR Journal of Computer Engineering, 11(1), 15-19.
  • Rana M.S, Sangwan B.S., Jangir J.S. (2010). Art of Hiding: An Introduction to Steganography, International Journal of Engineering and Computer Science,1(1), 11- 22.
  • Jammi Ashok, Y. Raju, S. Munishankaraiah, K. Srinivas "Steganography: An Overview" in International Journal of Engineering Science and Technology, 2(10), 2010.
  • K.P.Adhiya and Swati A. Patil, Hiding Text in Audio Using LSB Based Steganography, Information and Knowledge Management, 2(3), 2012.
  • Pratap Chandra Mandal, Modern Steganographic technique: A survey, International Journal of Computer Science & Engineering Technology (IJCSET), 2012.
  • Rout, H., Mishra, B.K., Pros, and Cons of Cryptography, Steganography, and Perturbation techniques, IOSR Journal of Electronics and Communication Engineering, 76-81, 2014.