Developing an End-to-End Secure Emailing Add-in using Steganography
Developing an End-to-End Secure Emailing Add-in using Steganography
Thanks to the emergence and spread of the internet, email is one of the main and fastest communication tools in both daily andbusiness life. The amount and the importance of data exchanged in emailing have been continuously increasing. This brings thesecurity-related issues. To be able to protect the security of the information, there has been a need to develop innovative ways.Although most email servers are already including some measures, there could some cases in which higher level security measureswould be needed. In this paper, we propose an end-to-end secure emailing add-in using the steganographic method, which involvescommunicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The purpose of the systemoutlined in this paper is to implement the concept of “information confidentially” through both steganographic and cryptographictechniques. This system is integrated into one of the most commonly used commercial emailing software, Microsoft Outlook as an add-in.
___
- Kaushal, Singh V.P., Bamal R. (2013). Steganography: A
Modern Day Art and Science For Data Hiding,
International Journal of Latest Research in Science and
Technology, 2(4), 9-14
- Gupta, Shailender, Ankur Goyal, and Bharat Bhushan.
"Information hiding using least significant bit steganography
and cryptography." International Journal of Modern
Education and Computer Science 4.6 (2012): 27.
- Johnson N.F., Jajodia S. (1998). Exploring Steganography: Seeing
the Unseen, IEEE, 31(2), 26-34
- Zielińska, E., Mazurczyk, W., & Szczypiorski, K. (2014). Trends
in steganography Communications of the ACM, 57(3), 86-95
- Sheelu, Ahuja, B., (2013), “An Overview of Steganography”,
IOSR Journal of Computer Engineering, 11(1), 15-19.
- Rana M.S, Sangwan B.S., Jangir J.S. (2010). Art of Hiding:
An Introduction to Steganography, International Journal of
Engineering and Computer Science,1(1), 11- 22.
- Jammi Ashok, Y. Raju, S. Munishankaraiah, K. Srinivas
"Steganography: An Overview" in International Journal of
Engineering Science and Technology, 2(10), 2010.
- K.P.Adhiya and Swati A. Patil, Hiding Text in Audio Using
LSB Based Steganography, Information and Knowledge
Management, 2(3), 2012.
- Pratap Chandra Mandal, Modern Steganographic technique:
A survey, International Journal of Computer Science &
Engineering Technology (IJCSET), 2012.
- Rout, H., Mishra, B.K., Pros, and Cons of Cryptography,
Steganography, and Perturbation techniques, IOSR Journal
of Electronics and Communication Engineering, 76-81,
2014.