Select Currency
Translate this page

DESIGN AND IMPLEMENTATION OF A ROBUST STEGANOGRAPHIC SYSTEM FOR EMBEDMENT OF SENSITIVE INFORMATION

Format: MS WORD  |  Chapter: 1-5  |  Pages: 79  |  722 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE FULL PROJECT

DESIGN AND IMPLEMENTATION OF A ROBUST STEGANOGRAPHIC SYSTEM FOR EMBEDMENT OF SENSITIVE INFORMATION

 

CHAPTER ONE

INTRODUCTION

1.0 Background to the study

In this digital world of information transmission, information is the heart of computers, transmission and global economy transaction. In ensuring the security of data and information (confidentiality integrity, accuracy and authenticity) as characteristics of information, the concept of data and information hiding have attracted people to come up with creative solutions to protecting sensitive information from being intercepted or falling into wrong hands. The problem of protecting this sensitive information from unintended users is becoming complex. In a modern society, and Nigeria in particular, the protection of sensitive information involves many, interdependent policies and technological issues relating to information confidentiality, integrity, authenticity, anonymity, utility (Gideon Gbaden Amah 2015).

Many users would prefer to use the Internet as their primary medium of transmission with the advancement in technologies since the introduction of cashless economy in Nigeria where the Internet is the main medium of transaction across the Nigerian state. Data security means the protection of data from unauthorized user (hackers, attackers or adversaries) and providing high security so as to prevent modification and interception of sensitive information (Gideon Gbaden Amah 2015) in transmission. The security of sensitive information has attracted more attention in recent times due to massive increase in transfer, research and transaction over the Internet.

In improving security of information transmission and transaction over the Internet, so many techniques for hiding sensitive information are increasing day by day with more sophisticated approaches. The digital media used for this secret (hidden) transmission and transaction include text, images, audio, video, and protocol which provides excellent carriers for hidden information. Due to the growth of information transmission and transaction, the security of sensitive information has become a major concern (S. A Laskar,etal 1990). The deployed techniques for improvement of security of information include, watermarking, fingerprinting, cryptography, and steganography etc. Watermarking and fingerprinting are closely related technologies to steganography (KavithKadam 2013), which are primary concerned with the protection of intellectual property right.

Watermarking marks all the instance of an object in the same way. Signature is the kind of information hidden in water making to signify that the originality or ownership for the purpose of copyright property. Fingerprinting embeds different unique mask (KavithKadam 2012) in distinct copies of the carrier object that are supplied to different customers. With this, the intellectual owner identifies the customer that break or violates their licensing agreement by supplying the property to third parties. Cryptography is a techniques used in securing the secrecy of transmitted information. It is not often enough to keep the contents of a message secret. Various methods have been developed in encrypting and decrypting data in order to keep the information secret. It may also be necessary to keep the existence of information secret. Steganography is a technique used in keeping the existence of an information secret.

Fig1: Basic Steganography Architecture.

1.1 Motivation

The research work is motivated by the challenges of transmitting sensitive information from the sender to a targeted recipient with an interception of a third party or adversary considering the security challenges of confidentiality, integrity and availability of data in Nigeria.

1.2 Objective or Goal of the Research Work

The basic goal of the work is to provide secret transmission of the sensitive information, other goals include

1.     To design a robust steganographic: algorithm to embed sensitive information.

2.     To transmit the embedded (stego image) to a target recipient.

3.     To decrypt the embedded image to obtain the sensitive information.

4.     To successful transmit the message or information without interception of an adversary or attacker.

5.     To generate a secret key for encrypting and decrypting of the message.

6.     To transmit the secrete key to the recipient.

1.3  Applicable Areas of the Proposed Work

Considering cyber security and other related security challenges, the work if adopted could provide the security of data and information to the following;

· Aid transmission of high-level or top-secret documents between governments and her agencies.

·  In identity management (identity card), details of personal information could be embedded in JPEG image as passport photography.

·  It could be implemented by INEC in safely online election in online voting system.

·  Use by the Nigeria Military Force in communication system.

· Use in the medical field to communicate hidden details of patients’ treatment as it could be embedded into images and send to authorized users so as to reduce time period of carry file, cost and protection of the resulting information.

1.4   Scope and Limitation

1. The research work was mainly targeted on image steganography by  embedding the sensitive information in a stego image.

2. The statistical analysis of the stego-image was not considered.

3.  Java platform format was developed to embed the information.

  DOWNLOAD THE FULL PROJECT

DESIGN AND IMPLEMENTATION OF A ROBUST STEGANOGRAPHIC SYSTEM FOR EMBEDMENT OF SENSITIVE INFORMATION

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON DESIGN AND IMPLEMENTATION OF A ROBUST STEGANOGRAPHIC SYSTEM FOR EMBEDMENT OF SENSITIVE INFORMATION INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Abdulrazak Bello Marsha
Usman Dan fodio University
It was quite a better guide for project and paper presentation purpoting. Many thanks.
Average
Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
Merry From BSU
I am now a graduate because of iprojectmaster.com, God Bless you guys for me.
Excellent
Uduak From Uniuyo
IProjectMaster is the best project site for students. Their works are unique and free of plagiarism!
Excellent
Abdulrahman Jibrin
Nti Abaji
Nice one work prompt delivery tanx
Very Good
Stancy M
Abia State University, Uturu
I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much iprojectmaster, infact, I owe my graduating well today to you guys...
Excellent
Emmanuel Essential
Kogi state University
I actually took the risk,you know first time stuff But i was suprised i received as requested. I love you guys 🌟 🌟 🌟 🌟
Very Good
Temitayo Ayodele
Obafemi Awolowo University
My friend told me about iprojectmaster website, I doubted her until I saw her download her full project instantly, I tried mine too and got it instantly, right now, am telling everyone in my school about iprojectmaster.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work
Very Good
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
Musa From Ahmadu Bello University
Thank you iprojectmaster for saving my life, please keep it up and may God continue to bless you people.
Excellent

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on DESIGN AND IMPLEMENTATION OF A ROBUST STEGANOGRAPHIC SYSTEM FOR EMBEDMENT OF SENSITIVE INFORMATION?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on DESIGN AND IMPLEMENTATION OF A ROBUST STEGANOGRAPHIC SYSTEM FOR EMBEDMENT OF SENSITIVE INFORMATION?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for DESIGN AND IMPLEMENTATION OF A ROBUST STEGANOGRAPHIC SYSTEM FOR EMBEDMENT OF SENSITIVE INFORMATION, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!