CFP last date
20 May 2024
Reseach Article

Implementation and Analysis of Email Messages Encryption and Image Steganography Schemes for Image Authentication and Verification

by Dr.C.Uma Shanker, Dr.S.M.Verma, Ms.B.Veera Jyothi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 5
Year of Publication: 2010
Authors: Dr.C.Uma Shanker, Dr.S.M.Verma, Ms.B.Veera Jyothi
10.5120/911-1289

Dr.C.Uma Shanker, Dr.S.M.Verma, Ms.B.Veera Jyothi . Implementation and Analysis of Email Messages Encryption and Image Steganography Schemes for Image Authentication and Verification. International Journal of Computer Applications. 5, 5 ( August 2010), 22-27. DOI=10.5120/911-1289

@article{ 10.5120/911-1289,
author = { Dr.C.Uma Shanker, Dr.S.M.Verma, Ms.B.Veera Jyothi },
title = { Implementation and Analysis of Email Messages Encryption and Image Steganography Schemes for Image Authentication and Verification },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 5 },
number = { 5 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume5/number5/911-1289/ },
doi = { 10.5120/911-1289 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:06.668608+05:30
%A Dr.C.Uma Shanker
%A Dr.S.M.Verma
%A Ms.B.Veera Jyothi
%T Implementation and Analysis of Email Messages Encryption and Image Steganography Schemes for Image Authentication and Verification
%J International Journal of Computer Applications
%@ 0975-8887
%V 5
%N 5
%P 22-27
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image Steganography is to hide messages or information within other information in such a way as to not be detectable. This makes use of the fact that there is a large amount of data being transferred every second, making it impossible to scan all the information for hidden messages. Typical cryptographic methods obscure the information, but it is still very obvious that a message is being sent. Steganography attempts to correct this flaw so an observer is unable to know if a message is being sent or not. This can be used in addition to traditional cryptographic methods, so the security will only be enhanced, assuming that the traditional methods are being used with the same rigor as before.

References
  1. Ping Wah Wong; Memon, N., “Secret and public key image watermarking schemes for image authentication and ownership verification”, Image Processing, IEEE Transactions on, Volume 10, Issue 10, Page(s):2-8
  2. Dekun Zou, Chai Wah Wu, GuorongXuan, Yun Q. Shi, “A content-based image authentication system with lossless data hiding”, Multimedia and Expo, International Conference on, Volume: 2, Page(s):1-3
  3. W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted images”, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Edited by Delp, Edward J., III; Wong, Ping Wah; Dittmann, Jana; Memon, Nasir D. Proceedings of the SPIE, Volume 6819, (2008), Pages(s): 2-5
  4. Debnath Bhattacharyya1, Poulami Das1, Samir Kumar Bandyopadhyay, and Tai-hoon Kim “Text Steganography: A Novel Approach” (2009)
  5. Wayner, Peter (2002). “Disappearing cryptography: information hiding: steganography & watermarking”. Amsterdam: MK/Morgan Kaufmann Publishers. ISBN 1-55860-769-2.
  6. Wayner, Peter (2009). “Disappearing cryptography 3rd Edition: information hiding: steganography & watermarking”. Amsterdam: MK/Morgan Kaufmann Publishers. ISBN 978-0123744791.
  7. Petitcolas, Fabian A.P.; Katzenbeisser, Stefan (2000). “Information Hiding Techniques for Steganography and Digital Watermarking”. Artech House Publishers. ISBN 1-58053-035-4.
  8. Johnson, Neil; Duric, Zoran; Jajodia, Sushil (2001). Information hiding: steganography and watermarking: attacks and countermeasures. Springer. ISBN 978-0-7923-7204-2.
  9. Westfeld, A. (2001). F5-a steganographic algorithm: High capacity despite better steganalysis. In Proc. 4th Int’l Workshop Information Hiding, pages 289–302.
  10. W. Brown and B.J. Shepherd, Graphics File Formats: Reference and Guide, Manning Publications, Greenwich, Conn, 1995.
  11. E. Koch, J. Rindfrey, and J. Zhao, “Copyright Protection for Multimedia Data,” Proc. Int’l Conf. Digital Media and Electronic Publishing, Leeds, UK 1994.
Index Terms

Computer Science
Information Sciences

Keywords

cryptography digital signature Image Steganography watermarking