Information Technology And Cryptography

Improved Essays
These days Internet has made it easier to send and receive accurate data from any destination, which is a rapid development. There are different transmission media to transfer the data to destination such as social sites, emails, file sharing sites, etc. Also, it might be easier to modify and misuse the significant data by hacking. There are many approaches to transfer the data securely to the destination without any modifications like cryptography and steganography.

The project report is focused on image steganography, also the various security problems; overall overview of cryptography, steganography and digital watermarking approaches.

Furthermore, the project includes in-depth debate of various steganography algorithms such as Least
…show more content…
Background

One of the most significant factors of information technology and communication since the rise of Internet is the security of data. Internet security has gained an importance because of the increasing number of Internet users.

Cryptography and steganography are two approaches used to secure information. Cryptography was a technique created to secure the privacy of communication and in order to keep the contents of a message secret a number of various approaches were developed to encrypt and decrypt data.

Regrettably, in some situation it might be not enough to keep the contents of a message secret, it might be vital to keep the presence of the message secret. The approach applied to implement this, is known as steganography.

Steganography is known as the science of hiding data. The word “Steganography” is a Greek word, which means, “Covered or hidden writing”. The major purpose of it is to conceal the very existence of the secret message in the cover medium. The two approaches are counter parts in digital security. The distinct advantage of steganography over cryptography is that messages do not engage interest to themselves, to messengers, or to recipients. There are several applications that included this type of approach because of its importance. The first purpose of the project is to investigate and analyze steganography and how it is implemented. The implementation and evaluation will be analyzed on some common steganography methods. BMP images will be
…show more content…
The two methods steganography and cryptography can be used together. Thus it is recommended to use encryption in conjunction with steganography.

3. Motivation

This research motivation came after I have studied a Computer Forensics Investigations course at Unitec Institute of Technology. The lecturer provided some useful resources to read and gain more knowledge about steganography and other topics, which made me keener to learn more about steganography and how it is implemented.

4. Goal

The purpose of Steganography is to maintain secret communication between two parties. The first goal of the project is to secure and covert information and to know if there is any threat coming from the outside. The second goal is to avoid drawing suspicion to the existence of a hidden

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ism 491a Capstone Project

    • 695 Words
    • 3 Pages

    This document provides the progress of my ISM 491a capstone project. This project was to research an encryption method that would strengthen the company’s environment and protect them if there was ever a data breach. As presented in my project proposal, I identified two principal objectives for this project to be successful. The first was to perform an assessment of the environment currently in place, and the second was to come up with an encryption solution that can be implemented in the company‘s environment without disrupting any applications or processes. This update will provide the research that is completed to this point, the area that I am falling behind in, and the strategy to bring the delinquent tasks up to date.…

    • 695 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    e) Size of the message retrieved id 107 bytes. determined as follows:- Size (message) = number of characters in the message User is asked to send message of this size. Simulation has been done in CloudSim3.0. Shares of file have been constructed in datacenter and these shares have been sent to hosts (servers) available in that datacenter.…

    • 599 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The NSA/CSS strives to lead an expert workforce for their best efforts to advance and operate cryptologic systems and tools. They also look to improve performance and integration of their core expertise and of their mission to protect and defend. The agency must also make sense of and securely share electronically gathered information as well as increase security of national security systems. To accomplish these goals, a five-step strategy has been set in place. First, the NSA/CSS must succeed in todays operations by enabling wise…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Neil Nandwani Coach Neuman American Lit 8/21/15 The Power of Belief “Some people think that the truth can be hidden with a little cover-up and decoration. But as time goes by, what is true is revealed, and what is fake fades away”-(Brainy Quote). In this Quote, I think Ismail Haniyeh is trying to say that you can cover something up for a while, but eventually the truth always comes out.…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HIPAA Essay

    • 596 Words
    • 3 Pages

    HIPAA Eighteen years ago the healthcare system, had a revolutionary change introducing the Health Portability and Accountability Act (HIPAA) of 1996, this law had a significant impact in both the patient and the health care provider. The HIPAA Privacy Rule, finally came effective in 1996, followed by the HIPAA Security Rule in 2003, changing the history in the practice of medicine and health insurance administration. Later, the HIPAA Enforcement Rule and the Breach Notification Rule was followed as well. People were skeptical and wondered whether the new HIPAA would really make a impact, and if any impact would be for the better or the worse.…

    • 596 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The time of modern technology, where we live today, brings us daily changes. Smartphones, tablets, high definition televisions, personal computers, and many other devices help us to manage our time better and increase our productivity. Health field is one of the rapidly growing field when it comes about technology. With so many computer programs specially designed for health field, liability of medical stuff and physicians takes less effort now to complete patient’s records with high percentage of quality, accuracy, accessibility, and consistency. Transition from manual medical record to electronic medical record is a processes that will improve security and flexibility of managing patient’s information.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Patient Watermarking

    • 994 Words
    • 4 Pages

    The protection of the information is considered a big challenge for all the systems, which manage fragile information of their clients. As a result, the systems should provide security that permits people to trust in their companies and services. Nowadays, the technological environment offers many algorithms and methods that permit to keep the information safe. One of the recent innovation is watermarking. Watermarking is a security method that help people to keep the information protected against unauthorized viewers.…

    • 994 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The overall purpose of the letter is to address the large companies that by encrypting technology, it hinders the government and the police’s ability to solve crimes effectively and prevent terrorism which could be hidden because of encryption.…

    • 788 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Assignment Submitted By Yours Name here Submitted To Yours Instructor Name here To Meet the Needs of the Course Nov., 2015. For this rhetorical analysis task, I have selected the article which is titles as Why Privacy Matters Even if You Have Nothing to Hide, written by Daniel J. Solove.…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Some were simply unaware that government surveillance occurs at all. The purpose of this project is to make people aware of surveillance and to show them the harmful effects that surveillance can have. In order to do that, I have to provide some background. First, I need to explain encryption.…

    • 1437 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Covert observation is when the participant is unaware that they are been observed. Often, some individuals go under cover to do their observations. (Encyclopedia.com, 2015) The advantages of covert observation is it does not disturb the normal behaviour of the group because the participant is unaware they are being observed so they would not act differently they would act in a way they would normally act. Therefore, there is higher validity because the participant would not be able to change their behaviour to make themselves look better because they have no idea. Another advantage is it allows the researcher to gain more in-depth and detailed information about the group they are observing because they are undercover and unaware so they would be able to find out more detail because the participants are unaware they would not change their behaviour.…

    • 1170 Words
    • 5 Pages
    Improved Essays

Related Topics