Research Article
BibTex RIS Cite

Developing an End-to-End Secure Emailing Add-in using Steganography

Year 2018, , 209 - 214, 31.12.2018
https://doi.org/10.31590/ejosat.453530

Abstract

Thanks to the emergence and spread of the internet, email is one of the
main and fastest communication tools in both daily and business life. The
amount and the importance of data exchanged in emailing have been continuously
increasing. This brings the security-related issues. To be able to protect the
security of the information, there has been a need to develop innovative ways.
Although most email servers are already including some measures, there could
some cases in which higher level security measures would be needed. In this
paper, we propose an end-to-end secure emailing add-in using the steganographic
method, which involves communicating secret data in an appropriate multimedia
carrier, e.g., image, audio, and video files.  The purpose of the system outlined in this
paper is to implement the concept of “information confidentially” through both
steganographic and cryptographic techniques. This system is integrated into one
of the most commonly used commercial emailing software, Microsoft Outlook as an
add-in. 

References

  • Kaushal, Singh V.P., Bamal R. (2013). Steganography: A Modern Day Art and Science For Data Hiding, International Journal of Latest Research in Science and Technology, 2(4), 9-142.
  • Gupta, Shailender, Ankur Goyal, and Bharat Bhushan. "Information hiding using least significant bit steganography and cryptography." International Journal of Modern Education and Computer Science 4.6 (2012): 27.
  • Johnson N.F., Jajodia S. (1998). Exploring Steganography: Seeing the Unseen, IEEE, 31(2), 26-34
  • Zielińska, E., Mazurczyk, W., & Szczypiorski, K. (2014). Trends in steganography Communications of the ACM, 57(3), 86-95
  • Sheelu, Ahuja, B., (2013), “An Overview of Steganography”, IOSR Journal of Computer Engineering, 11(1), 15-19.
  • Rana M.S, Sangwan B.S., Jangir J.S. (2010). Art of Hiding: An Introduction to Steganography, International Journal of Engineering and Computer Science,1(1), 11- 22.
  • Jammi Ashok, Y. Raju, S. Munishankaraiah, K. Srinivas "Steganography: An Overview" in International Journal of Engineering Science and Technology, 2(10), 2010.
  • K.P.Adhiya and Swati A. Patil, Hiding Text in Audio Using LSB Based Steganography, Information and Knowledge Management, 2(3), 2012.
  • Pratap Chandra Mandal, Modern Steganographic technique: A survey, International Journal of Computer Science & Engineering Technology (IJCSET), 2012.
  • Rout, H., Mishra, B.K., Pros, and Cons of Cryptography, Steganography, and Perturbation techniques, IOSR Journal of Electronics and Communication Engineering, 76-81, 2014.

Developing an End-to-End Secure Emailing Add-in using Steganography

Year 2018, , 209 - 214, 31.12.2018
https://doi.org/10.31590/ejosat.453530

Abstract

Thanks to the emergence and spread of the internet, email is one of the main and fastest communication tools in both daily and
business life. The amount and the importance of data exchanged in emailing have been continuously increasing. This brings the
security-related issues. To be able to protect the security of the information, there has been a need to develop innovative ways.
Although most email servers are already including some measures, there could some cases in which higher level security measures
would be needed. In this paper, we propose an end-to-end secure emailing add-in using the steganographic method, which involves
communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The purpose of the system
outlined in this paper is to implement the concept of “information confidentially” through both steganographic and cryptographic
techniques. This system is integrated into one of the most commonly used commercial emailing software, Microsoft Outlook as an
add-in

References

  • Kaushal, Singh V.P., Bamal R. (2013). Steganography: A Modern Day Art and Science For Data Hiding, International Journal of Latest Research in Science and Technology, 2(4), 9-142.
  • Gupta, Shailender, Ankur Goyal, and Bharat Bhushan. "Information hiding using least significant bit steganography and cryptography." International Journal of Modern Education and Computer Science 4.6 (2012): 27.
  • Johnson N.F., Jajodia S. (1998). Exploring Steganography: Seeing the Unseen, IEEE, 31(2), 26-34
  • Zielińska, E., Mazurczyk, W., & Szczypiorski, K. (2014). Trends in steganography Communications of the ACM, 57(3), 86-95
  • Sheelu, Ahuja, B., (2013), “An Overview of Steganography”, IOSR Journal of Computer Engineering, 11(1), 15-19.
  • Rana M.S, Sangwan B.S., Jangir J.S. (2010). Art of Hiding: An Introduction to Steganography, International Journal of Engineering and Computer Science,1(1), 11- 22.
  • Jammi Ashok, Y. Raju, S. Munishankaraiah, K. Srinivas "Steganography: An Overview" in International Journal of Engineering Science and Technology, 2(10), 2010.
  • K.P.Adhiya and Swati A. Patil, Hiding Text in Audio Using LSB Based Steganography, Information and Knowledge Management, 2(3), 2012.
  • Pratap Chandra Mandal, Modern Steganographic technique: A survey, International Journal of Computer Science & Engineering Technology (IJCSET), 2012.
  • Rout, H., Mishra, B.K., Pros, and Cons of Cryptography, Steganography, and Perturbation techniques, IOSR Journal of Electronics and Communication Engineering, 76-81, 2014.
There are 10 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Taner Sayım This is me 0000-0003-0661-9536

Armağan Elibol 0000-0003-0661-9536

Publication Date December 31, 2018
Published in Issue Year 2018

Cite

APA Sayım, T., & Elibol, A. (2018). Developing an End-to-End Secure Emailing Add-in using Steganography. Avrupa Bilim Ve Teknoloji Dergisi(14), 209-214. https://doi.org/10.31590/ejosat.453530