Image steganography applications for secure communication

Show simple item record

dc.contributor.advisor Engelbrecht, Andries P.
dc.contributor.postgraduate Morkel, Tayana en
dc.date.accessioned 2013-09-07T17:14:25Z
dc.date.available 2013-01-09 en
dc.date.available 2013-09-07T17:14:25Z
dc.date.created 2012-09-06 en
dc.date.issued 2012 en
dc.date.submitted 2012-11-28 en
dc.description Dissertation (MSc)--University of Pretoria, 2012. en
dc.description.abstract To securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication. Encryption is often used to protect secret information from unauthorised access. Encryption, however, is not inconspicuous and the observable exchange of encrypted information between two parties can provide a potential attacker with information on the sender and receiver(s). The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. This dissertation investigates and discusses the use of image steganography, a technology for hiding information in other information, to facilitate secure communication. Secure communication is divided into three categories: self-communication, one-to-one communication and one-to-many communication, depending on the number of receivers. In this dissertation, applications that make use of image steganography are implemented for each of the secure communication categories. For self-communication, image steganography is used to hide one-time passwords (OTPs) in images that are stored on a mobile device. For one-to-one communication, a decryptor program that forms part of an encryption protocol is embedded in an image using image steganography and for one-to-many communication, a secret message is divided into pieces and different pieces are embedded in different images. The image steganography applications for each of the secure communication categories are discussed along with the advantages and disadvantages that the applications have over more conventional secure communication technologies. An additional image steganography application is proposed that determines whether information is modified during communication. Copyright en
dc.description.availability unrestricted en
dc.description.department Computer Science en
dc.identifier.citation Morkel, T 2012, Image steganography applications for secure communication, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/29906 > en
dc.identifier.other E12/9/263/gm en
dc.identifier.upetdurl http://upetd.up.ac.za/thesis/available/etd-11282012-124016/ en
dc.identifier.uri http://hdl.handle.net/2263/29906
dc.language.iso en
dc.publisher University of Pretoria en_ZA
dc.rights © 2012, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria en
dc.subject Image processing en
dc.subject Steganography en
dc.subject Information hiding en
dc.subject Computer security en
dc.subject Image authentication en
dc.subject Secure communication en
dc.subject UCTD en_US
dc.title Image steganography applications for secure communication en
dc.type Dissertation en


Files in this item

This item appears in the following Collection(s)

Show simple item record