Image steganography applications for secure communication

dc.contributor.advisorEngelbrecht, Andries P.
dc.contributor.emailtmorkel@cs.up.ac.zaen
dc.contributor.postgraduateMorkel, Tayanaen
dc.date.accessioned2013-09-07T17:14:25Z
dc.date.available2013-01-09en
dc.date.available2013-09-07T17:14:25Z
dc.date.created2012-09-06en
dc.date.issued2012en
dc.date.submitted2012-11-28en
dc.descriptionDissertation (MSc)--University of Pretoria, 2012.en
dc.description.abstractTo securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication. Encryption is often used to protect secret information from unauthorised access. Encryption, however, is not inconspicuous and the observable exchange of encrypted information between two parties can provide a potential attacker with information on the sender and receiver(s). The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. This dissertation investigates and discusses the use of image steganography, a technology for hiding information in other information, to facilitate secure communication. Secure communication is divided into three categories: self-communication, one-to-one communication and one-to-many communication, depending on the number of receivers. In this dissertation, applications that make use of image steganography are implemented for each of the secure communication categories. For self-communication, image steganography is used to hide one-time passwords (OTPs) in images that are stored on a mobile device. For one-to-one communication, a decryptor program that forms part of an encryption protocol is embedded in an image using image steganography and for one-to-many communication, a secret message is divided into pieces and different pieces are embedded in different images. The image steganography applications for each of the secure communication categories are discussed along with the advantages and disadvantages that the applications have over more conventional secure communication technologies. An additional image steganography application is proposed that determines whether information is modified during communication. Copyrighten
dc.description.availabilityunrestricteden
dc.description.departmentComputer Scienceen
dc.identifier.citationMorkel, T 2012, Image steganography applications for secure communication, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/29906 >en
dc.identifier.otherE12/9/263/gmen
dc.identifier.upetdurlhttp://upetd.up.ac.za/thesis/available/etd-11282012-124016/en
dc.identifier.urihttp://hdl.handle.net/2263/29906
dc.language.isoen
dc.publisherUniversity of Pretoriaen_ZA
dc.rights© 2012, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoriaen
dc.subjectImage processingen
dc.subjectSteganographyen
dc.subjectInformation hidingen
dc.subjectComputer securityen
dc.subjectImage authenticationen
dc.subjectSecure communicationen
dc.subjectUCTDen_US
dc.titleImage steganography applications for secure communicationen
dc.typeDissertationen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
dissertation.pdf
Size:
4.31 MB
Format:
Adobe Portable Document Format