CFP last date
15 May 2024
Reseach Article

Design and Implementation of a Model for Information Privacy

by Akinwale O. Akinwunmi, Halleluyah O. Aworinde, Oliseamaka T. Olise
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 4
Year of Publication: 2015
Authors: Akinwale O. Akinwunmi, Halleluyah O. Aworinde, Oliseamaka T. Olise
10.5120/ijais15-451388

Akinwale O. Akinwunmi, Halleluyah O. Aworinde, Oliseamaka T. Olise . Design and Implementation of a Model for Information Privacy. International Journal of Applied Information Systems. 9, 4 ( July 2015), 10-16. DOI=10.5120/ijais15-451388

@article{ 10.5120/ijais15-451388,
author = { Akinwale O. Akinwunmi, Halleluyah O. Aworinde, Oliseamaka T. Olise },
title = { Design and Implementation of a Model for Information Privacy },
journal = { International Journal of Applied Information Systems },
issue_date = { July 2015 },
volume = { 9 },
number = { 4 },
month = { July },
year = { 2015 },
issn = { 2249-0868 },
pages = { 10-16 },
numpages = {9},
url = { https://www.ijais.org/archives/volume9/number4/767-1388/ },
doi = { 10.5120/ijais15-451388 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:59:59.638448+05:30
%A Akinwale O. Akinwunmi
%A Halleluyah O. Aworinde
%A Oliseamaka T. Olise
%T Design and Implementation of a Model for Information Privacy
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 9
%N 4
%P 10-16
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the world today, privacy and security of data are requirements so difficult to meet by developers and service providers);( the privacy of users and their data are threatened more and more by government agencies looking to collect as much information as possible for various reasons including security, private companies looking to cash in on the various social connections that people have developed their social graph. A review of the existing works on still image steganography and particularly the method of least significant bit hiding was done. Algorithms for the encoding and retrieval of a message into a bitmap file were designed and an application showcasing the use of steganography coupled with cryptography was developed using Microsoft Visual C)++(. This work therefore, designed and implemented a model for information privacy. The study indicated that steganography combined with cryptography provides both security and privacy for encrypting a message.

References
  1. Shamim Ahmed Laskar and Kattamanchi Hemachandran 2012. High Capacity Data Hiding Using LSB Steganography and Encryption. International Journal of Database Management Systems pp. 57-68
  2. Schneier, B. 2013. The NSA Is Breaking Most Encryption on the Internet. Resilient Systems, Inc Available at https://www. schneier. com/blog/archives/2013/09/the_nsa_is_brea. html
  3. Kirkus Reviews 2013. 301 Industry-First Reviews of fiction, nonfiction and children's & teen May 15, 2013: Volume LXXXI, No 10 Available at: http://issuu. com/kirkus-reviews/docs/kirkus_051513_issue
  4. Dunbar, B. 2002. A Detailed look at Steganographic Techniques and their use in an Open-Systems Environment. SANS Institute InfoSec Reading Room.
  5. Abikoye Oluwakemi C. , Adewole Kayode S. and Oladipupo Ayotunde J. 2012. Efficient Data Hiding System Using Cryptography and Steganography. International Journal of Applied Information Systems IJAIS411 pp. 6-11
  6. Dickman S. D. 2007. An Overview of Steganography. Department of Computer Science, James Madison University Infosec Techreport
  7. Provos N. & Honeyman P. 2003. Hide and Seek: An Introduction to Steganography
  8. Herodotus 1996. The Histories, Pengium Classics; Reprint edition
  9. Krenn J. R. 2004. Steganography and Steganalysis
  10. Zeki, A. M. , Ibrahim, A. A. and Manaf, A. A. 2012. Steganographic Software: Analysis and Implementation. International Journal of Computers and Communications.
  11. Cummins, J. , Diskin, P. , Lau, S. and Parlett, R. 2004. Steganography and Digital Watermarking. School of Computer Science, The University of Birmingham.
  12. Samir, B. K. , Debnath, B. , Debashis, G. , Swamendu, M. , & Poulami, D. 2008. A Tutorial Review on Steganography. IC3.
  13. Shashikala Channalli and Ajay Jadhav 2009. Steganography An Art of Hiding Data. International Journal on Computer Science and Engineering
  14. Mehdi Hussain and Mureed Hussain 2013. A Survey of Image Steganography Techniques
  15. Nameer N. El-Emam 2007. Hiding a Large Amount of Data with High Security Using Steganography Algorithm. Journal of Computer Science 34 pp. 223-232
  16. Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai 2012. Advances in Computer Science and Information Technology. Proceedings of the Second International Conference, CCSIT 2012 Bangalore, India pp229
  17. Li B. , He J. and Huang J. 2011. A Survey on Image Steganography and Steganalysis. Journal of Information Hiding and Multimedia Signal Processing pp. 142-172
  18. Bruce Schneier; John Kelsey; Doug Whiting; David Wagner; Chris Hall; Niels Ferguson; Tadayoshi Kohno et al. May 2000. "The Twofish Team's Final Comments on AES Selection"
  19. Kelsey, J. Schneier, B. Wagner, D. Hall C. 1998. "Cryptanalytic Attacks on Pseudorandom Number Generators". Fast Software Encryption, 5th International Proceedings. http://www. schneier. com/paper-prngs. pdf.
Index Terms

Computer Science
Information Sciences

Keywords

Information Privacy Encryption Steganography Cryptography