ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Encryption of Text in Image over a Network

Journal: International Journal of Multidisciplinary in Cryptology and Information Security (IJMCIS) (Vol.6, No. 4)

Publication Date:

Authors : ; ; ;

Page : 10-17

Keywords : Encryption; Cryptography; Steganography; Cypher; Network.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

An increase in number of attack recorded during electronic exchange of information between the sender and the recipient in the recent years has called for a way to protect data in a robust manner. Most data transmitted over a network is sent in clear text making it easy for intruders to capture and read sensitive information. Encryption algorithms protect data from unwanted person and make sure that only the intended recipient can decipher and read the information. In this project a three tier design architecture process consisting of Blowfish algorithm for cryptography, least significant bit algorithm for steganography and handshaking a client server TCP/IP protocol, was used to develop a model for an encryption of text in image over a network system “a method for securing messages” which encrypts plain text into images before sending them to recipient. Cryptography is simply the translation of data into a secret code, and it is considered the most effective way to ensure data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Modern encryption is achieved using algorithms with a “key” to encrypt text or other data into digital nonsense and then decrypting it by restoring it to its original form. Steganography hides the existence of a secret message and in the best case nobody can see that both parties are communicating in secret. This makes steganography suitable for some tasks for which cryptography is not. The model was implemented using socket programming (Visual C#.net) to design the user interface. Every part of the systems was tested and found working.

Last modified: 2017-09-05 10:24:36