Using image steganography for decryptor distribution

  • Authors:
  • T. Morkel;J. H. P. Eloff;M. S. Olivier

  • Affiliations:
  • Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, Pretoria, South Africa;Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, Pretoria, South Africa;Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, Pretoria, South Africa

  • Venue:
  • OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

When communicating secret information there is more than one route to follow to ensure the confidentiality of the message being transmitted Encryption might be an obvious choice; however there are limitations and disadvantages to using encryption An alternative approach is steganography, which is a technology for hiding information in other information Combining the two disciplines may provide better security but more overhead, since the receiver must now have knowledge not only of how the information was encrypted, but also of how it was hidden, in order to retrieve the message This paper proposes a system where image steganography is combined with encryption by hiding not only a message inside an image, but also the means to extract and decrypt the message An executable program is hidden inside the image that functions as a decryptor, enabling the receiver to be oblivious to the encryption algorithm used.