dc.contributor.author | Betariza, Alvin Alfred | |
dc.contributor.author | Shanie, Godfrey | |
dc.contributor.author | Musinguzi, Joseph | |
dc.contributor.author | Kalanzi, Tonny | |
dc.date.accessioned | 2023-02-01T12:32:11Z | |
dc.date.available | 2023-02-01T12:32:11Z | |
dc.date.issued | 2022-08 | |
dc.identifier.citation | Betariza, A.A. et al. (2022). Email encryption with image steganography(Unpublished undergraduate dissertation). Makerere University. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12281/15251 | |
dc.description | A project report submitted to the School of Computing and Informatics Technology for the study leading to a project in partial fulfillment of the requirements for the award of the Degree of Bachelor of Science in Software Engineering of Makerere University. | en_US |
dc.description.abstract | To be considered secure, a communication system needs to be subtle, discrete, legal, and easy to use.
At some point in their life, many people had to converse covertly. Some individuals need secure communication because they value their privacy. Others worry about security since they are sending important information.
Specialized security measures are required due to the modern communications' growing capabilities, especially on computer networks. Network security is crucial because of the rising volume of data being sent online. Confidentiality and data integrity are crucial for protecting against unauthorized access and use. As a result, interest in the field of information concealing has skyrocketed.
The confidentiality of conveyed information has been protected by a variety of strategies over the years, with cryptography being the most widely used.
On the other side, encrypted communication occasionally gives an attacker enough data to conduct a full-scale attack, necessitating the use of steganography to hide the existence of sent data.
The Image Steganography Communication System is what we developed to possibly provide an additional layer of security by ensuring confidentiality using image steganography. The system in question would allow its users to communicate using images. To third parties who may gain unauthorized access to user’s inboxes it would give the illusion that the system users are simply sharing images with one another and not send text messages. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Makerere University | en_US |
dc.subject | Image Steganography Communication System | en_US |
dc.subject | Network security | en_US |
dc.subject | Communication systems | en_US |
dc.title | Email encryption with image steganography | en_US |
dc.type | Thesis | en_US |