Show simple item record

dc.contributor.authorBetariza, Alvin Alfred
dc.contributor.authorShanie, Godfrey
dc.contributor.authorMusinguzi, Joseph
dc.contributor.authorKalanzi, Tonny
dc.date.accessioned2023-02-01T12:32:11Z
dc.date.available2023-02-01T12:32:11Z
dc.date.issued2022-08
dc.identifier.citationBetariza, A.A. et al. (2022). Email encryption with image steganography(Unpublished undergraduate dissertation). Makerere University.en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12281/15251
dc.descriptionA project report submitted to the School of Computing and Informatics Technology for the study leading to a project in partial fulfillment of the requirements for the award of the Degree of Bachelor of Science in Software Engineering of Makerere University.en_US
dc.description.abstractTo be considered secure, a communication system needs to be subtle, discrete, legal, and easy to use. At some point in their life, many people had to converse covertly. Some individuals need secure communication because they value their privacy. Others worry about security since they are sending important information. Specialized security measures are required due to the modern communications' growing capabilities, especially on computer networks. Network security is crucial because of the rising volume of data being sent online. Confidentiality and data integrity are crucial for protecting against unauthorized access and use. As a result, interest in the field of information concealing has skyrocketed. The confidentiality of conveyed information has been protected by a variety of strategies over the years, with cryptography being the most widely used. On the other side, encrypted communication occasionally gives an attacker enough data to conduct a full-scale attack, necessitating the use of steganography to hide the existence of sent data. The Image Steganography Communication System is what we developed to possibly provide an additional layer of security by ensuring confidentiality using image steganography. The system in question would allow its users to communicate using images. To third parties who may gain unauthorized access to user’s inboxes it would give the illusion that the system users are simply sharing images with one another and not send text messages.en_US
dc.language.isoenen_US
dc.publisherMakerere Universityen_US
dc.subjectImage Steganography Communication Systemen_US
dc.subjectNetwork securityen_US
dc.subjectCommunication systemsen_US
dc.titleEmail encryption with image steganographyen_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record