Other Journals Published by Timeline Publication Pvt. Ltd.
IJECCE
IJEIR
IJAIR
IJAIM
IJRAS
IJISM
IJIRES
IJASM
IJRIES
Latest News
Submissions open
"Submissions Open For Vol. 15,Issue 3, May. - June, 2024"
Successfully Published
Volume 15,Issue 2, Mar. - Apr. 2024
Send your paper at E-mail:
submit2ijecce@yahoo.in , submit@ijecce.org
Employing The Use of Steganography for The Secured Transmission of Information In Mobile Devices
Bolude Oluwatosin Racheal; Dr. Olajide Olusegun Adeosun
Individuals and corporate establishments alike are faced with threat from malicious attacks and infringement of their privacy over the internet or while using mobile devices. For this reason, there is a need for an enhanced means of information detection. Steganography is the practice of protecting files by hiding it within other files. This concept has been used by many businesses since its introduction. It has been applied in the field of communication most especially in the music industry. Information can be embedded in computer files like images, videos or audio. Hiding data in plain sight by encryption can draw unwanted attention to hidden messages thereby leading to high cases of attempts on decryption by unauthorized persons as such there is need to hide data in a form that will not be suspected by attackers. The aim of this research is to develop the possibility of using steganography mobile devices for the transmission of secured information. The system will be designed using UML (Unified Modeling Language) tools and android phone as the developing environment. The successful implementation of steganography can boost security for highly confidential files or messages that are meant to be kept in top secret forms in mobile devices.