INTRODUCTION

 

 

 

 

The requirements of Information Security within an organization have undergone two major changes in the last several decades. Before the widespread use of Data Processing equipment, the security of information felt to be valuable to an organization was provided primarily by physical and administrative means.

 

With the introduction of computer, the need for automated tools for protecting files and other information stored on the computer became evident; this is specially for the case of shared systems (Time Sharing Systems), and the need is even more acute for systems that can be accessed over a public telephone or a data network. The generic name for the collection of tools designed to protect data and to thwart hackers is Computer Security.

 

The second major change that affected security is the introduction of distributed systems and the use of networks and communication facilities for carrying data between user and computer and between computer and computer. Network security measures needed to protect data during transmission and to guarantee that the data is authentic.

 

Subsequent research in the field of conventional encryption systems have led to the development of new network authentication technique called Steganography, which ensures data hiding within application files without any apparent change to an opponent.

 

Our project delves into the realms of this latest Network Authentication Technique and strives to implement it on text and image files.

                      BACK TO HOME                              BACK TO CONTENT