CFP last date
20 December 2024
Reseach Article

Article:A Model of Anonymous cum Idiosyncratic Machiavellian Mailing System Using Steganographic Scheme

by Deo Brat Ojha, Ramveer Singh, Ajay Sharma, Abhishek Shukla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Number 14
Year of Publication: 2010
Authors: Deo Brat Ojha, Ramveer Singh, Ajay Sharma, Abhishek Shukla
10.5120/1318-1805

Deo Brat Ojha, Ramveer Singh, Ajay Sharma, Abhishek Shukla . Article:A Model of Anonymous cum Idiosyncratic Machiavellian Mailing System Using Steganographic Scheme. International Journal of Computer Applications. 8, 14 ( October 2010), 1-4. DOI=10.5120/1318-1805

@article{ 10.5120/1318-1805,
author = { Deo Brat Ojha, Ramveer Singh, Ajay Sharma, Abhishek Shukla },
title = { Article:A Model of Anonymous cum Idiosyncratic Machiavellian Mailing System Using Steganographic Scheme },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 8 },
number = { 14 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume8/number14/1318-1805/ },
doi = { 10.5120/1318-1805 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:57:20.683819+05:30
%A Deo Brat Ojha
%A Ramveer Singh
%A Ajay Sharma
%A Abhishek Shukla
%T Article:A Model of Anonymous cum Idiosyncratic Machiavellian Mailing System Using Steganographic Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 8
%N 14
%P 1-4
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we show a model of an anonymous cum idiosyncratic Machiavellian mailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model a sender can send a secret message even to a unacquainted person in an anonymous way, later which will become idiosyncratic. The users of this model are assumed to be may or may not be the members of a closed organization.

References
  1. A. Menezes, M. Qu, and S. Vanstone, “Key agreement and the need for authentication”, in Proceedings of PKS’95, pp. 34-42, 1995.
  2. E. Kawaguchi and R. O. Eason, "Principle and applications of BPCS-Steganography", Proceedings of SPIE: Multimeda Systems and Applications, Vol.3528, pp.464-463, 1998.
  3. E. Kawaguchi,et al, “A concept of digital picture envelope for Internet communication”, in Information modeling and knowledge bases X,IOS Press, pp.343-349, 1999.
  4. Eiji Kawaguchi, Hideki Noda, Michiharu Niimi and Richard O. Eason, “A Model of Anonymous Covert Mailing System Using Steganographic Scheme, Information modelling and knowledge bases X”,IOS Press, pp.81-85,2003.
  5. K. H. Ko, D. H. Choi, M. S. Cho, and J. W. Lee, “New signature scheme using conjugacy problem”, (http://eprint.iacr.org/2002/168)
  6. K. H. KO, S. J. Lee, J. H. Cheon, J. W. Han, J. S. Kang, and C Park,“ New public-key cryptosystem using braid groups”, in Advances in Cryptology (Crypto’00), LNCS 1880, pp. 166-183, Springer- Verlag, 2000.
  7. L. Law, A. Menezes, M. Qu, J. Solinas, and S. Van- stone, “An Efficient Protocol for Authenticated Key Agreement”, Technical Report CORR98-05, Department of CO, University of Waterloo, 1998.
  8. L. Law, A. Menezes, M. Qu, J. Solinas, and S. Van-stone, “An efficient protocol for authenticated key-agreement”, Design, Codes and Cryptography, vol. 28, no. 2, pp. 119-134, 2003.
  9. M. Niimi, H. Noda and E. Kawaguchi,"An image embedding in image by a complexity based region segmentation method", Proceedings of International Conf.on Image Processing'97, Vol.3, pp.74-77, Santa Barbara, Oct., 1997.
  10. Neil F. Johnson, Zoran Duric and Sushil Jajodia :“Information Hiding”, Kluwer Academic Publishers, 2001.
  11. Stefan Katzenbeisser and Fabien A.P. Petitcolas (eds), “Information hiding techniques for steganography and digital watermarking”, Artech House, 2000.
  12. URL http://www.know.comp.kyutech.ac.jp/BPCSe/Dpenv-e/DPENVe- pro_ down.html.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography e-mailing system