1.0 Background to the Study
The internet is an integral part of our daily lives, and the proportion of the people who are expected to be able to manage their bank account anywhere, anytime is constantly growing. As such, internet mobile banking has come of age as a crucial component of any financial institution’s multichannel strategy. Internet mobile banking uses mobile phone with internet facility as the delivery channel to conduct banking activities like transferring funds, paying bills, viewing account statements, paying mortgages and purchasing financial certificates of deposits etc. Many organization or financial institutions are now incorporating internet mobile banking as a key component of their growth strategy, and use of the mobile phone to conduct banking and financial services tasks continues to rise among early adopters. (Barnes, S.J., and Corbitt, B. Mobile Banking: Concept and Potential, International Journal of Mobile Communications, 1 (3), pp. 273-288, 2003).
Cryptography and steganography are well known and widely used techniques that manipulate information (messages) in order to cipher or hide their existence. These techniques have many applications in computer science and other related fields: they are used to protect e-mail messages, credit card information, corporate data, and other valuable information.
More specifically, steganography is the art and science of communicating in a way which hides the existence of the communication (Johnson and Jajodia, 1998). A steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion (Provos and Honeyman, 2003). As an example, it is possible to embed a text inside an image or an audio file.
On the other hand, cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication (Menezes, A., Van Oorschot, P., and Vanstone, S. 1996).
Crystography is the combination of Cryptography and Steganography for ensuring security of information whether in store or in transit (Gabriel J.A 2015). Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of Steganography techniques some are more complex than others and all of them have respective strong and weak points. Cryptography was used to assure only secrecy, signatures, and other physical mechanisms were typically used to assure integrity of the media and authenticity of the sender.
With the advent of electronic funds transfer, the applications of steganography for integrity began to surpass its use for secrecy. In the information age, steganography has become one of the major methods for protection in all applications.
CITE THIS WORK
- Related Works
- Design And Implementation Of Database System For Patient Management System (a Case Study Of Delta Hospital Onitsha)
- Design And Implication Of Civil Service Salary Payment System (a Case Study Of Civil Service Commission Enugu)
- Remote Pc Access In Cyber Cafe (case Study Of Pressure World Cafe )
- Retrieving Files Using Content Based Search
- The Design And Implementation Of Civil Service Promotion Scheme System. (a Case Study Of Local Government Service Commission Enugu)
- Design And Simulation Of Vehicle Speed Control System
- Design And Implementation Of Scet Intranet
- Design And Implementation Of Computerized Medical Duties Scheduling System (a Case Study Of University Of Nigeria Teaching Hospital)
- Application Of Expert System
- Design And Implementation Of A Case Filling System For A Drug Monitoring Agency (a Case Study Of Ndlea Area Office Enugu)