1.0 Background to the Study
The internet is an integral part of our daily lives, and the proportion of the people who are expected to be able to manage their bank account anywhere, anytime is constantly growing. As such, internet mobile banking has come of age as a crucial component of any financial institution’s multichannel strategy. Internet mobile banking uses mobile phone with internet facility as the delivery channel to conduct banking activities like transferring funds, paying bills, viewing account statements, paying mortgages and purchasing financial certificates of deposits etc. Many organization or financial institutions are now incorporating internet mobile banking as a key component of their growth strategy, and use of the mobile phone to conduct banking and financial services tasks continues to rise among early adopters. (Barnes, S.J., and Corbitt, B. Mobile Banking: Concept and Potential, International Journal of Mobile Communications, 1 (3), pp. 273-288, 2003).
Cryptography and steganography are well known and widely used techniques that manipulate information (messages) in order to cipher or hide their existence. These techniques have many applications in computer science and other related fields: they are used to protect e-mail messages, credit card information, corporate data, and other valuable information.
More specifically, steganography is the art and science of communicating in a way which hides the existence of the communication (Johnson and Jajodia, 1998). A steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion (Provos and Honeyman, 2003). As an example, it is possible to embed a text inside an image or an audio file.
On the other hand, cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication (Menezes, A., Van Oorschot, P., and Vanstone, S. 1996).
Crystography is the combination of Cryptography and Steganography for ensuring security of information whether in store or in transit (Gabriel J.A 2015). Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of Steganography techniques some are more complex than others and all of them have respective strong and weak points. Cryptography was used to assure only secrecy, signatures, and other physical mechanisms were typically used to assure integrity of the media and authenticity of the sender.
With the advent of electronic funds transfer, the applications of steganography for integrity began to surpass its use for secrecy. In the information age, steganography has become one of the major methods for protection in all applications.
CITE THIS WORK
- Related Works
- Design And Implementation Of An On-line Lan Knowledge-based System
- Design And Implementation Of Computerized Medical Duties Scheduling System. (a Case Study Of University Of Nigeria Teaching Hospital)
- Design And Implementation Of Computer Based Lottery Processing System
- Design And Implementation Of A Computerised Bill Of Material Processing System (a Case Study Of Anammco, Enugu)
- Design And Implementation Of A Computerised Human Resources Management System (a Case Study Of Emenite Plc)
- Design And Implementation Of Virtual Library System
- Design And Implementation Of A Computerized Sales Forecasting System (case Of Study Of Nbl 9th Mile Corner Enugu)
- Active Source Routing Protocol For Mobile Ad Hoc
- Design And Implementation Of A Computerised Rural Electrification Information System For A Local Government Authority (lga) (a Case Study Of Enugu South L.g.a)
- Design A Web Based Portal For Student Registration Exercise (case Study Of Mathematics And Computer Science Departments)