Abstract-The widespread adoption of electronic distribution of material is accompanied by illicit copying and distribution. This is why individuals, businesses and governments have come to think of how to protect their work, prevent such illicit activities and trace the distribution of a document. It is in this context that a lot of attention is being focused on steganography. Implementing steganography in text document is not an easy undertaking considering the fact that text document has very few places in which to embed hidden data. Any minute change introduced to text objects can easily be noticed thus attracting attention from possible hackers. This study investigates the possibility of embedding data in text document by employing the entropy rate of the constituent characters of words not less than four characters long. The scheme was used to embed bits in text according to the alphabetic structure of the words, the respective characters were compared with their neighbouring characters and if the first character was alphabetically lower than the succeeding character according to their ASCII codes, a zero bit was embedded otherwise 1 was embedded after the characters had been transposed. Before embedding, the secret message was encrypted with a secret key to add a layer of security to the secret message to be embedded, and then a pseudorandom number was generated from the word counts of the text which was used to paint the starting point of the embedding process. The embedding capacity of the scheme was relatively high compared with the space encoding and semantic method.Keywords-Steganography, entropy, cover text, stego text, and information security IntroductionThe introduction of computers and, for that matter, information technology has caused the problem of information sharing and data exchange to drastically reduce. With the proliferation and improvement in information exchange techniques such as the internet, search engines, data download services, file sharing; these have occasioned the improvement and advancement in data-manipulation software and hardware. A whole new world of creating and exchanging information has been opened. It is considerably easy and cheaper to create, reproduce or modify data and transfer them at an amazing speed over the internet to a variety of end users and or devices.
The use of ICTs in many parts of sub-Saharan Africa, including Ghana, has been described as transformational. However, there is paucity of research on user perspectives on ICTs in institutions of higher learning. This cross-sectional study assessed the perception of students at the University of Cape Coast in Ghana regarding cost as a limiting factor to the use of conference call technology. The complementary log-log regression model was based on a sample of 62 students surveyed in April and May 2015; which sixty-nine percent indicated that cost was a limiting factor. Though Chi-square statistic failed to reject the hypothesis, at the bivariate level, some relationships were statistically significant. Most of these relationships were not robust and disappeared completely when other factors were controlled in the multivariate model. Also, some relationships were absent at the bivariate level and only appeared at the multivariate level indicating that the connection between students' perception of cost and compositional and organisational factors is complex.
The rapid evolution of information tech no logy, the pro Iiferation of computer and media devices and the rapid growth in the use ICT and the internet for organisational management have spawned new forms of crimes and made old crimes easier to commit it. References to news in Ghanaian newspapers confirm the rising incidence of these crimes. A review of available literature, however, portrays a paucity of research that explores such crimes in African and for that matter, Ghanaian settings. In this position paper, we use "Academic 419" as a metaphor to describe computer crimes, highlighting some of such crimes from the international literature with a major focus on the types that can potentially occur in the University of Cape Coast. For us, it is imperative for leadership and management in their utilisation of ICT to be more vigilant in security issues and accept the need to safeguard their ICT systems to achieve maximal efficiency and effectiveness in their institutions. This objective can positively be attained when directed research such as we advocate for are conducted to explore all related facilitating factors in order to align the design and change in direction for the secure and effective implementation of the University of Cape Coast lCT policy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.