Shefiu Olusegun Ganiyu

Work place: Information and Media Technology, Federal University of Technology, Minna



Research Interests: Information-Theoretic Security, Network Security, Information Security


Shefiu Olusegun Ganiyu is currently a lecturer in the Department of Computer Science, Kampala International University, Uganda. He holds a Ph.D. in Computer Science, which focused on risk-aware access control for pervasive environments. Similarly, he obtains Bachelor degree in Mathematics/Computer Science and Master degree in Information Science from Federal University Minna and the University of Ibadan respectively. Prior to joining the academic environment, he acquired valuable work experience as a programmer/information system developer. His research interests include information security risk management, dynamic access control, user behaviour analytics, security of pervasive computing including Bring Your Own Device (BYOD) strategy, and physical security. Also, he has participated in several projects involving information systems security and development

Author Articles
Data Privacy System Using Steganography and Cryptography

By Olawale Surajudeen Adebayo Shefiu Olusegun Ganiyu Fransic Bukie Osang Salawu Sule Ajiboye Kasim Mustapha Olamilekan Lateefah Abdulazeez

DOI:, Pub. Date: 8 Jun. 2022

Data privacy is being breached occasionally whether in storage or in transmission. This is due to the spate of attack occasioned by the movement of data and information on an insecure internet. This study aimed to design a system that would be used by both sender and receiver of a secret message. The system used the combination of Steganography (MSB) and Cryptography (RSA) approaches to ensure data privacy protection. The system generates two keys: public and private keys, for the sender and receiver to encrypt and decrypt the message respectively. The steganography method used does not affect the size of cover image. The software was designed using python programming language in PyCharmIDE. The designed system enhanced the security and privacy of data. The results of this study reveal the effectiveness of combination of steganography and cryptography over the use of either cryptography or steganography and other existing systems.

[...] Read more.
Other Articles