SmartSteg: A New Android Based Steganography Application
Keywords:
Least Significant Bit (LSB), steganography, cryptography, android, SmartStegAbstract
With the development of mobile devices the security issue migrates from the PC platform to this new technology. Securing confidential information on the mobile platforms has been, is and will be a topical issue for the specialists. In this paper we propose a new solution in order to provide security of digital data that is transferred through today’s available platforms for communication. We developed SmartSteg application that works on Android platform and it is able to hide and fast encrypt files using digital images of MB dimension as cover. LSB steganography is combined with a random function and symmetric key cryptography to transfer digital information, in a secure manner between smartphones that run under Android.
References
I. Rosziati, L. C. Kee, MoBiSiS: An Android-based Application for Sending Stego Image through MMS, ICCGI 2012 : The Seventh International Multi-Conference on Computing in the Global Information Technology, 115-120, 2012.
S. F. Mare, Advanced Steganographic algorithms and architectures, Teze de doctorat ale UPT, Seria 10, Nr.40, Editura Politehnica, 2012.
W. Mazurczyk, M. Karas, K. Szczypiorski, SkyDe: a Skype-based Steganographic Method, Int J Comput Commun, ISSN 1841-9836, 8(3):432-443, June, 2013.
D. S. Purkayastha, N. Singhla, Android Optimization: A Survey, International Journal of Computer Science and Mobile Computing - A Monthly Journal of Computer Science and Information Technology, 2(6):46-52, June 2013.
P. H. Rughani, H. N. Pandya, Steganography on Android Based Smart Phones, International Journal of Mobile & Adhoc Network, 2(2):150-152, May 2012.
K. Szczypiorski, Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System-HICCUPS, http://www.tele.pw.edu.pl/krzysiek/pdf/steg-seminar-2003.pdf, visited on 01.09.2013.
T. F. M. White, J. E. Martina, Mobile Steganography Embedder, 11 SBSeg Simposio Brasileiro Em Seguranca Da Informacao E De Sistemas Computacionais, Bsalia-DF, 6 a 11 de Novembro de 2011, http://www.peotta.com/sbseg2011/resources/downloads/wticg/91964.pdf, visited on 01.09.2013.
H-J. Yoon, A Study on the Performance of Android Platform, International Journal on Computer Science and Engineering, 4:532-537, 04 April 2012.
B. B. Zaidan, A. A. Zaidan, A. K. Al-Frajat and H. A. Jalab, On the Defferences between Hiding Information and Cryptography techniques: An Overview, Journal of Applied Sciences, 10(15): 1650-1655, 2010. http://dx.doi.org/10.3923/jas.2010.1650.1655
***, Gartner Press Release, Gartner Says Asia, Pacific Led Worldwide Mobile Phone Sales to Growth in First Quarter of 2013, 14.05.2013, http://www.gartner.com/newsroom/id/2482816, visited on 01.09.2013.
***, IDC Press Release, Android and iOS Combine for 92.3% of All Smartphone Operating System Shipments in the First Quarter While Windows Phone Leapfrogs BlackBerry, According to IDC, 16.05.2013, http://www.idc.com/getdoc.jsp?containerId=prUS24108913, visited on 01.09.2013.
MobiStego: http://play.google.com/store/apps/details?id=it.mobistego, visited on 01.09.2013.
Pixelknot: http://guardianproject.info/apps/pixelkont/, visited on 01.09.2013.
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.