Security Enhancement of Image Hiding Technique in Mobile Application Using SMS Module

Chandrakant Badgaiyan*
Assistant Professor, Department of Mechatronics Engg., Chhattisgarh Swami Vivekanand Technical University, Chattisgarh, India
Periodicity:January - March'2013
DOI : https://doi.org/10.26634/jse.7.3.2170

Abstract

Field of data security has attracted everybody’s attention due to digitization of whole world. Now shopping on internet, sending e-mails, transfer of documents, and all other type of data like text, image, audio or video is a common habit and need of mankind. But neither the medium used for data transfer is secured nor the storage media from hackers which encouraged data hiding techniques like Encryption and Steganography.  On the other hand the world is being mobile day by day and almost all type of services is being ported on mobile phones whether it is messaging services, internet services, entertainment services, sensor based services or financial services in form of various mobile applications. Millions of These applications are downloaded on mobile phones daily from all part of world.  In this paper, we are going to accomplish covert communication of images using mobile application as cover data and in order to provide authentication check to our technique we used SMS module concept. SMS module allows only registered or authorised user to download the application and has many other advantages. This technique has overcome the problem of other Steganographic techniques like limited payload capacity with added advantage of mobility and portability as it runs on mobile phones instead of PC. Proposed technique was developed in J2ME platform and tested on Nokia C5 series phones.

Keywords

J2ME, SMS, Encryption, Steganography, SMS Module.

How to Cite this Article?

Badgaiyan, C. (2013). Security Enhancement of Image Hiding Technique in Mobile Application Using SMS Module. i-manager’s Journal on Software Engineering, 7(3), 15-20. https://doi.org/10.26634/jse.7.3.2170

References

[1]. Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das, (2008). ”A Tutorial Review on Steganography ”, International conference 2008 at JIIT.
[2]. Ahsan, K. & Kundur, D., (2002). “Practical Data hiding in TCP/IP”, Proceedings of the Workshop on Multimedia Security at ACM Multimedia, 2002.
[3]. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, (1999). "Information hiding-a survey," Proceedings of the IEEE, Vol. 87, Issue 7, July 1999, pp. 1062-1078.
[4]. J.C. Judge, (2001). "Steganography: Past, Present, Future," SANS white paper, 30 November, 2001, http://www.sans.org/rr/papers/index.php?id=552.
[5]. N.J. Hopper, (2004). Toward a theor y of Steganography, Ph.D. Dissertation, School of Computer Science Carnegie Mellon University, Pittsburgh, PA, USA, July 2004.
[6]. M. Shirali-Shahreza, (2005). "An Improved Method for Steganography on Mobile Phone," WSEAS Transactions on Systems, Vol. 4, Issue 7, July 2005, pp. 955-957.
[7]. F. Hartung and B. Girod, (1997). "Copyright Protection in Video Delivery Networks by Watermarking of Pre- Compressed Video," Proceedings of Multimedia Applications, Services and Techniques ECMAST '97', Springer Lecture Notes in Computer Science, Vol. 1242, Milan, Italy, May 1997, pp. 423-436.
[8]. M. Hassan Shirali-Shahreza, Mohammad Shirali- Shahreza, (2007). ” Sending Mobile Software Activation Code by SMS Using Steganography ”, Intelligent Information Hiding and Multimedia Signal Processing, 2007, IIHMSP 2007, Third International Conference on 2007, pp. 554-557
[9]. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, (2010). "Digital image steganography: Survey and analysis of current methods" 2010, Elsevier, Signal Processing , pp. 727-752
[10]. Mohammad Shirali Shahreza, (2006). ”Stealth Steganography in SMS”, IEEE Wireless and Optical Communications Networks, 2006 IFIP International Conference.
[11]. Mohammad Shirali-Shahreza, M. Hassan Shirali-Shahreza, (2007). “Text Steganography in SMS”, 2007 International Conference on Convergence Information Technology.
[12]. M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza, (2008). “Steganography in SMS by Sudoku Puzzle”, Computer Systems and Applications, 2008. AICCSA 2008. IEEE/ACS International Conference , pp. 844-847
[13]. Khan Farhan Rafat, (2009). “Enhanced Text Steganography in SMS”, Computer, Control and Communication, 2009, IC4 2009, 2nd International Conference, pp. 1-6
[14]. W. Bender, D. Gruhl, N. Morimoto and A. Lu, (1996). “Techniques for data hiding”, IBM Systems Journal, vol. 35, Issue 3&4, 1996, pp. 313-336
[15]. Zenon Hrytskiv, Sviatoslav Voloshynovskiy, Yuriy Rytsav., “Cryptography and Steganography of Video information in modern communication”, Electronics and Energetics, Vol 11, No. 1, 115-225
[16]. Chandrakant Badgaiyan, Ashish Kumar Dewangan, Bhupesh Kumar Pandey, Keerti Yeulkar, Kaushal Kumar Sinha, (2012). “A New Steganographic Technique: Image Hiding in Mobile Application”, International Journal of Advanced Computer and Mathematical Sciences, Vol 3, No. 4, 2012 pp 556-562
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.