Performance Evaluation of Mobile Application Based Steganographic Technique in Comparison with Other Existing Audio Steganography Techniques

Chandrakant Badgaiyan*
Assistant Professor, Department of Mechatronics Engineering, Chhattisgarh Swami Vivekanand Technical University, Bhilai, Chattisgarh, India.
Periodicity:June - August'2013
DOI : https://doi.org/10.26634/jit.2.3.2404

Abstract

Nowadays for data transfer from one place to other in whole world, internet is the best solution. But data transfer using internet is a very risky affair. In this context data security has become a critical area because private network is not the solution of data security all the time and none of the medium used for data transfer is fully secured these challenges encouraged data hiding techniques like Encryption and Steganography. One advantage of steganography over cryptography is the cryptography protects the contents of a message only, whereas steganography can protect both messages and communicating parties. In this paper we are going to implement a Mobile Apps Based Steganography Technique in a mobile application and compare the results based on various criteria like robustness, noise resistance, imperceptibility, payload capacity and real time with all other audio Steganographic techniques like LSB, Parity, Eco hiding, phase coding and spread spectrum. Millions of Mobile Apps are downloaded on mobile phones daily from all part of world. This technique is implemented on J2ME platform; Mobile Application is a Maze game and it is tested on Nokia Supernova 7610 series phones.

Keywords

J2ME, SMS, Data Security, Encryption, Steganography

How to Cite this Article?

Badgaiyan, C. (2013). Performance Evaluation Of Mobile Application Based Steganographic Technique In Comparison With Other Existing Audio Steganography Techniques. i-manager’s Journal on Information Technology, 2(3), 7-12. https://doi.org/10.26634/jit.2.3.2404

References

[1]. Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das, (2008). “A Tutorial Review on Steganography ”, International Conference 2008 at JIIT.
[2]. Ahsan, K., & Kundur, D. (2002). “Practical Data hiding in TCP/IP”, Proceedings of the Workshop on Multimedia Security at ACM Multimedia.
[3]. F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, (1999). “Information hiding-a survey”, Proceedings of the IEEE, Vol. 87, Issue 7, July 1999, pp. 1062-1078.
[4]. J.C. Judge, (2001). “Steganography: Past, Present, Future”, SANS White paper, 30 November, 2001
[5]. N.J. Hopper (2004). “Toward a theor y of Steganography”, Ph.D. Dissertation, School of Computer Science Carnegie Mellon University, Pittsburgh, PA, USA, July 2004.
[6]. M. Shirali-Shahreza (2005). “An Improved Method for Steganography on Mobile Phone”, WSEAS Transactions on Systems, Vol. 4, Issue 7, July 2005, pp. 955-957.
[7]. F. Hartung and B. Girod, (1997). “Copyright Protection in Video Delivery Networks by Watermarking of Pre- Compressed Video”, Proceedings of Multimedia Applications, Services and Techniques ECMAST '97' Springer Lecture Notes in Computer Science, Vol. 1242, Milan, Italy, May 1997, pp. 423-436.
[8]. M. Hassan Shirali-Shahreza, Mohammad Shirali- Shahreza, (2007). “Sending Mobile Software Activation Code by SMS Using Steganography ”, Intelligent Information Hiding and Multimedia Signal Processing, 2007, IIHMSP 2007, Third International Conference on 2007, pp. 554-557.
[9]. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, (2010). "Digital image steganography: Survey and analysis of current methods" 2010, Elsevier, Signal Processing, pp. 727-752.
[10]. Rosziati Ibrahim, Law Chia Kee, (2012). “MoBiSiS: An Android-based Application for Sending Stego Image through MMS”, ICCGI 2012: The Seventh International Multi-Conference on Computing in the Global Information Technology.
[11]. Mohammad Shirali Shahreza, (2006). “Stealth Steganography in SMS”, IEEE Wireless and Optical Communications Networks, 2006 IFIP International Conference.
[12]. Mohammad Shirali-Shahreza, M. Hassan Shirali- Shahreza, (2007). “Text Steganography in SMS”, 2007 International Conference on Convergence Information Technology.
[13]. M. Hassan Shirali-Shahreza, Mohammad Shirali- Shahreza, (2008). “Steganography in SMS by Sudoku Puzzle” Computer Systems and Applications, 2008. AICCSA 2008. IEEE/ACS International Conference, pp.844-847.
[14]. Khan Farhan Rafat, (2009). “Enhanced Text Steganography in SMS”, Computer, Control and Communication, 2009, IC4 2009, 2nd International Conference, pp. 1-6.
[15]. W. Bender, D. Gruhl, N. Morimoto and A. Lu, (1996). “Techniques for data hiding”, IBM Systems Journal, vol. 35, Issue 3&4, 1996, pp. 313-336.
[16]. Zenon Hrytskiv, Sviatoslav Voloshynovskiy, Yuriy Rytsav (1998). “Cryptography and Steganography of Video information in modern communication”, Electronics and Energetics, Vol 11, No. 1, pp.115-225.
[17]. Chandrakant Badgaiyan, Ashish Kumar Dewangan, Bhupesh Kumar Pandey, Keerti Yeulkar, Kaushal Kumar Sinha, (2012). “A New Steganographic Technique: Image Hiding in Mobile Application”, International Journal of Advanced Computer and Mathematical Sciences, Vol 3, Issue 4, 2012, pp 556-562.
[18]. Chandrakant Badgaiyan, Ashish Kumar Dewangan, (2012). “A New Method of Sending Mobile Software Activation Key Using SMS Module”, CIIT International Journal of Automation and Autonomous System, Vol 4, No 6, June 2012.
[19]. Chandrakant Badgaiyan, Mr. Ashish Kumar Dewangan, (2013). “Implementation of Mobile Based Steganography Technique on Non Touch Mobile Phones Using Password Protection”, International Journal of Information and Computation Technology, Volume 3, Number 2, 2013, Special issue.
[20]. Chandrakant Badgaiyan, Mr. Ashish Kumar Dewangan, (2012). “A Survey Paper on SMS Based Steganography”, International Journal of Advanced Computer and Mathematical Sciences, Vol 3, Issue 4, 2012, pp.441-445.
[21]. Chandrakant Badgaiyan, Mr. Ashish Kumar Dewangan, (2013). “Payload Capacity Enhancement In The Field Of Steganography By Using Mobile Application Based Stego Technique”, i-manager's Journal on Software Engineering, Vol. 7, No. 4,lApril - June 2013, pp.30-35.
[22]. Abdulaleem Z. Al-Othmani1, Azizah Abdul Manaf and Akram M. Zeki, (2012). “A Survey on Steganography Techniques in Real Time Audio Signals and Evaluation”, IJCSI International Journal of Computer Science, Vol. 9, Issue 1, No. 1, January 2012, pp. 30-37.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.