A Generic Solution for Embedding Data in Mobile Application Based Steganographic Technique

Chandrakant Badgaiyan*
Assistant Professor, Department of Mechatronics Engg., C.S.I.T. Durg (C.G.), & Chhattisgarh Swami Vivekanand Technical University, Bhilai, Chattisgarh, India.
Periodicity:February - April'2014
DOI : https://doi.org/10.26634/jes.3.1.2951

Abstract

Nowadays data is transferred using internet from one place to other in whole world in its digital form. But data transfer using internet is a very risky affair and any third party can listen the information into network. These challenges encourage data hiding techniques like Encryption and Steganography. One advantage of steganography over cryptography is the cryptography protects the contents of a message only, whereas steganography can protect both messages and communicating parties. Mobile Apps Based Steganography Technique is comparatively new technique to hide secret information and has advantages of mobility, portability and high payload capacity. In this paper we are going to propose a generic solution for embedding data in a Mobile Apps Based Steganography Technique so that even a common user can use this technique for hiding his information inside a mobile application. This technique is implemented on J2ME platform; Mobile Application is a Maze game and it is tested on Nokia Supernova 7610 series phones.

Keywords

J2ME, SMS (Short Message Service), Data Security, Encryption, Steganography

How to Cite this Article?

Badgaiyan,C. (2014). A Generic Solution For Embedding Data In Mobile Application Based Steganographic Technique. i-manager’s Journal on Embedded Systems, 3(1), 26-31. https://doi.org/10.26634/jes.3.1.2951

References

[1]. Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das, (2008). “A Tutorial Review on Steganography ”, International conference at JIIT.
[2]. Ahsan, K., & Kundur, D. (2002). “Practical Data hiding in TCP/IP”, Proceedings of the Workshop on Multimedia Security at ACM Multimedia.
[3]. F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, (1999). "Information hiding-a survey," Proceedings of the IEEE, Vol. 87, Issue 7, pp. 1062-1078.
[4]. J.C. Judge, (2001). "Steganography: Past, Present, Future," SANS white paper.
[5]. N.J. Hopper, (2004). Toward a theor y of Steganography, Ph.D. Dissertation, School of Computer Science Carnegie Mellon University, Pittsburgh, PA, USA,
[6]. M. Shirali-Shahreza, (2005). "An Improved Method for Steganography on Mobile Phone," WSEAS Transactions on Systems, Vol. 4, Issue 7, pp. 955-957.
[7]. F. Hartung and B. Girod, (1997). "Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video," Proceedings of Multimedia Applications, Services and Techniques ECMAST '97' Springer Lecture Notes in Computer Science, Vol. 1242, Milan, Italy, pp. 423-436.
[8]. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, (2010). "Digital image steganography: Survey and analysis of current methods" Elsevier, Signal Processing, pp. 727-752.
[9]. W. Bender, D. Gruhl, N. Morimoto and A. Lu, (1996). “Techniques for data hiding”, IBM Systems Journal, Vol. 35, Issue 3&4, 1996, pp. 313-336.
[10]. Zenon Hrytskiv, Sviatoslav Voloshynovskiy, Yuriy Rytsav. “Cryptography and Steganography of Video information in modern communication”, Electronics and Energetics, Vol 11, No. 1, 115-225.
[11]. Chandrakant Badgaiyan, Ashish Kumar Dewangan, Bhupesh Kumar Pandey, Keerti Yeulkar, Kaushal Kumar Sinha, (2012). “A New Steganographic Technique: Image Hiding in Mobile Application”, International Journal of Advanced Computer and Mathematical Sciences, Vol 3, issue 4, pp 556-562.
[12]. Chandrakant Badgaiyan, Mr. Ashish Kumar Dewangan, (2013). “Implementation of Mobile Based Steganography Technique on Non Touch Mobile Phones Using Password Protection”, International Journal of Information and Computation Technology, Vol. 3, No. 2, Special issue.
[13]. Chandrakant Badgaiyan (2013). Payload Capacity Enhancement in the Field of Steganography by Using Mobile Application Based Stego Technique. i-manager’s Journal on Software Engineering. 7(4), April-June, 2013 Print ISSN 0973-5151, E-ISSN 2230-7168, pp. 30-35.
[14]. Chandrakant Badgaiyan, (2014). “Performance Assessment of Mobile Application Based Steganographic Technique in Comparison with Other Existing Steganography Techniques on Mobile Platform”,Inventi Impact – Information Security, Issue No. 2.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.