Performance Evaluation Of Mobile Application Based Steganographic Technique In Comparison With Other Existing Audio Steganography Techniques

Chandrakant Badgaiyan
Assistant Professor, Department of Mechatronics Engineering, Chhattisgarh Swami Vivekanand Technical University, Bhilai, Chattisgarh, India.

Abstract

Nowadays for data transfer from one place to another in whole world, internet is the best solution. But data transfer using internet is a very risky affair. In this context, data security has become a critical area, because private network is not the solution of data security all the time and none of the medium used for data transfer is fully secured. These challenges encouraged data hiding techniques like Encryption and Steganography. One advantage of steganography over cryptography is that, cryptography protects the contents of a message only, whereas steganography can protect both messages and communicating parties. In this paper, the author are going to implement a Mobile Apps Based Steganography Technique in a mobile application and compare the results based on various criteria like Robustness, Noise Resistance, Imperceptibility, Payload Capacity and Real time with all other audio Steganographic techniques like LSB, Parity, Eco hiding, Phase coding and Spread Spectrum. Millions of Mobile Apps are downloaded on mobile phones daily from all parts of world. This technique has been implemented on J2ME platform with; Mobile Application being a Maze game and it is tested on Nokia Supernova 7610 series phones.

Keywords :

Introduction

Steganography is an art of secret transfer of data, that has became popular in recent years, mainly aimed to hide data within a cover data such that other individuals fail to observe their existence [3]. While implementation of this method, the main aim is to hide data in a cover media like text, image, audio and video such that except sender and receiver, any other person will not notice that such important information is hidden inside the cover file. The main difference between Steganography and cryptography is that in steganography, individuals will not notice that data exists in the sources [4]. Cover file in most of Steganographic techniques is used as images, video clips, text, music and sound files [5]. These techniques have been developed for variety of targeted systems such as computers and mobile phones [6]. The steganography method, apart from application in covert exchange of information, is also used in fields like copyright protection, preventing e-document forging, etc [7,16].

On basis of their cover file data type, the Steganographic technique can be categorized as Text, Image, Audio, Video and Protocol [1,9]. In order to evaluate the capability of any Steganographic technique performance, some of the major criteria are Invisibility, Payload capacity, Robustness against statistical attacks, Robustness against cover data manipulation, Independent of file format and Unsuspicious files [1]. Most of Steganographic techniques do not fulfill all of above requirements. Hence a trade off must be selected, depending on the requirement of application at hand [2], [15].

On the other hand, in last few years, mobile phones have become a-life-line for human being in urban areas because of its all facet development and its enhanced capability in field of Utility,Entertainment, Communication, Data transfer rate, Interactive services etc. Millions of mobile applications are downloaded and installed daily from all over the world. An application in Mobile phone is written using languages which are specialized in dealing with the software and hardware specifications and limitations of the mobile phones. Some of the most commonly used programming languages are C++, Java and J2ME (Java 2 Micro Edition), which is an embedded version of Java language for low end devices such as set top box, mobile devices and PDAs (Personal Digital Assistant) and some of the widely used mobile operating systems are Symbian, Android, Bada, Linux variant, iOS for iPhones and latest is Tizen.

1.Survey Work

In any existing Steganographic technique, for hiding data, the approach used is that we hide secret information/ data inside a cover file (Text, Image, Audio or Video File) by embedding secret information bit pattern into cover file or by modifying cover file specific property in which change is difficult to be detected or observed by normal human senses, like echo, phase in audio, small variation in color pattern of consecutive pixels etc. As a whole, the existing method of hiding information in steganography is by tempering/ modifying the cover file as per secret data at sender’s end and at receiver’s end and finding these modifications for extraction of secret information.

Following problems were present in the previous Steganographic techniques:

A detailed analysis of Mobile application based Steganographic technique and some of the previous Steganographic works implemented on mobile phones are presented. Various types of steganography on mobile phones are basically based on SMS [8,11,12,13,14], MMS [10] and mobile apps based steganography [17], [19]. SMS can be used to send Text data or binary image data and hence used by text steganography and image steganography techniques respectively [20].

All problems mentioned in Table 1 were solved by the Mobile apps based Steganographic techniques [17, 19, 21]. In this technique secret data is image type and its file format can be any type. This secret data is hidden inside the JAR file which is executable file in case of J2ME based platform. Then this JAD/JAR files are downloaded to mobile phones from server or a website directly on the mobile phone and then installed on it. In order to recover the secret image from application user has to use his secret key and it will recover. User can again hide image by using his secret key. The basic problem of existing techniques was the approach of tampering of Cover file for hiding information inside it, which causes limited and dependent payload capacity and distortion in Cover file after embedding process. These problems were solved by adopting a new approach in methodology in case of Mobile Application Based Steganography [17], [19], [21] which is discussed in next section. But this technique has no way of user authentication check and real time interactive communication. For enhancing the capability of mobile apps based Steganographic method and improving its security, we implement SMS module [18] concept on it.

Table 1. Broad comparison of Our Proposed Steganographic technique and other existing Steganographic techniques

2.Methodology

In all type of Steganographic techniques secret information is embedded into some Cover file, based on some algorithm. These methods alter cover file's properties to hide Secret information based on its Steganographic Algorithm, either in spatial domain or in transform domain by taking caution of its invisibility. Because of this process of altering in cover data, first disadvantage is that the amount of payload is limited and also dependent on the size of cover data and changes in cover data caused noise production in cover image. Table 1 shows the differences in approach of various existing techniques text, audio, video and Image steganography with Mobile Application Based Steganography.

The steps for Mobile Application based Steganography

1. ----- Download Stego Mobile Apps from Website and its Installation
2. ----- Optional services facilitated on Client Application for Covert Interactive Communication, IMEI Number cross check during installation and mobile application activation password exchange using SMS Module [18].

In case of Mobile Application Based Steganography technique of image hiding in mobile application the secret image is mixed with mobile application resources in such a way that it cannot be retrieved from any other means except by using Mobile Apps in running state [17,19,21]. The control flow diagram is shown in Figure 2. The proposed technique is implemented on J2ME enabled device and run & tested on Nokia C5 phone.

Figure 1 presents the simplest implementation model of Mobile Application based steganography. Here in general, Mobile stego Apps can be uploaded on any website server either by sender or first party who wants to transfer some secret data (image) and at reciever end the second or concerned party can download it from that website on their mobile and install it on mobile. In order to recover the secret data (image) in application, user need to run application and apply specific secret key on mobile phone; which is shared between both party using a secured media.

Figure 1. The Simplest Model of Mobile based Steganography

Two different models can be implemented like,

In order to achieve this flow of control shown in Figure 2 is implemented in a Mobile Application which can be any utility like Paint Brush or any entertainment application like any Mobile Game. In our case the utility application is Maze mobile game. The results obtained are shown in Figure 3 and Figure 4 and Tables 2 and 3 show list of devices on which stego game is tested and its various mode of installation on device.

Figure 2. Control flow diagram of technique [17]

Figure 3. Maze Game App in Normal Mode

Figure 4. After Applying Secret Key, Image Display Mode

Table 2. Testing various phones with different Image format

Table 3.Testing on various devices with different Modes of installation

Table 2 shows the list of mobile devices in which Mobile Apps Based Stego Application is installed and tested with different image formats. Devices are Nokia Supernova 7610, Nokia 5130, Nokia Supernova 7210, Nokia C2-01 and different image formats used are PNG, BITMAP and JPEG. Table 3 shows the various ways of installation of mobile apps on mobile devices.

Table 4. Comparison of our techniques with other existing audio Steganographic techniques

3.Performance Evaluation

Abdulaleem et.al [22] present a comparison of various existing techniques in Audio steganography based on various criteria like Robustness, Imperceptibility, Noise resistance, Payload Capacity, Transmission Rate, Real Time System etc. Authors use this comparison in assessment of Mobile application Based steganography capabilities based on same criteria and present a comparison between existing audio steganography techniques and Mobile technique. The results are shown in Table 4.

Conclusion

In this work the authors tested the Mobile Application Based Steganographic technique and different existing audio Steganographic techniques from the point of view of Payload capacity independence, and establish fact that this technique makes payload capacity, imperceptibility, noise resistance, transmission rate and real time system better. As mobile applications are quite normal these days, its transfer does not catch attention. Because of novelty in selection of cover file, we find extra ordinary results as compared to audio stego techniques, as mentioned in Table 4. It is clear that payload capacity of Mobile Apps Based steganography technique is independent from the dependency on Size of Cover File. This technique has limitation that the secret information can be exposed to hacker if he has doubt that a mobile application contains an embedded data image inside it. Recovering the image file will require connection of mobile phones to PC and specialized software. It has a risk of code reverse engineering. Both of these short comings can be paramount by using Obfuscated code and Binarized resource data.

References

[1]. Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das, (2008). “A Tutorial Review on Steganography ”, International Conference 2008 at JIIT.
[2]. Ahsan, K., & Kundur, D. (2002). “Practical Data hiding in TCP/IP”, Proceedings of the Workshop on Multimedia Security at ACM Multimedia.
[3]. F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, (1999). “Information hiding-a survey”, Proceedings of the IEEE, Vol. 87, Issue 7, July 1999, pp. 1062-1078.
[4]. J.C. Judge, (2001). “Steganography: Past, Present, Future”, SANS White paper, 30 November, 2001
[5]. N.J. Hopper (2004). “Toward a theor y of Steganography”, Ph.D. Dissertation, School of Computer Science Carnegie Mellon University, Pittsburgh, PA, USA, July 2004.
[6]. M. Shirali-Shahreza (2005). “An Improved Method for Steganography on Mobile Phone”, WSEAS Transactions on Systems, Vol. 4, Issue 7, July 2005, pp. 955-957.
[7]. F. Hartung and B. Girod, (1997). “Copyright Protection in Video Delivery Networks by Watermarking of Pre- Compressed Video”, Proceedings of Multimedia Applications, Services and Techniques ECMAST '97' Springer Lecture Notes in Computer Science, Vol. 1242, Milan, Italy, May 1997, pp. 423-436.
[8]. M. Hassan Shirali-Shahreza, Mohammad Shirali- Shahreza, (2007). “Sending Mobile Software Activation Code by SMS Using Steganography ”, Intelligent Information Hiding and Multimedia Signal Processing, 2007, IIHMSP 2007, Third International Conference on 2007, pp. 554-557.
[9]. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, (2010). "Digital image steganography: Survey and analysis of current methods" 2010, Elsevier, Signal Processing, pp. 727-752.
[10]. Rosziati Ibrahim, Law Chia Kee, (2012). “MoBiSiS: An Android-based Application for Sending Stego Image through MMS”, ICCGI 2012: The Seventh International Multi-Conference on Computing in the Global Information Technology.
[11]. Mohammad Shirali Shahreza, (2006). “Stealth Steganography in SMS”, IEEE Wireless and Optical Communications Networks, 2006 IFIP International Conference.
[12]. Mohammad Shirali-Shahreza, M. Hassan Shirali- Shahreza, (2007). “Text Steganography in SMS”, 2007 International Conference on Convergence Information Technology.
[13]. M. Hassan Shirali-Shahreza, Mohammad Shirali- Shahreza, (2008). “Steganography in SMS by Sudoku Puzzle” Computer Systems and Applications, 2008. AICCSA 2008. IEEE/ACS International Conference, pp.844-847.
[14]. Khan Farhan Rafat, (2009). “Enhanced Text Steganography in SMS”, Computer, Control and Communication, 2009, IC4 2009, 2nd International Conference, pp. 1-6.
[15]. W. Bender, D. Gruhl, N. Morimoto and A. Lu, (1996). “Techniques for data hiding”, IBM Systems Journal, vol. 35, Issue 3&4, 1996, pp. 313-336.
[16]. Zenon Hrytskiv, Sviatoslav Voloshynovskiy, Yuriy Rytsav (1998). “Cryptography and Steganography of Video information in modern communication”, Electronics and Energetics, Vol 11, No. 1, pp.115-225.
[17]. Chandrakant Badgaiyan, Ashish Kumar Dewangan, Bhupesh Kumar Pandey, Keerti Yeulkar, Kaushal Kumar Sinha, (2012). “A New Steganographic Technique: Image Hiding in Mobile Application”, International Journal of Advanced Computer and Mathematical Sciences, Vol 3, Issue 4, 2012, pp 556-562.
[18]. Chandrakant Badgaiyan, Ashish Kumar Dewangan, (2012). “A New Method of Sending Mobile Software Activation Key Using SMS Module”, CIIT International Journal of Automation and Autonomous System, Vol 4, No 6, June 2012.
[19]. Chandrakant Badgaiyan, Mr. Ashish Kumar Dewangan, (2013). “Implementation of Mobile Based Steganography Technique on Non Touch Mobile Phones Using Password Protection”, International Journal of Information and Computation Technology, Volume 3, Number 2, 2013, Special issue.
[20]. Chandrakant Badgaiyan, Mr. Ashish Kumar Dewangan, (2012). “A Survey Paper on SMS Based Steganography”, International Journal of Advanced Computer and Mathematical Sciences, Vol 3, Issue 4, 2012, pp.441-445.
[21]. Chandrakant Badgaiyan, Mr. Ashish Kumar Dewangan, (2013). “Payload Capacity Enhancement In The Field Of Steganography By Using Mobile Application Based Stego Technique”, i-manager's Journal on Software Engineering, Vol. 7, No. 4,lApril - June 2013, pp.30-35.
[22]. Abdulaleem Z. Al-Othmani1, Azizah Abdul Manaf and Akram M. Zeki, (2012). “A Survey on Steganography Techniques in Real Time Audio Signals and Evaluation”, IJCSI International Journal of Computer Science, Vol. 9, Issue 1, No. 1, January 2012, pp. 30-37.