Open Access Open Access  Restricted Access Subscription Access

Steganography of Images Using Android

Zunaid Akbar

Abstract


Stenography is used to conceal one media file within another. Providing security to a system as a whole is what it means to authenticate it. Getting private subtleties on the portable stages has been turning into a regular issue for the experts In this technique the picture coding is suggested that conceals the data along a chose pixel will be pixel and on the following worth of the chose pixel, that is to say, pixel+1. There are some drawbacks and limitations to this method. A novel approach to increasing system security is proposed as a means of overcoming the drawback. The stenography method will be utilized in this paper to conceal the text message within an image. All crucial data, including passwords, is encrypted and transported in an image, making it challenging to decipher. The 7th Bit of a Pixel embedding technique is the most fundamental and crucial image stenography technique. A mathematical algorithm is applied to the seventh bit of an image's pixels based on the image's seventh bit, resulting in the generation of a temporary variable (pixel + 1). In order to provide a high level of security for Android's authentication system, the seventh bit of the selected pixel and the seventh bit of the pixel plus one are utilized for information concealment and encryption. When contrasted with other techniques that are currently in use, the outcomes of this proposed image stenography method are both intriguing and promising.


Full Text:

PDF

References


Bhattacharyya, S., Sanyal, G., & Majumdar, A. (2009). An image based steganography model for promoting global cyber security. In Proceedings of International Conference on Systemics, Cybernetics and Informatics.

Sharma, M. H., MithleshArya, M., & Goyal, M. D. (2013). Secure image hiding algorithm using cryptography and steganography. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN, 13(5), 1-6.

Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., & Mohd Daud, S. (2011). A survey on image steganography algorithms and evaluation. In Digital Information Processing and Communications: International Conference, ICDIPC 2011, Ostrava, Czech Republic, July 7-9, 2011, Proceedings, Part I (pp. 406-418). Springer Berlin Heidelberg.

Fridrich, J., & Goljan, M. (2002). Practical steganalysis of digital images: state of the art. security and Watermarking of Multimedia Contents IV, 4675, 1-13.

Bucerzan, D., Raţiu, C., & Manolescu, M. J. (2013). SmartSteg: a new android based steganography application. International Journal of Computers, Communications and Control, 8(5), 681.

Thanikkal, J. G., Danish, M., & Sarwar, S. A. (2014). New Android Based Steganography Application for Smartphone‘s. Journal of Basic and Applied Engineering Research. Print ISSN, 2350-0077.

Savithri, G., & Sudha, K. L. (2014). Android application for secret image transmission and reception using chaotic steganography. International Journal of Innovative Research in Computer and Communication Engineering, 2(7), 5107-5113.


Refbacks

  • There are currently no refbacks.