Advertisement

Personalized Secured API for Application Developer

  • R. MaheswariEmail author
  • S. Sheeba Rani
  • P. Sharmila
  • S. Rajarao
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 851)

Abstract

In this work a security API is proposed which can be customized and used by application developers to include a higher level of security in their application. The objective is to make developers create secure applications without concerning much into the core security aspects such as the mechanism, algorithm and reliability of the security protocols used in it. This API is capable of providing an end-to-end encryption when used for communication and also considered as a provider of Security as a Service. It uses an improved Steganography algorithm based on LSB and Complement Image rotation. The core functions are developed using PHP and an API is created for external applications to make API calls, so that the SaaS can be accessed by authorized applications. It is platform-independent, meaning it is not designed to serve just one type of client application (in terms of programming language), it can be accessed by different types of apps. The data is encrypted (if necessary) using a random key and converted into binary format and embedded into a 24-bit RGB cover image. The data is secured in the image which creates no suspicion and provides invisibility, and proven to be secure by performing benchmark tests by comparing stegoimages provided by different algorithms and also resisted statistical and visual attacks.

Keywords

Encryption Pixels Embedding Steganography Framework 

References

  1. 1.
  2. 2.
    Mobile Malware Threats Fraudsters are still two steps ahead. https://securityintelligence.com/two-steps-ahead/ (2015)
  3. 3.
  4. 4.
    Venugopal, K.R., Patnaik, L.M., Raja, K.B., Chowdary, C.R.: A secure image steganography using LSB, DCT and compression techniques on raw images. In: ICISIP, pp. 123–135 (2005)Google Scholar
  5. 5.
    Memon, N., Chandramouli, R., Kharrazi, M.: Image steganography and steganalysis: concepts and practice. In: IWDW, pp. 4–12 (2003)Google Scholar
  6. 6.
    Mandal, Md.P., Islam, R., Siddiqa, A., Delowar, Md.: An efficient filtering based approach LSB image steganography using status bit along AES cryptography. In: ICIEV, pp. 55–60 (2014)Google Scholar
  7. 7.
    Wagner, D.A., Manferdeli, J.L.: Cryptography and Cryptanalysis, pp. 312–319. Springer, Heidelberg (2013)Google Scholar
  8. 8.
    Carli, M., Neri, A., Egiaziarian, K., Battisti, F.: A Generalized Fibonacci LSB Data Hiding Technique. (CODEC2006) TEA, Institute of Radio Physics and Electronics, University of Calcutta, pp. 37–45 (2006)Google Scholar
  9. 9.
    Abraham, A., Sanyal, S., Dey, S.: An LSB Data Hiding Technique Using Prime Numbers, pp. 223–235. IEEE CS Press, UK (2007)Google Scholar
  10. 10.
    Gupta, S., Goel, S., Kaushik, N.: Image steganography least significant bit with multiple progressions. In: FICTA (2015)Google Scholar
  11. 11.
    Cachin, C.: An information-theoretic model for steganography. In: 2nd Information Hiding Workshop, pp. 78–86 (1998)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • R. Maheswari
    • 1
    Email author
  • S. Sheeba Rani
    • 2
  • P. Sharmila
    • 3
  • S. Rajarao
    • 1
  1. 1.VIT ChennaiChennaiIndia
  2. 2.Sri Krishna College of Engineering and TechnologyCoimbatoreIndia
  3. 3.Sri Sairam Engineering CollegeChennaiIndia

Personalised recommendations