Advertisement

Contributions to Steganographic Techniques on Mobile Devices

  • Dominic Bucerzan
  • Crina Raţiu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9522)

Abstract

In modern information and communication systems, information security is becoming an increasingly important issue due to the threats from all different types of attacks. The network security is becoming more important as the number of data being exchanged on the Internet increases. Therefore, the confidentiality and integrity of data requires protection against unauthorized access and use. This reality is the base for the study conducted in this paper regarding the field of Digital Steganography, in order to provide solutions for confidential communication between computers and mobile devices. The authors propose a new solution in order to provide confidentiality and secrecy of digital data that is transferred through todays available platforms for communication. The study is based on the SmartSteg application and consists of a package of steganographic and cryptographic applications that works both ways on Android and Windows platform.

Keywords

LSB steganography Cryptography Android Windows SmartSteg 

References

  1. 1.
    Wang, Z., Murmuria, R., Stavrou, A.: Implementing and optimizing an encryption filesystem on android. In: 2012 IEEE 13th International Conference on Mobile Data Management (MDM), pp. 52–62. IEEE (2012)Google Scholar
  2. 2.
    Muttik, I.: Securing Mobile Devices: Present and Future. http://www.ingrammicro.com/healthcare/McAfee_MobileSecurity.pdf
  3. 3.
    Bucerzan, D., Raţiu, C., Manolescu, M.J.: SmartSteg: a new android based steganogrphy application. Int. J. Comput. Commun. Control 8(5), 681–688 (2013). http://univagora.ro/jour/index.php/ijccc/article/view/642 CrossRefGoogle Scholar
  4. 4.
    Fridrich, J., Goljan, M.: Practical steganalysis of digital images state of the art. Proc. SPIE 4675, 1–13 (2002)CrossRefGoogle Scholar
  5. 5.
    Wolfel, U.: Efficient and provably secure steganography. Doctoral Dissertation, Universitat zu Lubeck, Institut fur Theoretische Informatik (2011)Google Scholar
  6. 6.
    Swain, G., Lenka, S.K.: Classification of image steganography techniques in spatial domain: a study. Int. J. Comput. Sci. Eng. Tech. (IJCSET) 5(3), 219–232 (2014). Swain, G. (eds)Google Scholar
  7. 7.
    Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York (2009)CrossRefzbMATHGoogle Scholar
  8. 8.
    Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer Science & Business Media, Heidelberg (2009)zbMATHGoogle Scholar
  9. 9.
  10. 10.
    Cole, E., Krutz, R.D.: Hiding in Plain Sight: Steganography and the Art of Covert Communication. Wiley, New York (2003)Google Scholar
  11. 11.
    Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 Workshop on Multimedia and Security, Ottawa, Canada (2001)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.“Aurel Vlaicu” University of AradAradRomania
  2. 2.“Vasile Goldis” Western University of AradAradRomania

Personalised recommendations