Advertisement

A Novel Scheme to Hide Identity Information in Mobile Captured Images

  • Anand Gupta
  • Ashita Dadlani
  • Rohit Malhotra
  • Yatharth Bansal
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 166)

Abstract

A new research area concerning the application of steganography for hiding source identity information in mobile camera captured images is emerging. The work reported so far is focused on using MMS [Multimedia Messaging Service] and SMS [Short Message Service] as carrier media for covert communication and data security. The techniques employed for data hiding are lacking in a suitable combination of cryptography and steganography. The present paper proposes a novel scheme to hide source identity information (IMEI [International Mobile Equipment Identity] and IMSI [International Mobile Subscriber Identity] numbers) in mobile camera captured images. To achieve this, an application is developed that clicks images through mobile camera and hides IMEI and IMSI numbers in raw images before compressing them in PNG [Portable Network Graphics] format. The application encrypts the IMEI and IMSI numbers before hiding them. It uses a custom made key based algorithm for hiding these numbers randomly inside an image which ensures high security of hidden data. Runtime performance analysis of the above technique reveals that the computational lag due to encryption & steganography is miniscule. The technique is found feasible to run on actual mobile devices and can help identify the source of an anonymous mobile captured image.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lenti, J.: Steganographic Methods. Periodica Polytechnica Ser. El. Eng. 44(3-4), 249–258 (2000)Google Scholar
  2. 2.
    Shirali Shahreza, M.: An Improved Method for Steganography on Mobile Phone. In: Sandberg, I.W. (ed.) Proceedings of the 9th WSEAS International Conference on Systems, ICS 2005, World Scientific and Engineering Academy and Society (WSEAS), Article 28, 3 pages, Stevens Point, Wisconsin, USA (2005)Google Scholar
  3. 3.
    Shirali Shahreza, M.: Steganography in MMS. In: Proceedings of the 11th IEEE International Multitopic Conference, Lahore, Pakistan, December 28-30 (2007)Google Scholar
  4. 4.
    Dhanashri, D., Patil Babaso, S., Patil Shubhangi, H.: Mms Steganography For Smartphone Devices. In: Proceeding of 2nd International Conference on Computer Engineering and Technology, Jodhpur, India, November 13-14, vol. 4, pp. V4-513–V4-516 (2010)Google Scholar
  5. 5.
    Gupta, A., Barr, D.K., Sharma, D.: Mitigating the Degenerations in Microsoft Word, Documents: An Improved Steganographic Method. In: Proceedings of the 2nd International Conference on Computer, Control and Communication (IC4 2009), Karachi, Pakistan, February 17-18, pp. 1–6 (2009)Google Scholar
  6. 6.
    Dobsicek, M.: Modern Steganography, Department of Computer Science and Engineering, Faculty of Electrical Engineering, Czech Technical University, Prague (2003), www.scycore.com/papers/ow04_paper.pdf

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Anand Gupta
    • 1
  • Ashita Dadlani
    • 2
  • Rohit Malhotra
    • 2
  • Yatharth Bansal
    • 2
  1. 1.Division of Computer EngineeringNetaji Subash Institute of TechnologyNew DelhiIndia
  2. 2.Division of Information TechnologyNetaji Subash Institute of TechnologyNew DelhiIndia

Personalised recommendations