CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Design of Image Steganography based on RSA Algorithm and LSB Insertion for Android Smartphones

by Richard Apau, Clement Adomako
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 1
Year of Publication: 2017
Authors: Richard Apau, Clement Adomako
10.5120/ijca2017913557

Richard Apau, Clement Adomako . Design of Image Steganography based on RSA Algorithm and LSB Insertion for Android Smartphones. International Journal of Computer Applications. 164, 1 ( Apr 2017), 13-22. DOI=10.5120/ijca2017913557

@article{ 10.5120/ijca2017913557,
author = { Richard Apau, Clement Adomako },
title = { Design of Image Steganography based on RSA Algorithm and LSB Insertion for Android Smartphones },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 1 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 13-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number1/27446-2017913557/ },
doi = { 10.5120/ijca2017913557 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:03.303379+05:30
%A Richard Apau
%A Clement Adomako
%T Design of Image Steganography based on RSA Algorithm and LSB Insertion for Android Smartphones
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 1
%P 13-22
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Modern advancement in communication technologies has resulted in the widely and increase in use of smartphones such as android, blackberry, iPhones and much more. The proliferation of smartphones raises much security issues. This is so because the security features of such devices are limited. The most novel approach to arrest the security challenges in the smartphone is cryptography and steganography. Cryptography concerns itself with the masking of the content of a secret message whereas steganography deals with the concealment or hiding of a secreted message from the unauthorized person. The system proposed in this study uses a cover object, image specifically to hide the message to be sent. Before a message is embedded in the image, the message is first encrypted using RSA encryption algorithm. After the message has been encrypted, the process of embedding or hiding the message in the image is carried on. Least Significant Bit (LSB) technique is used to embed the message into the video. The performance Analysis was carried out using Peak-Signal-to –Noise-Ratio (PSNR). The results show that high security and robustness is achieved in smartphones when cryptography is combined with steganography.

References
  1. Thanikkal, J. G., Danish, M., & Sarwar, S. A. (October, 2014) New Android Based Steganography Application for Smartphone’s. Journal of Basic and Applied Engineering Research. Print ISSN: 2350-0077; Online ISSN: 2350-0255; Volume 1, Number 8; pp. 32-35.
  2. Savithri G, K.L.Sudha.( July 2014). Android Application for Secret Image Transmission and Reception Using Chaotic Steganography. International Journal of Innovative Research in Computer and Communication Engineering Vol. 2, Issue 7,
  3. Bucerzan, D., Raţiu, C., & Manolescu, M. J. (2013). SmartSteg: A New Android Based Steganography Application. International Journal of Computers, Communications & Control, 8(5).
  4. Jeon, W., J. Kim, Y. Lee, and D. Won, 2011. A Practical Analysis of Smartphone Security, In M.J. Smith, G. Salvendy (Eds.): Human Interface, Springer-Verlag Berlin Heidelberg,311-320.
  5. Apau, R., Hayfron-Acquah, J.B., and Twum, F. (June 2016). Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion. International Journal of Computer Applications, 143 (4), 28-36.
  6. Shelke, M. F. M., Dongre, M. A. A., & Soni, M. P. D. (2014). Comparison of different techniques for Steganography in images. International Journal of Application or Innovation in Engineering & Management, 3(2).
  7. Morkel, T., Eloff, J. H., & Olivier, M. S. (2005, June). An overview of image steganography. In ISSA (pp. 1-11).
  8. Eltyeb E. and Elgabar,A (2013)“Comparison of LSB Steganography in BMP and JPEG Images”, International Journal of Soft Computing and Engineering (IJSCE) ISSN:2231-2307, Volume-3, Issue-5.
  9. Al-Vahed, A., & Sahhavi, H. (2011). An overview of modern cryptography. World Applied Programming, 1(1), 3-8.
  10. Kessler, G. C. (2015). An overview of cryptography. http://www.garykessler.net/library/crypto.html#purpose (accessed 2015 November 11)
  11. Garg, N., Yadav, P. (2014) Comparison of Asymmetric Algorithms in Cryptography ,International Journal of Computer Science and Mobile Computing, IJCSMC Vol.3 Issue.4,pg. 1190-1196.
  12. Salomaa, A. (2013). Public-key cryptography. Springer Science & Business Media.
  13. Das, S., Das, S., Bandyopadhyay, B., & Sanyal, S. (2011). Steganography and Steganalysis: different approaches. arXiv preprint arXiv:1111.3758.
  14. Bateman, P., & Schaathun, H. G. (2008). Image steganography and steganalysis. Department Of Computing, Faculty of Engineering and Physical Sciences, University of Surrey, Guildford, Surrey, United Kingdom, 4th August.
  15. Pevný, T., & Fridrich, J. (2008). Detection of double-compression in JPEG images for applications in steganography. Information Forensics and Security, IEEE Transactions on, 3(2), 247-258.
  16. Budhia, U., Kundur, D., & Zourntos, T. (2006). Digital video steganalysis exploiting statistical visibility in the temporal domain. Information Forensics and Security, IEEE Transactions on, 1(4), 502-516.
  17. Qi, Q. (2013). A Study on Countermeasures against Steganography: an Active Warden Approach (Doctoral dissertation, University of Nebraska).
  18. Westfeld, A., & Pfitzmann, A. (2000). Attacks on steganographic systems breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-Tools—and some lessons learned Lecture notes in computer science. vol. 1768.
  19. Chen, Y. H., & Huang, H. C. (2011, October). A copyright information embedding system for android platform. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on (pp. 21-24). IEEE.
  20. Rughani, P. H., & Pandya, H. N. (2012). Steganography on ANDROID based smart phones. International Journal of Mobile & Adhoc Network, 2(2), 150-152.
  21. Sivakumar, S. and B.Rajesh (2014). Steganography on Android Based Smart Phones. International Journal of Computer Science and Mobile Computing.Vol. 3, Issue. 5, pg.1051 – 1054
  22. Srinivasan, A., Wu, J., & Shi, J. (2015, May). Android-Stego: a novel service provider imperceptible MMS steganography technique robust to message loss. In Proceedings of the 8th International Conference on Mobile Multimedia Communications (pp. 205-212). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
  23. Rajashri Ghare, Pruthvi Bansode , Sagar Bombale , Bilkis Chandargi (2015).LSB Steganography Using Android Phone.International Journal of Computer Science and Information Technologies, Vol. 6 (2) ,1027-1029.
  24. Khushali Pandit and Varsha Bhosale (2015). Implementation of Location based Steganography on mobile Smartphone using Android Platform. International Journal of Computer Science and Information Technologies, Vol. 6 (3) ,2606-2609.
  25. Gui, X., X.Li, B.Yang, 2014. A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Processing, 98: 370-380.
Index Terms

Computer Science
Information Sciences

Keywords

Image Steganography Smartphones Android Cryptography LSB RSA PSNR.