Abstract
The process of hiding information in a scientific and artistic way is known as Steganography. The information hidden cannot be easily retrieved or accessed and is unidentifiable. In this research, some of the existing methods for image steganography has been explained. These are LSB (Least Significant Bits) substitution method, DCT (Discrete Cosine Transform) and DWT (Discrete Wavelet Transform). A comparative analysis of these techniques depicted that LSB is the easiest and most efficient way of hiding information. But this technique can be easily attacked and targeted by attackers as it changes the image resolution. Using LSB technique an application was created for image steganography because it hides the secret message in binary coding. To overcome this problem a RSA algorithm was used in the least significant bits of pixels of image. Additionally, a QR code was generated in the encryption process to make it more secure and allow the quality of the image to remain as intact, as it was before the encryption. PNG and JPEG formats were used as the cover image in the app and findings also indicated the data was fully recovered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Morkel, T., Eloff, J.H., Olivier, M.S.: An overview of image steganography. In: Information and Computer Security Architecture (ISSA), pp. 1–11 (2005)
Reddy, R., Ramani, R.: The process of encoding and decoding of image steganography using LSB algorithm. Int. J. Comput. Sci. Eng. Technol. 2(11), 1488–1492 (2012)
Ibrahim, R., Kuan, T.S.: Steganography algorithm to hide secret message inside an image. arXiv (preprint) arXiv:1112.2809 (2011)
Dunbar, B.: A detailed look at steganographic techniques and their use in an open-systems environment, pp. 1–8 (2002)
Dabas, P., Khanna, K.: A study on spatial and transform domain watermarking techniques. Int. J. Comput. Appl. 71(14), 38–41 (2013)
Muhammad, N., Bibi, N., Mahmood, Z., Kim, D.G.: Blind data hiding technique using the Fresnelet transform. SpringerPlus 4(1), 832 (2015)
Umamaheswari, M., Sivasubramanian, S., Pandiarajan, S.: Analysis of different steganographic algorithms for secured data hiding. IJCSNS Int. J. Comput. Sci. Netw. Secur. 10(8), 154–160 (2010)
Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)
Krenn, R.: Steganography and steganalysis (2004). http://www.retawprojects.com/uploads/steganalysis.pdf
Ahuja, B., Kaur, M.: High capacity filter based steganograph. Int. J. Recent Trends Eng. 1(1), 672–674 (2009)
Sharma, V.K., Shrivastava, V.: A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection. J. Theor. Appl. Inf. Technol. 36(1), 1–8 (2012)
Devi, G.S., Thangadurai, K.: An analysis of LSB based image steganography techniques. In: Computer Communication and Informatics (ICCCI), pp. 1–4 (2014)
Goel, S., Rana, A., Kaur, M.: A review of comparison techniques of image steganography. Glob. J. Comput. Sci. Technol. 13(4), 9–14 (2013)
Kaur, G., Kochhar, A.: A steganography implementation based on LSB & DCT. Int. J. Sci. Emerg. Technol. Latest Trends 4(1), 35–41 (2012)
Kumar, V., Kumar, D.: Performance evaluation of DWT based image steganography. In: Advance Computing Conference (IACC), vol. 6, no. 10, pp. 223–228 (2010)
Milanov, E.: The RSA algorithm, pp. 1–11. RSA Laboratories (2009)
Kak, A.: Public-key cryptography and the RSA algorithm. Lecture Notes on Computer and Network Security, Purdue University, pp. 3–7 (2015)
Altaay, A.A.J., Sahib, S.B., Zamani, M.: An introduction to image steganography techniques. In: 2012 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012, pp. 122–126 (2013)
Association of Nova Scotia Museums 2015, QR code how-to guide. http://www.rcip-chin.gc.ca/media/pro/carrefour-du-savoir-knowledge-exchange/ansm_qr/codes_qr-qr_codes-eng.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Gurung, K., Azam, S., Shanmugam, B., Kannoorpatti, K., Jonkman, M., Balasubramaniam, A. (2018). A Novel Approach for Steganography App in Android OS. In: Abraham, A., Muhuri, P., Muda, A., Gandhi, N. (eds) Intelligent Systems Design and Applications. ISDA 2017. Advances in Intelligent Systems and Computing, vol 736. Springer, Cham. https://doi.org/10.1007/978-3-319-76348-4_43
Download citation
DOI: https://doi.org/10.1007/978-3-319-76348-4_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76347-7
Online ISBN: 978-3-319-76348-4
eBook Packages: EngineeringEngineering (R0)