Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss

نویسندگان

  • Avinash Srinivasan
  • Jie Wu
  • Justin Y. Shi
چکیده

Information hiding techniques, specifically steganography, have been extensively researched for over two decades. However, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose AndroidStego – a framework for steganography employing smartphones. Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers’ communication networks such as Verizon and Sprint. A key contribution of our research presented in this paper is the benchmark results we have provided by analyzing real world cellular carriers’ network restrictions on MMS message size. We have also analyzed the actions the carriers take – such as compression and/or format conversion – on MMS messages that fall outside the established MMS communication norm, which varies for each service provider. Finally, we have used these benchmark results in implementing Android-Stego such that it is sensitive to carrier restrictions and robust to message loss.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Audio Steganography for Covert Data Transmission by Imperceptible Tone Insertion

This paper presents the technique of embedding data in an audio signal by inserting low power tones and its robustness to noise and cropping of embedded speech samples. Experiments on the embedding procedure applied to cover audio utterances from noise-free TIMIT database and a noisy database demonstrate the feasibility of the technique in terms of imperceptible embedding, high data rate and ac...

متن کامل

A Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain

This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...

متن کامل

An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution

In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio,...

متن کامل

Real Time Implementation of Secured Multimedia Messaging Service System using Android

In this paper encryption and steganography algorithms are implemented using JAVATM with android platform to provide the security for real time multimedia messaging service system. Establishing hidden communication for mobile has become an important subject of security. One of the methods to provide security is steganography. Steganography is used to hide secret information inside some carrier. ...

متن کامل

New robust and secure alphabet pairing Text Steganography Algorithm

Steganography has been practiced since ancient times. Many Linguistic Steganography (popularly known as Text based Steganography) algorithms have been proposed like Word Spacing, Substitution, Adjectives, Text Rotation, Mixed Case Font etc.. Information Hiding effectively means that the method/technique should be Robust, Secure and have good Embedding capacity. Measure of Similarity between cov...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • ICST Trans. Ambient Systems

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2015