Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss
نویسندگان
چکیده
Information hiding techniques, specifically steganography, have been extensively researched for over two decades. However, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose AndroidStego – a framework for steganography employing smartphones. Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers’ communication networks such as Verizon and Sprint. A key contribution of our research presented in this paper is the benchmark results we have provided by analyzing real world cellular carriers’ network restrictions on MMS message size. We have also analyzed the actions the carriers take – such as compression and/or format conversion – on MMS messages that fall outside the established MMS communication norm, which varies for each service provider. Finally, we have used these benchmark results in implementing Android-Stego such that it is sensitive to carrier restrictions and robust to message loss.
منابع مشابه
Audio Steganography for Covert Data Transmission by Imperceptible Tone Insertion
This paper presents the technique of embedding data in an audio signal by inserting low power tones and its robustness to noise and cropping of embedded speech samples. Experiments on the embedding procedure applied to cover audio utterances from noise-free TIMIT database and a noisy database demonstrate the feasibility of the technique in terms of imperceptible embedding, high data rate and ac...
متن کاملA Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain
This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...
متن کاملAn Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution
In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio,...
متن کاملReal Time Implementation of Secured Multimedia Messaging Service System using Android
In this paper encryption and steganography algorithms are implemented using JAVATM with android platform to provide the security for real time multimedia messaging service system. Establishing hidden communication for mobile has become an important subject of security. One of the methods to provide security is steganography. Steganography is used to hide secret information inside some carrier. ...
متن کاملNew robust and secure alphabet pairing Text Steganography Algorithm
Steganography has been practiced since ancient times. Many Linguistic Steganography (popularly known as Text based Steganography) algorithms have been proposed like Word Spacing, Substitution, Adjectives, Text Rotation, Mixed Case Font etc.. Information Hiding effectively means that the method/technique should be Robust, Secure and have good Embedding capacity. Measure of Similarity between cov...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- ICST Trans. Ambient Systems
دوره 2 شماره
صفحات -
تاریخ انتشار 2015