CFP last date
02 December 2024
Call for Paper
January Edition
CAE solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 02 December 2024

Submit your paper
Know more
Reseach Article

Implementing Image Steganography Techniques for Secure Data Hiding in the Development of an Android Application

by Ayodeji Olusegun Akinwumi, Oluwatosin Lara Ogbeide, Deborah Feyisayo Folorunso
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 39
Year of Publication: 2023
Authors: Ayodeji Olusegun Akinwumi, Oluwatosin Lara Ogbeide, Deborah Feyisayo Folorunso
10.5120/cae2023652902

Ayodeji Olusegun Akinwumi, Oluwatosin Lara Ogbeide, Deborah Feyisayo Folorunso . Implementing Image Steganography Techniques for Secure Data Hiding in the Development of an Android Application. Communications on Applied Electronics. 7, 39 ( Aug 2023), 26-33. DOI=10.5120/cae2023652902

@article{ 10.5120/cae2023652902,
author = { Ayodeji Olusegun Akinwumi, Oluwatosin Lara Ogbeide, Deborah Feyisayo Folorunso },
title = { Implementing Image Steganography Techniques for Secure Data Hiding in the Development of an Android Application },
journal = { Communications on Applied Electronics },
issue_date = { Aug 2023 },
volume = { 7 },
number = { 39 },
month = { Aug },
year = { 2023 },
issn = { 2394-4714 },
pages = { 26-33 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume7/number39/893-2023652902/ },
doi = { 10.5120/cae2023652902 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T20:03:02.677600+05:30
%A Ayodeji Olusegun Akinwumi
%A Oluwatosin Lara Ogbeide
%A Deborah Feyisayo Folorunso
%T Implementing Image Steganography Techniques for Secure Data Hiding in the Development of an Android Application
%J Communications on Applied Electronics
%@ 2394-4714
%V 7
%N 39
%P 26-33
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid advancement of information and communication technology (ICT) has revolutionized communication and streamlined various tasks. With the widespread use of mobile phones by over 6 billion people globally, they have become the dominant means of communication and an essential personal tool. As mobile devices store sensitive personal data, ensuring data security has become paramount due to the rising incidence of digital crimes and the increasing reliance on these devices. While passwords and PINs have been employed as data security measures, research has indicated their vulnerability to attacks, highlighting the need for alternative techniques. In response to these challenges, this work introduces an Android application called 'The Hider', which uses the concept of image steganography for secure communication for Android phone users. The application is developed using Dart, a modern programming language, while the user interface (UI) is built with Flutter, a framework known for creating visually appealing and responsive interfaces. The proposed application utilizes cover images in formats like JPEG, PNG, or BMP to conceal both text and files, employing the AES encryption method. To enhance security, the application incorporates a secret key for encryption and decryption, along with a biometric feature that verifies the user's fingerprint. Considering these features, 'The Hider' application is recommended for all Android users seeking enhanced data security and privacy.

References
  1. A. O. Akinwumi, A. O. Akingbesote, O. O. Ajayi, and F. O. Aranuwa, “Detection of Distributed Denial of Service (DDoS) attacks using convolutional neural networks,” Niger. J. Technol., vol. 41, no. 6, pp. 1017–1024, 2022, doi: 10.4314/njt.v41i6.12.
  2. M. Kuyucu, “Mobile Media as A Digital Communication Tool,” in New Searches and Studies in Social and Humanities Sciences, 2021, pp. 33–52.
  3. E. Kadëna and L. Ruiz, “Adoption of biometrics in mobile devices,” in Symposium for Young Researchers, Budapest, 2017, pp. 140–148.
  4. W. Melicher et al., “Usability and Security of Text Passwords on Mobile Devices,” in Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016, pp. 527–539. doi: 10.1145/2858036.2858384.
  5. O. O. Ajayi, A. A. Omotayo, A. O. Orogun, T. G. Omomule, and S. M. Orimoloye, “Performance Evaluation Of Native and Hybrid Applications,” Commun. Appl. Electron., vol. 7, no. 16, pp. 1–9, 2018, [Online]. Available: www.caeaccess.org
  6. P. Weichbroth and Ł. Łysik, “Mobile Security: Threats and Best Practices,” Mob. Inf. Syst., vol. 2020, pp. 1–15, 2020, doi: 10.1155/2020/8828078.
  7. T. Krishnappa, “Mobile Security Threats and a Short Survey on Mobile Awareness: a Review,” Int. J. Eng. Appl. Sci. Technol., vol. 7, no. 8, pp. 83–88, 2022, doi: 10.33564/ijeast.2022.v07i08.007.
  8. G. Ramya, “Steganography Based Data Hiding for Security Applications,” in Proceedings of the International Conference on Intelligent Computing and Communication for Smart World, IEEE, 2018, pp. 131–135. doi: 10.1109/i2c2sw45816.2018.8997153.
  9. Z. Lu and H. Mohamed, “A Complex Encryption System Design Implemented by AES,” J. Inf. Secur., vol. 12, no. 02, pp. 177–187, 2021, doi: 10.4236/jis.2021.122009.
  10. I. Mary and C. Prince, “Data Security : Threats , Challenges and Protection Data Security : Threats , Challenges and Protection,” no. May, 2021.
  11. IBM, “What is Data Security?” https://www.ibm.com/topics/data-security (accessed Jul. 11, 2023).
  12. H. Rout and B. K. Mishra, “Pros and Cons of Cryptography , Steganography and Perturbation techniques,” no. December 2014, 2015.
  13. Y. Shi, “Data Security and Privacy Protection,” in 2018 IEEE International Conference on Big Data, IEEE, 2018, pp. 4812–4819. doi: 10.1109/BigData.2018.8622531.
  14. D. Popescul, U. Alexandru, I. Cuza, and C. E. Intercultural, “The Confidentiality – Integrity – Accessibility Triad into the Knowledge Security . A Reassessment from the Point of View of the Knowledge Contribution to Innovation The Confidentiality – Integrity – Accessibility Triad into the Knowledge Security . A Rea,” no. June 2011, 2018.
  15. C. K. Yee and M. F. Zolkipli, “Review on Confidentiality , Integrity and Availability in Information Security,” J. ICT Educ., vol. 8, no. 2, pp. 34–42, 2021.
  16. M. Sreelatha, M. Shashi, M. Anirudh, M. Kumar, and M. S. Ahamerv, “Authentication Schemes for Session Passwords using Color and Images,” Int. J. Netw. Secur. Its Appl., vol. 3, no. 3, pp. 111–119, 2011.
  17. S. Y. Ameen, “Smart Android Graphical Password Strategy : A Review Smart Android Graphical Password Strategy : A Review,” no. June, 2021, doi: 10.9734/ajrcos/2021/v9i230220.
  18. S. Mishra and M. D. S. Dominic, “Steganography Data Hiding Technique,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 8, no. June, p. 6, 2020.
  19. P. Bedi and A. Dua, “Network Steganography using the Overflow Field of Timestamp Third International Option in an IPv4 Packet,” Procedia Comput. Sci., vol. 171, no. 2019, pp. 1810–1818, 2020, doi: 10.1016/j.procs.2020.04.194.
  20. S. Kaur, S. Bansal, and R. K. Bansal, “Steganography and Classification of Image Steganography Techniques.,” in Proceedings of the International Conference on Computing for Sustainable Global Development, 2014, pp. 870–875.
  21. J. Kour and D. Verma, “Steganography Techniques – A Review Paper,” Int. J. Emerg. Res. Manag. &Technology, vol. 9359, no. 5, pp. 132–135, 2014.
  22. F. S. Mohamad, N. Sahira, and M. Yasin, “Information Hiding Based on Audio Steganography using Least Significant Bit,” Int. J. Eng. Technol., vol. 7, no. 4.15, pp. 536–538, 2018.
  23. A. K. Nawar, “Hiding Information in Digital Images Using LSB Steganography Technique,” Int. J. Interact. Mob. Technol., vol. 17, no. 7, pp. 167–178, 2023, doi: 10.3991/ijim.v17i07.38737.
  24. R. Ibrahim and L. C. Kee, “MoBiSiS : An Android-based Application for Sending Stego Image through MMS,” in The Seventh International Multi-Conference on Computing in the Global Information Technology, 2012, pp. 115–120.
  25. Dominic Bucerzan, C. Ratiu, and M.-J. Manolescu, “SmartSteg : A New Android Based Steganography Application SmartSteg : A New Android Based Steganography Application Introduction,” Int. J. Comput. Commun. Control, vol. 8, no. 5, pp. 681–688, 2013, doi: 10.15837/ijccc.2013.5.642.
  26. A. Ullah and M. Ijaz, “Stego App : Android based image steganography application using LSB algorithm,” Int. Res. J. Eng. Technol., vol. 5, no. 9, pp. 862–865, 2018.
  27. P. D. Bhave, S. S. Desai, R. N. Mahale, and R. L. Mhatre, “Hospital Database System Using Image Steganography,” Int. J. Creat. Res. Thoughts, vol. 9, no. 5, pp. 97–101, 2021.
  28. J. Shilwar, A. Kalsa, A. Ahire, and D. D. Pawar, “An Android Application For Image Steganography And Editing App,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 11, no. 4, pp. 517–519, 2022, doi: 10.17148/IJARCCE.2022.11491.
  29. A. M. Hassan, “JAVA and DART programming languages : Conceptual comparison,” vol. 17, no. 2, pp. 845–849, 2020, doi: 10.11591/ijeecs.v17.i2.pp845-849.
  30. L. Dagne, “Flutter for Cross-Platform App and SDK Development,” Metrop. Univ. Appl. Sci., no. May, pp. 1–28, 2019.
  31. arcserve, “5 Common Encryption Algorithms and the Unbreakables of the Future,” Cybersecurity, 2023. https://www.arcserve.com/blog/5-common-encryption-algorithms-and-unbreakables-future (accessed Jul. 12, 2023).
  32. P. Telagarapu, B. Biswal, and V. S. Guntuku, “Design and Analysis of Multimedia Communication System,” in Proceedings of the Third International Conference on Advanced Computing, Chennai: IEEE, 2011, pp. 193–197. doi: 10.1109/ICoAC.2011.6165174.
  33. U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM , SSIM , MSE and PSNR — A Comparative Study,” J. Comput. Commun., vol. 7, pp. 8–18, 2019, doi: 10.4236/jcc.2019.73002.
  34. P. Rani and A. Arora, “Image Security System using Encryption and Steganography,” Int. J. Innov. Res. Sci. Eng. Technol., vol. 4, no. 6, pp. 3860–3869, 2015.
  35. T. Manikandan, A. Muruganandham, R. Babuji, V. Nandalal, and I. J. Mazher, “Secure E-Health using Images Steganography,” J. Phys. Conf. Ser., vol. 1917, pp. 1–7, 2021, doi: 10.1088/1742-6596/1917/1/012016.
Index Terms

Computer Science
Information Sciences

Keywords

Data security steganography cryptography encryption decryption cover image mobile devices Android The Hider.