security enhancement of image hiding technique in mobile application ...

4 downloads 167209 Views 1MB Size Report
MOBILE APPLICATION USING SMS MODULE. Assistant Professor, Department of Mechatronics Engg., Chhattisgarh Swami Vivekanand Technical University, ...
RESEARCH PAPERS

SECURITY ENHANCEMENT OF IMAGE HIDING TECHNIQUE IN MOBILE APPLICATION USING SMS MODULE By CHANDRAKANT BADGAIYAN Assistant Professor, Department of Mechatronics Engg., Chhattisgarh Swami Vivekanand Technical University, Chattisgarh, India.

ABSTRACT The field of data security has attracted everybody's attention due to digitization of whole world. Now shopping on internet, sending e-mails, transfer of documents, and all other type of data like text, image, audio or video are considered as a common habit and the needs of mankind. But neither the medium used for data transfer is secured nor the storage media from hackers which encouraged data hiding techniques like Encryption and Steganography. On the other hand the world is being mobile day by day and almost all type of services is being ported on mobile phones whether it is messaging services, internet services, entertainment services, sensor based services or financial services in the form of various mobile applications. Millions of these applications are downloaded on mobile phones daily from all part of the world. In this paper, the authors to accomplish covert communication of images using mobile application as cover data and in order to provide authentication check to this new technique the authors used SMS module concept. SMS module allows only registered or authorised user to download the application and has many other advantages. This technique has overcome the problem of other Steganographic techniques like limited payload capacity with added advantage of mobility and portability as it runs on mobile phones instead of PC. Proposed technique was developed in J2ME platform and tested on Nokia C5 series phones. Keywords: J2ME, SMS, Encryption, Steganography, SMS Module. INTRODUCTION

data within a cover data such that other individuals fail to

Since 1985 after the advent of mobile phone, it has been

observe their existence [3]. The word steganography is a

developed such that today we are dependent on it due

Greek word that means "hidden writing". While

to its multifunctional behaviour. Initially mobile phones

implementing this method, the main purpose is to hide

were developed as a device for communication

data in a cover media such that other person will not

between two party but due to its all time presence with

notice that such information is there. This is the basic

human and portability, mobile phone are being changed

difference between Steganography and cryptography.

day by day in terms of advanced sensors, network

In steganography, individuals will not notice at all that

connections and sophisticated software support.

data exists in the sources [4]. Most of Steganographic

Softwares for Mobile phone are written by languages which are specialized dealing the specifications and limitations of the mobile phones. Some of the famous programming languages are C++ and J2ME (Java 2 Micro Edition), which is a embedded version of Java language for small devices such as mobile phones, set top box and PDAs (Personal Digital Assistant). Steganography is a method of secret exchange of data, became popular in recent years, mainly aimed to hide

techniques utilize images, video clips, text, music and sound files as cover files [5]. These techniques have been implemented on variety of systems such as computers and mobile phones [6]. The steganography method, in addition to application in cover exchange of information, is also used in fields like copyright protection, preventing e-document forging, etc [7] [16]. Various types of Steganographic technique exist are like Text, Image, Audio, Video and Protocol [1], [9]. Any

i-manager’s Journal on Software Engineering, Vol. 7 l No. 3 l January - March 2013

15

RESEARCH PAPERS Steganographic technique performance can be

secret data is image type and its file format can be any

evaluated based on criteria Invisibility, Payload capacity,

type. This secret data is hidden inside the JAR file which is

Robustness against statistical attacks, Robustness against

executable files in case of J2ME based platform. Then this

cover data manipulation, Independent of file format and

JAD/JAR files are downloaded to mobile phones from the

Unsuspicious files [1], [10].

server or a website directly and then installed on it. In order

None of Steganographic technique fulfills all the above

to recover the secret image from application user has to

requirements. A trade off must be selected, depending

use his secret key and it will recover. User can again hide

on which requirements are more important for the

image by using his secret key. But this technique had no arrangement for user's authentication check [17]. For user

specific application [2], [15].

checking authentication of user the author implement

1. Survey Work In this section, a detailed analysis of Mobile application based on Steganographic technique and some of the previous Steganographic techniques implemented on

SMS Module [18] in Mobile based Steganographic technique [17] which is discussed in next section. 2. Methodology

mobile phone platform has been done. Various types of

In all type of Steganographic technique secret

steganography on mobile phones are basically based on

information is hidden into some Cover file based on some

SMS [11], [12], [13], [14], [8], MMS and mobile apps based

algorithm. Since these methods change cover file either

steganography which uses text steganography and

in spatial domain or in transform domain some properties

image steganography techniques.

of Cover file to hide Secret information based on

After in deep study of Steganographic techniques

particular Steganographic Algorithm. Because of these process changes in cover data first disadvantage is the

following problems are identified: · There is no standard way to embed all type of data i.e.

text, image, audio and video, in a single cover data [1]. · Same algorithm cannot be used for all formats of

data like for image BITMAP, PNG and JPEG [1]. · Amount of data being embedded is limited because

of cover size dependency.

amount of payload is limited and also dependent on the size of cover data and changes in cover data caused in noise production in cover image. Hence in this technique of image hiding in mobile application, the author mix secret image with mobile application resources in such a way that it cannot be retrieved from any other means except by using Mobile Apps in running state [17]. The control flow diagram is

· High processing power and high time is required for

PC Based Stego Technique

Mobile Based Stego Technique

Connectivity

Internet Required

SMS/MMS/WAP Is Available, Internet Is Extra

2

Cost

Costly Affairs (Starting From 17000 Rs)

Huge Range(J2me Devices Starting From 2000 Rs)

3

Processing Power Required

High

Low

authors shift Steganographic technique to Mobile

4

Processing Speed

High

Low

platform. Hence Table 1 shows the advantages while

5

Portability

No

Yes

using a mobile as platform over PC based

6

Size/Weight

7

Future Scope

Difficult To Carry Everywhere Saturated field

Small Easily Carry Enormous

8

Application

Stand alone

All movable apps

current algorithms.

S. No.

Property

1

· Dependency of Personal Computer is there, for

reproduction of secret information which is a costly affair and not a portable solution. Most of techniques available in the field of steganography are PC oriented. In this approach the

Steganographic techniques. Above all problems were solved by the Mobile apps based Steganographic techniques [17]. In this technique

16

Table 1. Comparison of PC based steganography and mobile based steganography

i-manager’s Journal on Software Engineering, Vol. 7 l No. 3 l January - March 2013

RESEARCH PAPERS shown in Figure 1. This technique has no way of user

obtained by implementing the SMS module on this.

authentication check and real time interactive

· This proposed method enables only authorized or

communication. For enhancing the capability of mobile

registered user to download the applications by using IMEI

apps based Steganographic method and improving its

number. This feature is very useful for secret agency.

security, the author implement SMS module [18] concept on it. The control flow diagram of this is shown in Figure 2. The proposed technique is implemented on J2ME enable

· SMS module can also be used for covert communication between server or a particular device and user device using SMS chat.

device and. Run & Tested on Nokia C5 phone. In order to achieve this, flow of control Figures 1 and 2 implemented in a Mobile Application which can be any utility like Paint Brush and entertainment application like any Mobile Game. In this case this utility application is Paint Brush. The result obtained are shown in Figure 3 and 4. 3. Result 3.1 Advantages Along with all the advantages of mobile application based steganography [17] following advantages are

Figure 2. Control flow diagram of SMS Module [18]

Figure1. Control flow diagram of technique [17]

Figure 3. Paint Brush App in Normal Mode

i-manager’s Journal on Software Engineering, Vol. 7 l No. 3 l January - March 2013

17

RESEARCH PAPERS · It can also be used for used location identification

used by ground agents of secret agencies such as RAW,

and user registration.

CBI, FBI, CIA etc because of its mobility , portability, various

3.2 Limitations

modes of connectivity and less power usage features.

· In this proposed technique secret information is

· Proposed technique can be used for covert

mixed with Mobile Application resource, though it does

communication such as chatting by SMS module use.

not catch any attention but it can be recovered by

It has no limitation related to type of file format, data type

extraction of Mobile Application package file or

and size of data, this can be used with almost all type

executable file. This problem can be resolved by

Steganographic application.

Binarization of secret data file.

4. Performance Evaluation

· As in this technique, secret embedded image can be

After implementation of SMS module in the Mobile Apps

retrieved by only means of secret key and that key is used

based Steganographic technique, we get the

in source code module of image recovering hence this

advantage of dynamically authorization check of user

password can be recovered by reverse engineering of

identity by its IMEI number and only authorized user can

source code file. Obfuscation of source code is one

install and download our application. Registration of user

solution of this problem.

is done by concerned organization from its server side by

· Above both situation comes when user device goes

maintaining the phone no. of authorized used. SMS

in the hand of some hackers but this require not only large

module may also be useful in real time message transfer

time and a communication media between user mobile

between user and server.

and PC but also requires special type of software for

Conclusion

analyzing.

In this work, the author implemented SMS Module [18]

3.3 Applications

concept into a new Steganographic method which is

· Mobile based Steganography Technique can be

presented for hiding images into a completely new cover data i.e. a mobile application [17]. The payload capacity of Mobile based Steganographic technique is not dependent on the cover data. As this technique is a real time application for mobile phones user can access and use this at anywhere on his mobile phone, mobility is one of the prominent feature with this technique which was not available in others techniques used for Steganography. Proposed technique has limitation that secret image can be exposed to hacker when he has clue that a mobile application has contain a embedded secret image into it. Recovering image file from any unfair means will require media connection of mobile phones to PC and specialized software. It has also threat from code reverse engineering. Both of these limitations can be overcome by using Obfuscation in coding and Binarization of resource data. Now by implementing SMS module concept the authors increased its security which is discussed in Table 2. Many

Figure 4. After Applying Secret Key, Image Display Mode

18

m o b i l e p h o n e s s u p p o r t J a v a p l a t f o r m, a n d

i-manager’s Journal on Software Engineering, Vol. 7 l No. 3 l January - March 2013

RESEARCH PAPERS Property

Without SMS Module

With SMS Module

Real Time Communication Authentication Check Using IMEI No.

No

Communication Using Chatting Is Possible Only Authorized User Are Allowed To Download Apps

3

S/W Activation Key Transfer

No

This Check Can Be Applied Using Sms Module

4

Software User Registration

No

It Can Be Used To Register User’s Phone No.

1 2

5

GPS Based Location Tracking Of User

No

No

It May Be Used For Continuously Tracing The Location Of User

Table 2. Comparison of Mobile Application based Steganographic techniques with and without implementation of SMS Module concept

approximately all mobile phones can download mobile

Springer Lecture Notes in Computer Science, Vol. 1242, Milan, Italy, May 1997, pp. 423-436. [8]. M. Hassan Shirali-Shahreza, Mohammad ShiraliShahreza, (2007). ” Sending Mobile Software Activation Code by SMS Using Steganography ”, Intelligent Information Hiding and Multimedia Signal Processing, 2007, IIHMSP 2007, Third International Conference on 2007, pp. 554-557 [9]. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, (2010). "Digital image steganography: Survey and analysis of current methods" 2010, Elsevier, Signal Processing , pp. 727-752 [10]. Mohammad Shirali Shahreza, (2006). ”Stealth

application, so this method can be implemented on

Steganography in SMS”, IEEE Wireless and Optical

wide range of mobile phones. This method has real time

Communications Networks, 2006 IFIP International

applications for all spy agencies.

Conference.

References

[11]. Mohammad Shirali-Shahreza, M. Hassan Shirali-

[1]. Samir K Bandyopadhyay, Debnath Bhattacharyya,

Shahreza, (2007). “Text Steganography in SMS”, 2007

Debashis Ganguly, Swarnendu Mukherjee, Poulami Das,

International Conference on Convergence Information

(2008). ”A Tutorial Review on Steganography ”,

Technology.

International conference 2008 at JIIT.

[12]. M. Hassan Shirali-Shahreza, Mohammad Shirali-

[2]. Ahsan, K. & Kundur, D., (2002). “Practical Data hiding

Shahreza, (2008). “Steganography in SMS by Sudoku

in TCP/IP”, Proceedings of the Workshop on Multimedia

Puzzle”, Computer Systems and Applications, 2008.

Security at ACM Multimedia, 2002.

AICCSA 2008. IEEE/ACS International Conference , pp.

[3]. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn,

844-847

(1999). "Information hiding-a survey," Proceedings of the

[13]. Khan Farhan Rafat, (2009). “Enhanced Text

IEEE, Vol. 87, Issue 7, July 1999, pp. 1062-1078.

Steganography in SMS”, Computer, Control and

[4]. J.C. Judge, (2001). "Steganography: Past, Present,

Communication, 2009, IC4 2009, 2nd International

Future," SANS white paper, 30 November, 2001,

Conference, pp. 1-6

http://www.sans.org/rr/papers/index.php?id=552.

[14]. W. Bender, D. Gruhl, N. Morimoto and A. Lu, (1996).

[5]. N.J. Hopper, (2004). Toward a theor y of

“Techniques for data hiding”, IBM Systems Journal, vol. 35,

Steganography, Ph.D. Dissertation, School of Computer

Issue 3&4, 1996, pp. 313-336

Science Carnegie Mellon University, Pittsburgh, PA, USA,

[15]. Zenon Hrytskiv, Sviatoslav Voloshynovskiy, Yuriy

July 2004.

Rytsav., “Cryptography and Steganography of Video

[6]. M. Shirali-Shahreza, (2005). "An Improved Method for

information in modern communication”, Electronics and

Steganography on Mobile Phone," WSEAS Transactions on

Energetics, Vol 11, No. 1, 115-225

Systems, Vol. 4, Issue 7, July 2005, pp. 955-957.

[16]. Chandrakant Badgaiyan, Ashish Kumar

[7]. F. Hartung and B. Girod, (1997). "Copyright Protection

Dewangan, Bhupesh Kumar Pandey, Keerti Yeulkar,

in Video Delivery Networks by Watermarking of Pre-

Kaushal Kumar Sinha, (2012). “A New Steganographic

Compressed Video," Proceedings of Multimedia

Technique: Image Hiding in Mobile Application”,

Applications, Services and Techniques ECMAST '97',

International Journal of Advanced Computer and

i-manager’s Journal on Software Engineering, Vol. 7 l No. 3 l January - March 2013

19

RESEARCH PAPERS Mathematical Sciences, Vol 3, No. 4, 2012 pp 556-562

Software Activation Key Using SMS Module”, CIIT

[16]. Chandrakant Badgaiyan, Ashish Kumar

International Journal of Automation and Autonomous

Dewangan, (2012). “ A New Method of Sending Mobile

System, Vol 4, No 6, June 2012.

ABOUT THE AUTHOR D

20

i-manager’s Journal on Software Engineering, Vol. 7 l No. 3 l January - March 2013

Suggest Documents