Review Paper on Digital Steganography in Android Application

Deepak Sharma, Anshu Sharma, G. Agarwal
{"title":"Review Paper on Digital Steganography in Android Application","authors":"Deepak Sharma, Anshu Sharma, G. Agarwal","doi":"10.9756/iajir/v5i1/1810002","DOIUrl":null,"url":null,"abstract":"The need of maintaining the secrecy and safety of the data is much more important than the data itself. Digital steganography is the modern weapon that ensures the security of multimedia files . This method comprises of both the cryptography and data hiding technique . Here in this paper a wide comparison of modern algorithms(DCT,LSB,BIT SLICING)that are used in steganography are discussed considering their past,present,future aspects. This paper identifies the basic to modern factors that are required to be encountered in today’s scenario. Keywords— Steganography ,Covered Encryption , LSB,DCT INTRODUCTION The reason why steganography application is reviewed for android is because as on date android is the most popular Operating system. Smart gadgets are so common these days and are used by every person who uses technology in day today life. Also the data needs to be secured more where it is stored in large.On standard scale approximately 85% of the digital data on and off network is accessed through mobile phones,tablets and e-books that runs on the android applications. Digital steganography technique aims to provide a unrevealed classified communication..This type of technique is also known as data hiding or cover writing.It is till date the utmost method used for maintaining the secrecy of private digital communication[5]. In this the secret file is Encrypted and Implanted in the cover file .The existence of secret file is only revealed to the intended receiver,while other unintended receiver remains unaware of its existence.The encryption of secret file with the secret key is also given as an option to sender for double secrecy. In steganography ,first the secret file that is to be communicated is chosen then suitable cover file is selected(depending upon file size)then it is encrypted with the private key (in case it is required) and compression of the file is also required in most of the cases thus is given in option, simultaneous to encryption[5]. OBJECTIVE This paper rolls out the reviews for the results of the efforts made to analyse and compare the various algorithms and techniques used for steganography in android application. It also attempts to discuss its present problem domain ,possible solution and its future propects .","PeriodicalId":286157,"journal":{"name":"International Academic Journal of Innovative Research","volume":"454 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Academic Journal of Innovative Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9756/iajir/v5i1/1810002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The need of maintaining the secrecy and safety of the data is much more important than the data itself. Digital steganography is the modern weapon that ensures the security of multimedia files . This method comprises of both the cryptography and data hiding technique . Here in this paper a wide comparison of modern algorithms(DCT,LSB,BIT SLICING)that are used in steganography are discussed considering their past,present,future aspects. This paper identifies the basic to modern factors that are required to be encountered in today’s scenario. Keywords— Steganography ,Covered Encryption , LSB,DCT INTRODUCTION The reason why steganography application is reviewed for android is because as on date android is the most popular Operating system. Smart gadgets are so common these days and are used by every person who uses technology in day today life. Also the data needs to be secured more where it is stored in large.On standard scale approximately 85% of the digital data on and off network is accessed through mobile phones,tablets and e-books that runs on the android applications. Digital steganography technique aims to provide a unrevealed classified communication..This type of technique is also known as data hiding or cover writing.It is till date the utmost method used for maintaining the secrecy of private digital communication[5]. In this the secret file is Encrypted and Implanted in the cover file .The existence of secret file is only revealed to the intended receiver,while other unintended receiver remains unaware of its existence.The encryption of secret file with the secret key is also given as an option to sender for double secrecy. In steganography ,first the secret file that is to be communicated is chosen then suitable cover file is selected(depending upon file size)then it is encrypted with the private key (in case it is required) and compression of the file is also required in most of the cases thus is given in option, simultaneous to encryption[5]. OBJECTIVE This paper rolls out the reviews for the results of the efforts made to analyse and compare the various algorithms and techniques used for steganography in android application. It also attempts to discuss its present problem domain ,possible solution and its future propects .
Android应用中的数字隐写技术综述
维护数据的保密性和安全性的需要比数据本身重要得多。数字隐写技术是保证多媒体文件安全的现代武器。该方法由加密技术和数据隐藏技术两部分组成。本文对用于隐写术的现代算法(DCT、LSB、BIT切片)进行了广泛的比较,讨论了它们的过去、现在和未来。本文确定了在今天的情景中需要遇到的基本到现代的因素。隐写术,覆盖加密,LSB,DCT介绍隐写术应用于android的原因是因为到目前为止,android是最流行的操作系统。如今,智能设备非常普遍,每一个在日常生活中使用科技的人都在使用它们。此外,数据需要在大量存储的地方得到更多的保护。在标准规模上,大约85%的网络上和网络外的数字数据是通过运行在android应用程序上的手机、平板电脑和电子书访问的。数字隐写技术的目的是提供一种未被披露的机密通信。这种类型的技术也被称为数据隐藏或掩护书写。这是迄今为止用于维护私有数字通信保密性的最佳方法[5]。在这种情况下,秘密文件被加密并植入到封面文件中。秘密文件的存在只透露给预定的接收者,而其他无意的接收者仍然不知道它的存在。使用密钥对秘密文件进行加密也作为发送方双重保密的选项。在隐写术中,首先选择要传递的秘密文件,然后选择合适的封面文件(取决于文件大小),然后用私钥加密(如果需要),并且在大多数情况下也需要压缩文件,因此在选项中给出,同时加密[5]。目的:本文对分析和比较android应用中用于隐写术的各种算法和技术的结果进行了综述。并试图讨论其目前的问题域、可能的解决方案和未来的展望。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信