6
A NOVEL A APPLICATION COMMUNIC INFORMATIO Sarosh K. Dastoor Asst Prof, Electronics and Communication Engineering D Sarvajanik College of Engineering and Techno Surat. Abstract- The era of Multimedia commun application on Mobile devices have gained mo onset of Android platform. Here we have consid as the cover signal to hide the sensitive data in the same application on the Android platfor (Integrated Development Environment); one su Eclipse. The proposed approach is quite crucial i conditions, as well in the defense rea Communication. The covert nature is the desira denies an unauthorized user from mining sensit claiming the ownership of music in case of water- Keywords—Android, multimedia, IDE, Eclipse I. INTRODUCTION Steganography deals with the skill o information in multi-media. So we can sa existence of information exchange taking sender and a receiver is concealed. Steganography attempts to hide all eviden existence of communication. Hence th communication in which the very existence o taking place is hidden. A simple technique w embedding of information in the least signi cover-audio file is known as Low-bit Encodin most important advantage prevailing in it is of the distortion. [2] When normal data is replaced or substitute data, it usually results in very little size chang However, depending on the type of host file a hidden data, the substitution method can degr the original host file. The message is hidden the multimedia file so generated is called the S II. SECURING DATA Many techniques suffice the entrenchment a digital audio file. The Binary message that substitutes the bits of each sampling point. audio is taken and the message is embedded i is encrypted so that no other person than the ANDROID BASED MOB N AS A VIRTUE OF CO ATION FOR CONCEA ON IN THE SPEECH SI Vintesh Patel Jr. Research Fellow Dept, Department of Science and Tec ology, Sarvajanik College of Engineering an Surat. nication and its omentum with the dered Speech signal it. We can develop rm using its IDE uch is provided by in military-warfare alted Information able feature which tive information or -mark embedding. e. f hiding digital ay that the very place between a nce regarding the he term covert of communication which involves the ificant bits of the ng Technique. The the minimization ed with the secret e for the host file. and the amount of rade the quality of n in the cover and Stego file. of information in has to be hidden, Firstly, the cover in it. The message e desired recipeint can receive the sent information. Th transmitter side is shown in figure 1. Figure 1. Information Hiding a At the receiver, figure. 2, the d takes place with the help of the ke with the recipient. Here the quality decides whether the file has been t pillars of Steganography are Con Unremovability which are inevitabl fledge protected. [1] Figure. 2 Information Retrieval III: TECHNIQUES OF INFO A. Least Significant Bit Technique Least significant bit (LSB) codin embed information in a digital aud least significant bit of each frame w coding allows for a large amount of Normally, the length of the secret smaller than the total number of sa flow-chart as shown in figure information in the cover audio signa BILE OVERT ALING IGNAL w chnology nd Technology, he information hiding at the . [6] at the Transmitter Side decryption of the message ey which is available only of plays a vital role, as it tampered or not. The three nfidentiality, Integrity and le to make the system full- l at the Receiving Side ORMATION HIDING e ng is the simplest way to io file. By substituting the with a binary message, LSB data to be embedded. [1] t message to be encoded is mples in a sound file. The 3, indicates hiding the l. 2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking 978-1-4673-1627-9/12/$31.00 ©2012 IEEE

[IEEE 2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking (ET2ECN) - Surat, Gujarat, India (2012.12.19-2012.12.21)] 2012 1st

  • Upload
    vintesh

  • View
    217

  • Download
    4

Embed Size (px)

Citation preview

A NOVEL AAPPLICATION

COMMUNICINFORMATIO

Sarosh K. Dastoor Asst Prof,

Electronics and Communication Engineering D Sarvajanik College of Engineering and Techno

Surat.

Abstract- The era of Multimedia communapplication on Mobile devices have gained moonset of Android platform. Here we have considas the cover signal to hide the sensitive data in the same application on the Android platfor(Integrated Development Environment); one suEclipse. The proposed approach is quite crucial iconditions, as well in the defense reaCommunication. The covert nature is the desiradenies an unauthorized user from mining sensitclaiming the ownership of music in case of water-

Keywords—Android, multimedia, IDE, Eclipse

I. INTRODUCTION

Steganography deals with the skill oinformation in multi-media. So we can saexistence of information exchange taking sender and a receiver is concealed.

Steganography attempts to hide all evidenexistence of communication. Hence thcommunication in which the very existence otaking place is hidden. A simple technique wembedding of information in the least signicover-audio file is known as Low-bit Encodinmost important advantage prevailing in it is of the distortion. [2]

When normal data is replaced or substitutedata, it usually results in very little size changHowever, depending on the type of host file ahidden data, the substitution method can degrthe original host file. The message is hiddenthe multimedia file so generated is called the S

II. SECURING DATA

Many techniques suffice the entrenchment

a digital audio file. The Binary message that substitutes the bits of each sampling point. audio is taken and the message is embedded iis encrypted so that no other person than the

ANDROID BASED MOBN AS A VIRTUE OF COATION FOR CONCEA

ON IN THE SPEECH SI Vintesh Patel

Jr. Research FellowDept, Department of Science and Tecology, Sarvajanik College of Engineering an Surat.

nication and its omentum with the

dered Speech signal it. We can develop

rm using its IDE uch is provided by in military-warfare

alted Information able feature which tive information or -mark embedding.

e.

f hiding digital ay that the very place between a

nce regarding the he term covert of communication

which involves the ificant bits of the ng Technique. The

the minimization

ed with the secret e for the host file. and the amount of rade the quality of n in the cover and Stego file.

of information in has to be hidden, Firstly, the cover in it. The message e desired recipeint

can receive the sent information. Thtransmitter side is shown in figure 1.

Figure 1. Information Hiding a

At the receiver, figure. 2, the dtakes place with the help of the kewith the recipient. Here the quality decides whether the file has been tpillars of Steganography are ConUnremovability which are inevitablfledge protected. [1]

Figure. 2 Information Retrieval

III: TECHNIQUES OF INFO

A. Least Significant Bit Technique

Least significant bit (LSB) codinembed information in a digital audleast significant bit of each frame wcoding allows for a large amount of

Normally, the length of the secretsmaller than the total number of saflow-chart as shown in figure information in the cover audio signa

BILE OVERT

ALING IGNAL w chnology nd Technology,

he information hiding at the . [6]

at the Transmitter Side

decryption of the message ey which is available only

of plays a vital role, as it tampered or not. The three nfidentiality, Integrity and le to make the system full-

l at the Receiving Side

ORMATION HIDING

e

ng is the simplest way to io file. By substituting the

with a binary message, LSB data to be embedded. [1] t message to be encoded is mples in a sound file. The 3, indicates hiding the

l.

2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking

978-1-4673-1627-9/12/$31.00 ©2012 IEEE

N

Figure 3. Flow chart representing the sequential steps iHiding Technique.

The message to be hidden is also encrTransposition Cipher Technique here and the substituted with the last bit of each frame.

B. Alternate LSB technique In Alternate LSB coding, the alternative

selected and according to that the messagereplaced. e.g. If (lsb-8th layer) is selected message data goes into the 8th layer of first frainto 7th layer of second frame, 3rd data go agaithird frame and the process continues.

The LSB method is quite fragile, so wtechniques which are comparatively more seThe Alternate Modified Method is better thanbecause this method has more robustness as

Initiate

Capture cover audio of a considerable le

Quantize the Cover audio into ‘n’ number o

Stego File ready for transmission

Encrypt the message using Transposition C

Take the data to be hidden with its encryption

Convert the quantized samples into binary

End

Replace the last bit of the digitized audio fithe encrypted message data

Is EK > data length Y

involved in the LSB

rypted using the encrypted data is

e layer would be e data would be initially, then 1st

ame, 2nd data goes in into 8th layer of

we require other ecure and robust. n the LSB method compared to the

LSB method. We can also hide the(L2, L3, L4 …) of the cover audio, wsecure, but the problem is that it innoise as we move towards the MSBthe complexity highly increases in th

C. Spread Spectrum Technique Spread spectrum (SS) method

information across the audio signalSS method spreads the secret mesfrequency spectrum, so the final signexcess of what is actually required fmessage is spread out by a constanthen modulated with a pseudorandom

Figure 4. Direct Sequence Spread S

Following algorithm shows the Sp• Secret message is encrypted• The encrypted message is

error –correcting code. It inof the system.

• The encoded message ispseudo-random signal thasecond symmetric key, K2 a

• The resulting random signais interleaved with the cove

• The final signal is quantizaudio file that contains the a

• The process is reversed for the receiver.

The SS method has the potential areas than LSB coding, in that itransmission rate while also mairobustness against removal tecdisadvantage is that it can introduce

IV: EXPERIMENTA

Figure 5, and figure 6 represents tcorresponding output Stego signal and Systems Using MATLAB) Tool

The input audio file comprises speaking for 4 seconds. Feature analyse the Sonogram of the signwith its Statistical RMS data virepresentation. Signal Feature expfeature in a signal. Figure 9 showExplorer Tool. The output clearly re

ength

of levels

Cipher

n key (EK)

y form

ile with

Reduce EK

e data in the higher layers which could be made more ntroduces more amount of (Most Significant Bit) and

his case. [6][9].

attempts to spread secret l's frequency spectrum. the sage over the sound file's

nal occupies a bandwidth in for transmission. The secret nt called the chip rate and m signal. [6]

Spectrum using X-ORing

pread Spectrum Technique: d using a message key, K1.

encoded using a low-rate ncreases overall robustness

s then modulated with a at was generated using a as a seed. al that contains the message er signal. zed to create a new digital audio message. the retrieval of message at

to perform better in some it offers a moderate data ntaining a high level of chniques. However, the noise into a sound file.

AL RESULTS

the input audio file and the using the SSUM (Signals

l in MATLAB R 2009. of the voice of a person Explorer tool is used to

nal simultaneously viewed ew and its time domain plorer explores Statistical ws the output of Feature sembles the input.

2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking

978-1-4673-1627-9/12/$31.00 ©2012 IEEE

Experimental results when visualized and heard, show that the listener can’t segregate the input audio and the output Stego file. SS Technique is the best method as it is quite robust as the integrity of the hidden message is maintained and hence widely used for hiding the information in the multimedia.

Figure 5. Sonogram, RMS data and time domain of Input signal

Figure 6. Sonogram, RMS data and FFT of Output Stego signal by LSB

Technique using SSUM tool.

Figure 7. Sonogram, RMS data and time domain of Input signal

Figure 8. Sonogram, RMS data and FFT of Output Stego signal by LSB

Technique using SSUM tool.

The Mean Square Error and the corresponding Signal to Noise ratio of the embedded messaged file can be computed as: [1][2] MSE = ∑ . (1)

SNR = 10 log ∑ . (2) Where, s(n) = the original Speech signal sample, y(n) = the output signal sample, M = total number of samples in the entire speech signal.

MSE = Mean Square Error SNR = Signal to Noise Ratio

TABLE I COMPARISON OF VARIOUS TECHNIQUES BASED ON PERFORMANCE

CHARACTERISTICS

Parameter LSB Technique

Alternate LSB

Spread Spectrum

SNR of the original signal and the noisy signal

23.7655 (dB)

2.9455 (dB)

18.6027 (dB)

MSE of the original signal and the noisy signal

2.0628e-005

0.0073 4.6254e-005

Complexity Least High Very high Robustness Least Moderate Very high

V: ANDROID APPLICATION DEVELOPMENT

Any piece of hardware without an operating system is nothing more than an electronic junk. It’s the operating system that fuels life into it. All the features and functionalities of the mobile device are controlled and managed by its operating system. Therefore, it’s the combination of the hardware and the operating system that determines what capabilities a mobile device can or cannot support. For example, if a Smartphone is to allow multiple applications to run simultaneously, it has to have an operating system that facilitates the sharing of

2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking

978-1-4673-1627-9/12/$31.00 ©2012 IEEE

processing and memory resources among multiple applications. [10]

Android is a software stack for mobile devices that includes an operating system, middleware and key applications. The Android SDK (Software Development Kit) provides the tools and APIs (Application Programming Interface) necessary to begin developing applications on the Android platform using the Java programming language. Android is an open source mobile OS platform, purely based on the Linux operating system, Apache harmony, and Dalvik Virtual machine and was first developed by Google, later backed by the Open Handset Alliance. A simple and attractive thing about Android is its Java-like language based on Google-developed Java libraries. Recently, for the first time, Google released the Native Development Kit (NDK) for Android which enables programmers to develop programs and native application that could run on the device. Following shows the merits of Android: [11] • The mobile platform Android is an open platform. • The installation of Android is possible on every cell

phone. • The installation of the whole environment to develop

Android applications is possible on every operating system.

• Android requires a low footprint of 250 Kbyte • The application model/life-cycle is future oriented with the

source code separation of view and logic. • The emulator of the Android platform has a modern

design and is easy to use. • Application installation on the emulator/device is possible

via Android Debug Bridge (ADB) or via Eclipse (with ADT plugin)

• Google offers a very good documentation as well as many examples which cover the most basic and important techniques used to get in touch with Android and the application development on it.

• Android supports all established techniques and standards for media, communication and data transfer.

VI: SOFTWARE DEVELOPMENT KIT

The Android Software Development Kit (SDK) is a set of software tools for developing applications that run on the Android mobile operating system. The SDK is modular and components can be downloaded independently. Available components include software needed to build Android applications as well as documentation, source code examples, and command-line tools useful for development and debugging. The SDK also includes an emulator that simulates different Android devices. The Android SDK is available on all three major platforms, and is designed to be used with the open source. Eclipse integrated development environment (IDE), but can be used with other IDEs. [10]

Android applications are built using the Java programming language, so one of the most important components of the Android SDK are the included libraries of Java classes. These

classes provide different functionality commonly used by a variety of programs, as well as giving developers a way to interact with the Android system. Software features refers to the availability of specific software applications, their quality, and the user satisfaction. Often times these software features are what define the phone and include items like email, Internet, word processing, and more. Following Table shows the comparison of Software Features for various Mobile Operating Systems. [10]

TABLE II COMPARISON OF MOBILE OPERATING SYSTEM FEATURES

Mobile OS ANDROID IPHONE SYMBIAN WINDOWS MOBILE

3rd Party Multitasking

Yes Yes in IPhone 4

Yes Yes

Thread Priority Levels

40 10 12 256

Kernel Type Monolithic (modified Linux )

XNU Kernel EKA2 Nano kernel

WinCE Monolithic Kernel

Multi‐task Scheduling

Every application runs as single separated Process. Multitask scheduling is done by Linux

--More than one 3rd party application can run at a time -Applications all have the same priority

It implements pre-emptive multitasking so that it can run multiple application

Multitask scheduling is available, but is not an open API for developers

Memory Management

It is done by Linux. In addition, Android uses more compact Dalvik Executable (dex) files, instead of conventional format to run applications with smaller memory use.

Memory for objects are freed based on reference Counting. When the reference counter is 0 for a specific object, that object’s memory is freed.

--Program efficiently so that the program does not use RAM unnecessary -- out-of-memory situation: Go back to a stable state and clean all the resources allocated during that operation.

User access to memory states for custom memory management; System auto handles memory low conditions for hibernation close, and out of memory messages

A. Emulator

The Android SDK includes a mobile device emulator-a virtual mobile device that runs on the computer. The emulator lets us develop and test Android applications without using a physical device.[11]

When the emulator is running, we can interact with the emulated mobile device just as an actual mobile device, except that we use your mouse pointer to "touch" the touchscreen and can use some keyboard keys to invoke certain keys on the device.

Android applications are built using the Java programming language, so one of the most important components of the Android SDK are the included libraries of Java classes. These

2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking

978-1-4673-1627-9/12/$31.00 ©2012 IEEE

classes provide different functionality commvariety of programs, as well as giving deveinteract with the Android system. [8]

B. Android API levels

API Level is an integer value that uniquframework API revision offered by a versioplatform. As you develop your application useful to understand the platform's general change management. It's also important to unLevel identifier and the role it plays inapplication's compatibility with devices on installed.[8]

The figure 9 shows the Emulator running tHello World and the figure 10 shows speethen playing the recorded speech using the and

Figure 9. Android Emulator showing Application scre

Figure 10. Android Emulator showing Application of S Android is a better development platform

stronger focus on technology. The main featuthat it is Open Source. This allows for buildimobile applications with less burden regissues. However there are greater chances

monly used by a elopers a way to

uely identifies the on of the Android

on Android, it's approach to API

nderstand the API n ensuring your which it may be

the application of ch recording and droid Emulator.

een ‘Hello World’

Steganography

m because of its ure of Android is ing up innovative garding licensing

of threat to the

security. [11] Though it is open sochallenges in the mobile market sinsystem have already kept their mark

Using the LSB Technique withdeveloped an application on the SamThe version of the Operating Systemis working properly with hiding datspeak for some time and the data twithin the cover audio. The Stego fithe equally well speech of the spcommunication to be under progress

Figure 11. Samsung Galaxy Tab with Stegasking for voice input to hid

Figure 12. Samsung Galaxy Tab, showingencrypted aud

ource it has to face lots of nce many mobile operating in the market.

h Eclipse IDE, we have msung Galaxy Tab P1010.

m is 2.1 and the application ta. The speaker is asked to to be hidden is substituted ile plays so produced plays eaker implying the covert

s.

ganography application installed, de the data in it.

g encrypted file button for playing dio.

2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking

978-1-4673-1627-9/12/$31.00 ©2012 IEEE

With the use of Eclipse Integrated Development Environment, we can create an activity which emulates its outcome on its virtual device. When the content file of the program is run we obtain an .apk file associated in the Work folder where the software package is installed. We can transfer that .apk file to the hand-held device like android phone or a Tablet. When all the necessary files are installed on the user equipment, we can run the application on the device. Figure 11 and figure 12 indicates the application of information hiding running on the Samsung Galaxy Tab P1010 having Android 2.1 Operating System. Initially voice input is taken and then the secret message is hidden in the speech file. The file so obtained is the Stego file and the entire mechanism of hiding the text message is called Steganography. So over here we have hidden the very information about the communication taking place between the two entities, hence it is called Covert Communication.

CONCLUSION The Novel Method of Steganography, Spread Spectrum

Technique plays a vital role in providing covert communication by hiding digital information in the multimedia. The defense and military related information can be secured using this technique of Steganography.

Android, a software stack for mobile devices, includes an operating system, middleware and key applications. Android is a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance. The mobile application presented here can be used during security based meetings, maintaining the integrity of sensitive messages and for the military related code-word operations. This mobile based application on the Android platform has a bright future in terms of secure and authenticated data for the fruitful data communication.

REFERENCES

[1] C. Parthasarathy and Dr. S.K.Srivatsa: “Increased Robustness of LSB Audio Steganography by reduced distortion LSB Coding”, Journal of Theoretical and Applied Information Technology, Vol 7. No. 1. (pp 080-086).

[2] Cvejic N. and Seppanen T. “Increasing the capacity of LSB based Audio Steganography”, Proc. 5th IEEE international Workshop on Multimedia Signal Processing, St. Thomas, VI December 2002, pp. 336-338.

[3] Patil Babaso, S. ; Patil Shubhangi, H. “MMS steganography for Smartphone devices”, International Conference on Computer Engineering and Technology” (ICCET-2010), Volume 4, pp V4-513 - V4-516.

[4] Shirali - Shahreza, Mohammad “Improving Mobile Banking Security Using Steganography”, International Conference on Information Technology, (ITNG) 2007.

[5] Cedric et al. 2000 Cedric, T., Adi, R., Mcloughlin, I,: Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion, Proc. IEEE Region 10 International conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, pp 275-278.

[6] K. Gopalan, “Audio Steganography Using Bit Modification,” Proc. of the IEEE 2003 International Conference on Multimedia and Exposition (ICME 2003), July 2003.

[7] Mansour Sheikhan, Kazem Asadollahi and Ehsan Hemmati, “High quality audio steganography by Floating substitution of LSBS in wavelet Domain”, IDOSI Publications, 2010.

[8] Ariel Kelly D. Balan, Aeriane Charmaine C. Dizon, Leon Isaac E. Guevarra, Mark Kevin R. Villanueva “Applicability of Steganography to Mobile Devices” In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 232-246, May 2001.

[9] Nedeljko Cvejic, Tapio Seppanen, “Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method”, IEEE 2004. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1286709

[10] http://developer.android.com/guide/topics/fundamentals.html (Application Fundamentals of Android).

[11] http://developer.android.com/guide/basics/what-is- android.html (Basics of Android).

[12] http://adsabs.harvard.edu/abs/2006SPIE.6250E..13A (Secure steganography designed for mobile platforms).

[13] http://www.mathworks.com/matlabcentral/fileexchange/25894-audio-steganography (Audio Steganography using MATLAB).

[14] K. Sakthisudhan, P. Prabhu, P. Thangaraj “Secure Audio Steganography for Hiding Secret information” Proceedings on International Conference in Recent trends in Computational Methods, Communication and Controls (ICON3C 2012).

[15] Md. Shafakhatullah Khan, V.Vijaya Bhasker, V. Shiva Nagaraju “An Optimized Method for Concealing Data using Audio Steganography” International Journal of Computer Applications, 2011, Volume 33 - Number 4.

[16] Gopalan, K. “Audio steganography by cepstrum modification” IEEE Internatinal Conference on Acoustics, Speech and Signal Processing 2005, Volume 5, pp v/481-v/482.

2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking

978-1-4673-1627-9/12/$31.00 ©2012 IEEE