Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 328))

Abstract

The paper introduces work on developing secure data communication system. It includes the usage of two algorithms RSA and AES used for achieving cryptography along with LSB for achieving steganography both on Android platform. The joining of these three algorithms helps in building a secured communication system on ‘Android’ platform which is capable of withstanding multiple threats.

The input data is encrypted using AES with a user defined key prior to being embedded in image using LSB algorithm. The key used for encryption is further wrapped by means of receivers public key and that wrapped product key is further kept hidden so as to pass it to receiver that assure all the security purposes (RSA), making this a reliable communication channel for sensitive data. All stages assure that the secret data becomes obsolete and cannot be break easily; the steganographic algorithm thus introduces an additional level of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, B., Agrawal, H.: Implementation of AES and RSA Using Chaos System. International Journal of Scientific & Engineering Research 4(5) (May 2013) 1413ISSN 2229-5518 IJSER © (2013)

    Google Scholar 

  2. Rayarikar, R., Upadhyay, S., Pimpale, P.: SMS Encryption Using AES Algorithm on Android. International Journal of Computer Applications (0975-8887) 50(19) (July 2012) (© 2012 by IJCA Journal)

    Google Scholar 

  3. Kota, C.M., Aissi, C.: Implementation of the RSA algorithm and its cryptanalysis. In: ASEE Gulf-Southwest Annual Conference, Session- IVB4, The University of Louisiana at Lafayette, March 20-22. American Society for Engineering Education (March 2002)

    Google Scholar 

  4. Shirli-Shahreza, M., Shirali-Shahreza, M.H.: Text Steganography in SMS. In: International Conference on Convergence Information Technology. IEEE (November 2007), doi:10.1109/ICCIT.2007.100, ISBN: 0-7695-3038-9, INSPEC Accession Number: 9893347

    Google Scholar 

  5. Rafat, K.F.: Enhanced Text steganography, Computer, Control and Communication. In: 2nd International Conference on IC4 2009, pp. 1–6. IEEE (February 2009), doi:10.1109/IC4.2009.4909228, E-ISBN: 978-1-4244-3314-8, Print ISBN: 978-1-4244-3313-1, INSPEC Accession Number: 10626971

    Google Scholar 

  6. Tyagi, V., Kumar, A., Patel, R., Tyagi, S., Gangwar, S.S.: Image steganography with cryptography using LSB. Journal of Global Research in Computer Science 3(3) (March 2012) ISSN-2229-371X

    Google Scholar 

  7. Gupta, S., Gujraland, G., Aggarwal, N.: Enhanced LSB for image steganography. IJCEM International Journal of Computational Engineering & Management 15(4) (July 2012) ISSN (Online): 2230-7893

    Google Scholar 

  8. Rughani, P.H., Pandya, H.N.: Steganography on ANDROID based smart phones. IJMAN International Journal of Mobile & Adhoc Network 2(2), 150–152 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akshay Kandul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kandul, A., More, A., Davalbhakta, O., Artamwar, R., Kulkarni, D. (2015). Steganography with Cryptography in Android. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12012-6_7

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12011-9

  • Online ISBN: 978-3-319-12012-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics