Skip to main content

A Novel Scheme to Hide Identity Information in Mobile Captured Images

  • Conference paper
Book cover Advances in Computer Science, Engineering & Applications

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 166))

Abstract

A new research area concerning the application of steganography for hiding source identity information in mobile camera captured images is emerging. The work reported so far is focused on using MMS [Multimedia Messaging Service] and SMS [Short Message Service] as carrier media for covert communication and data security. The techniques employed for data hiding are lacking in a suitable combination of cryptography and steganography. The present paper proposes a novel scheme to hide source identity information (IMEI [International Mobile Equipment Identity] and IMSI [International Mobile Subscriber Identity] numbers) in mobile camera captured images. To achieve this, an application is developed that clicks images through mobile camera and hides IMEI and IMSI numbers in raw images before compressing them in PNG [Portable Network Graphics] format. The application encrypts the IMEI and IMSI numbers before hiding them. It uses a custom made key based algorithm for hiding these numbers randomly inside an image which ensures high security of hidden data. Runtime performance analysis of the above technique reveals that the computational lag due to encryption & steganography is miniscule. The technique is found feasible to run on actual mobile devices and can help identify the source of an anonymous mobile captured image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lenti, J.: Steganographic Methods. Periodica Polytechnica Ser. El. Eng. 44(3-4), 249–258 (2000)

    Google Scholar 

  2. Shirali Shahreza, M.: An Improved Method for Steganography on Mobile Phone. In: Sandberg, I.W. (ed.) Proceedings of the 9th WSEAS International Conference on Systems, ICS 2005, World Scientific and Engineering Academy and Society (WSEAS), Article 28, 3 pages, Stevens Point, Wisconsin, USA (2005)

    Google Scholar 

  3. Shirali Shahreza, M.: Steganography in MMS. In: Proceedings of the 11th IEEE International Multitopic Conference, Lahore, Pakistan, December 28-30 (2007)

    Google Scholar 

  4. Dhanashri, D., Patil Babaso, S., Patil Shubhangi, H.: Mms Steganography For Smartphone Devices. In: Proceeding of 2nd International Conference on Computer Engineering and Technology, Jodhpur, India, November 13-14, vol. 4, pp. V4-513–V4-516 (2010)

    Google Scholar 

  5. Gupta, A., Barr, D.K., Sharma, D.: Mitigating the Degenerations in Microsoft Word, Documents: An Improved Steganographic Method. In: Proceedings of the 2nd International Conference on Computer, Control and Communication (IC4 2009), Karachi, Pakistan, February 17-18, pp. 1–6 (2009)

    Google Scholar 

  6. Dobsicek, M.: Modern Steganography, Department of Computer Science and Engineering, Faculty of Electrical Engineering, Czech Technical University, Prague (2003), www.scycore.com/papers/ow04_paper.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anand Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Gupta, A., Dadlani, A., Malhotra, R., Bansal, Y. (2012). A Novel Scheme to Hide Identity Information in Mobile Captured Images. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent and Soft Computing, vol 166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30157-5_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30157-5_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30156-8

  • Online ISBN: 978-3-642-30157-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics