Skip to main content

Personalized Secured API for Application Developer

  • Conference paper
  • First Online:
Smart Innovations in Communication and Computational Sciences

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 851))

Abstract

In this work a security API is proposed which can be customized and used by application developers to include a higher level of security in their application. The objective is to make developers create secure applications without concerning much into the core security aspects such as the mechanism, algorithm and reliability of the security protocols used in it. This API is capable of providing an end-to-end encryption when used for communication and also considered as a provider of Security as a Service. It uses an improved Steganography algorithm based on LSB and Complement Image rotation. The core functions are developed using PHP and an API is created for external applications to make API calls, so that the SaaS can be accessed by authorized applications. It is platform-independent, meaning it is not designed to serve just one type of client application (in terms of programming language), it can be accessed by different types of apps. The data is encrypted (if necessary) using a random key and converted into binary format and embedded into a 24-bit RGB cover image. The data is secured in the image which creates no suspicion and provides invisibility, and proven to be secure by performing benchmark tests by comparing stegoimages provided by different algorithms and also resisted statistical and visual attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mobile Malware-The Rise continues. http://www.mcafee.com/in/security-awareness/articles/mobile-malware.aspx/ (2014)

  2. Mobile Malware Threats Fraudsters are still two steps ahead. https://securityintelligence.com/two-steps-ahead/ (2015)

  3. An Introduction to APIs. https://zapier.com/learn/apis/chapter-1-introduction-to-apis/

  4. Venugopal, K.R., Patnaik, L.M., Raja, K.B., Chowdary, C.R.: A secure image steganography using LSB, DCT and compression techniques on raw images. In: ICISIP, pp. 123–135 (2005)

    Google Scholar 

  5. Memon, N., Chandramouli, R., Kharrazi, M.: Image steganography and steganalysis: concepts and practice. In: IWDW, pp. 4–12 (2003)

    Google Scholar 

  6. Mandal, Md.P., Islam, R., Siddiqa, A., Delowar, Md.: An efficient filtering based approach LSB image steganography using status bit along AES cryptography. In: ICIEV, pp. 55–60 (2014)

    Google Scholar 

  7. Wagner, D.A., Manferdeli, J.L.: Cryptography and Cryptanalysis, pp. 312–319. Springer, Heidelberg (2013)

    Google Scholar 

  8. Carli, M., Neri, A., Egiaziarian, K., Battisti, F.: A Generalized Fibonacci LSB Data Hiding Technique. (CODEC2006) TEA, Institute of Radio Physics and Electronics, University of Calcutta, pp. 37–45 (2006)

    Google Scholar 

  9. Abraham, A., Sanyal, S., Dey, S.: An LSB Data Hiding Technique Using Prime Numbers, pp. 223–235. IEEE CS Press, UK (2007)

    Google Scholar 

  10. Gupta, S., Goel, S., Kaushik, N.: Image steganography least significant bit with multiple progressions. In: FICTA (2015)

    Google Scholar 

  11. Cachin, C.: An information-theoretic model for steganography. In: 2nd Information Hiding Workshop, pp. 78–86 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Maheswari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maheswari, R., Sheeba Rani, S., Sharmila, P., Rajarao, S. (2019). Personalized Secured API for Application Developer. In: Tiwari, S., Trivedi, M., Mishra, K., Misra, A., Kumar, K. (eds) Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 851. Springer, Singapore. https://doi.org/10.1007/978-981-13-2414-7_37

Download citation

Publish with us

Policies and ethics