Abstract
In this work a security API is proposed which can be customized and used by application developers to include a higher level of security in their application. The objective is to make developers create secure applications without concerning much into the core security aspects such as the mechanism, algorithm and reliability of the security protocols used in it. This API is capable of providing an end-to-end encryption when used for communication and also considered as a provider of Security as a Service. It uses an improved Steganography algorithm based on LSB and Complement Image rotation. The core functions are developed using PHP and an API is created for external applications to make API calls, so that the SaaS can be accessed by authorized applications. It is platform-independent, meaning it is not designed to serve just one type of client application (in terms of programming language), it can be accessed by different types of apps. The data is encrypted (if necessary) using a random key and converted into binary format and embedded into a 24-bit RGB cover image. The data is secured in the image which creates no suspicion and provides invisibility, and proven to be secure by performing benchmark tests by comparing stegoimages provided by different algorithms and also resisted statistical and visual attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mobile Malware-The Rise continues. http://www.mcafee.com/in/security-awareness/articles/mobile-malware.aspx/ (2014)
Mobile Malware Threats Fraudsters are still two steps ahead. https://securityintelligence.com/two-steps-ahead/ (2015)
An Introduction to APIs. https://zapier.com/learn/apis/chapter-1-introduction-to-apis/
Venugopal, K.R., Patnaik, L.M., Raja, K.B., Chowdary, C.R.: A secure image steganography using LSB, DCT and compression techniques on raw images. In: ICISIP, pp. 123–135 (2005)
Memon, N., Chandramouli, R., Kharrazi, M.: Image steganography and steganalysis: concepts and practice. In: IWDW, pp. 4–12 (2003)
Mandal, Md.P., Islam, R., Siddiqa, A., Delowar, Md.: An efficient filtering based approach LSB image steganography using status bit along AES cryptography. In: ICIEV, pp. 55–60 (2014)
Wagner, D.A., Manferdeli, J.L.: Cryptography and Cryptanalysis, pp. 312–319. Springer, Heidelberg (2013)
Carli, M., Neri, A., Egiaziarian, K., Battisti, F.: A Generalized Fibonacci LSB Data Hiding Technique. (CODEC2006) TEA, Institute of Radio Physics and Electronics, University of Calcutta, pp. 37–45 (2006)
Abraham, A., Sanyal, S., Dey, S.: An LSB Data Hiding Technique Using Prime Numbers, pp. 223–235. IEEE CS Press, UK (2007)
Gupta, S., Goel, S., Kaushik, N.: Image steganography least significant bit with multiple progressions. In: FICTA (2015)
Cachin, C.: An information-theoretic model for steganography. In: 2nd Information Hiding Workshop, pp. 78–86 (1998)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Maheswari, R., Sheeba Rani, S., Sharmila, P., Rajarao, S. (2019). Personalized Secured API for Application Developer. In: Tiwari, S., Trivedi, M., Mishra, K., Misra, A., Kumar, K. (eds) Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 851. Springer, Singapore. https://doi.org/10.1007/978-981-13-2414-7_37
Download citation
DOI: https://doi.org/10.1007/978-981-13-2414-7_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2413-0
Online ISBN: 978-981-13-2414-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)