KEMBAR78
Android Based Image Steganography | PDF | Android (Operating System) | User (Computing)
0% found this document useful (0 votes)
20 views4 pages

Android Based Image Steganography

The document presents an Android-based image steganography application designed to securely hide text messages within images. It outlines the application's functionality, including user registration, encoding, and decoding processes, while emphasizing the importance of confidentiality and authentication. The project aims to facilitate secure communication without raising suspicion, utilizing AES encryption for message encoding.

Uploaded by

ywsfalhwlndy447
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

Android Based Image Steganography

The document presents an Android-based image steganography application designed to securely hide text messages within images. It outlines the application's functionality, including user registration, encoding, and decoding processes, while emphasizing the importance of confidentiality and authentication. The project aims to facilitate secure communication without raising suspicion, utilizing AES encryption for message encoding.

Uploaded by

ywsfalhwlndy447
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Advances in Engineering and Management (IJAEM)

Volume 6, Issue 01 Jan 2024, pp: 01-04 www.ijaem.net ISSN: 2395-5252

“Android Based Image Steganography”


Shubhangi Kuhikar, Pooja Bhaisare, Priyanka Somankar,
Achal Landekar, Prashant Khetade.
----------------------------------------------------------------------------------------------------------------------------- ----------
Date of Submission: 25-12-2023 Date of Acceptance: 05-01-2024
----------------------------------------------------------------------------------------------------------------------------- ----------
ABSTRACT system that implements the steganography concept.
Basically, Image Steganography is the process of In this project, Image Steganography is used so that
hiding information which can be text, images or a text message can be hidden securely in a cover
video inside the cover image. Android based Image image. The system is good in secreting
Steganography is a simple android application that communication and in effective information
implements steganography concepts. In this project hidingwhile maintaining authentication and
Image Steganography is used so that text-messages Confidentiality. Our Android Based Image
can be hidden securely in an image. Here, the Steganography project comprises 2 modules:1)
sender is uploading an image which hide the secret Encoding 2) Decoding. The users will have access
message. Sender should upload image, add a secret to encode as well as decode secrete messages. The
message and a secret key in order to encode the user would require registering first to Login. Users
message and hide it in the image. Receiver can need to enter Username and Password to Login for
decode the message with secrete key shared by registration. After registration User Id will generate
sender. The main advantage of steganography automatically by the system. After that user can
algorithms is because of its simple security Login into the system. Users can add the process
mechanism. The project is good in secreting list byuploading the image, entering the text
communication and in effective information hiding message and the secret key.
while maintaining Authentication and
Confidentiality.. The main aim of developing this II. METHODOLOGY
application is to facilitate secure secrete Android-based image steganography
communication without generating curiosity. involves hiding secret information within an image
Proper and effective use of steganography can in such a way that it is difficult to detect. Here is a
prove to be one of the best solutions for general methodology for implementing
information hiding, Authentication and steganography on the Android platform.
Confidentiality
Keywords: Steganography, Upload Image, Software and Hardware Requirements:
Encoding, Decoding, Secret Message, Secret Key, The software and hardware requirements
Encryption technology, Android Application. for developing and running an Android-based
image steganography application can vary based on
I. INTRODUCTION your specific implementation and the features you
Android-based image steganography is a plan to incorporate.
method of hiding information within images on
devices running the Android operating system. Cloud hosting is used so that no database is used to
Android-based image steganography involves integrate the system.
concealing information within images on Android 1 Development Environment: - Android
devices. Theimportant concept of cyberspace is Studio,the official IDE for Android app
maintaining confidentiality. Here comes the development.
importance of hiding information. Image 2. Java Development Kit (JDK): Android apps
Steganography is the concept of hiding a secret file are typically written in Java.
within another non secret and normal-looking 3. Programming Languages: - Java
image. Steganography is veryuseful concept for 4.Frontend: - XML for Android layout files.
maintaining the security principles like 5.Backend: - MSSQL
authentication and confidentiality. Our Android
Based Image Steganography is a simple android

DOI: 10.35629/5252-06010104 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1
International Journal of Advances in Engineering and Management (IJAEM)
Volume 6, Issue 01 Jan 2024, pp: 01-04 www.ijaem.net ISSN: 2395-5252

In this project, an android application is


developed using Android Studio Software. In this
android app, options like Encoding and Decoding
the data are provided.
This can be done by hiding the data
behind an image. Images in the application can be
used by dual options either by mobile gallery or by
mobile camera.
Besides, we are also going to add an extra
feature which is login id and password to both the
sender and the receiver.
In this android app, the User interface (UI)
will have a Register option in which the user must Once the user has signed in, the user will
enter the Login Id or Name and Password. get the next interface in which will get options like
encode, decode.
After selecting the Encode option, image
can be selected from the camera and then, the user
is provided a Text Box for writing the secret text
message to be encoded with the image using AES
algorithm converting into Stego image. and after
user will need to enter the secret key.After this user
can send the stego image to its intended person.
On the receiver side, by selecting the
Decode option, it can select the Stego image file
and then by entering the secret key provided by the
When a user opens the app, user will get to sign up sender, secret message can be decoded easily.
or if already registered then directly sign in.

SYSTEM ARCHITECTURE

Figure:- Architecture Diagram

DOI: 10.35629/5252-06010104 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 2
International Journal of Advances in Engineering and Management (IJAEM)
Volume 6, Issue 01 Jan 2024, pp: 01-04 www.ijaem.net ISSN: 2395-5252

Figure: -Flow Diagram

III. TEST AND RESULTS


Test and Result
Testing an Android-based image steganography
application involves various aspects, including
functionality, security, performance, and user
experience. Below is a broad outline of test
scenarios and expected results as below screenshots
from actual application.

1. Functional Testing:
Image Selection:
Test Scenario: User can select an image as a
cover.
Expected Result: Selected image is loaded and
displayed correctly. Step 3: After choosing the encoding, the user must
choose the image in which the message is to be
Steps for this testing as below: hidden by clicking on the selected image button.
Step 1: The user opens the application and enters Enter the secret key created during the registration
their email address and password. If this is their and hide the image, along with the username, for
first time using it, they can register first and then the reference once it has been selected. After click
log in. on the encode button and save the image.

Input:Contacts us for more details

Step 2: The user must choose the encoding after


providing his or her credentials.

Step 4: After saving the image, return to the


application's main screen and click the decoding
button.

DOI: 10.35629/5252-06010104 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 3
International Journal of Advances in Engineering and Management (IJAEM)
Volume 6, Issue 01 Jan 2024, pp: 01-04 www.ijaem.net ISSN: 2395-5252

REFERENCES
[1]. Parag Himatlal Rughani (2016)
“Steganography on Android Based Smart
Phone” International Journal of Mobile &
Adhoc Network Volume 02 issue 2|May
2016
[2]. Pawan Sharma, Srishanth Shetty,Om
Kadam, Prof.Ritu Sharma (2018)
“Android Based Image Steganography”
International Journal of Creative Research
Thoughs (IJCRT)ISSN: 2320-2882
Volume 6, Issue 2 April 2018
Step 5: After selecting the decode button, the user [3]. Anjana Menon (2020) “Android Image
must select the same image to add the hidden Steganography” International Journal of
massage, secret key, and username, and click the Interdisciplinary Innovative Research
decode button to view the hidden massage. &Development (IJIIRD) SSN: 2456-236X
Volume 05 Issue 01 | 2020
Output:Contacts us for more details [4]. Dr.K.Jayasakthi velmurugan, S,Daniel
Visuvasam, Akash K (2022) “Android
Application for Image Steganography
using Android Studio” International
Journal for Research in Applied Science &
Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ
Impact Factor: 7.538 Volume 10 Issue V
May 2022.
[5]. C. K. Chan, L. M. Cheng, “Hiding data in
image by simple LSB substitution”,
pattern recognition, Vol. 37, No. 3, 2004,
. pp. 469-474.
[6]. R. Chandramouli, M. Kharrazi, and N.
Data Hiding: Memon, “Image Steganography and
Test Scenario: User can hide data within the Steganalysis: Concepts and Practice”, T.
selected image. Kalker et al
Expected Result: Data is successfully hidden, and [7]. Thanikkal, J. G., Danish, M., & Sarwar, S.
the resulting image maintains reasonablequality. A. (October 2014) New Android Based
Data Extraction: Test Scenario: User can extract Steganography Application for
hidden data from a stenographic image. Smartphone„s. Journal of Basic and
Expected Result: Hidden data is accurately Applied Engineering Research. Print
extracted. ISSN: 2350-0077; Online ISSN: 2350-
0255; Volume 1, Number 8; pp. 32-35.
IV. CONCLUSION [8]. Savithri G, K.L.Sudha.(July 2014).
In conclusion, Image Steganography Android Application for Secret Image
application software provided for the purpose, how Transmission and Reception Using
to use embed message into image. It can be Chaotic Steganography. International
extended to a level such that it can be used for the Journal of Innovative Research in
different types of images formats like bmp, jpeg, Computer and Communication
.tiff etc. So other image formats can also be used in Engineering Vol. 2, Issue 7,
steganography. Proper and Effective use of [9]. Bucerzan, D., Raţiu, C., & Manolescu, M.
steganography can prove to be one of the best J. (2013). SmartSteg: A New Android
solutions for hiding information, confidentiality Based Steganography Application.
and authentication. International Journal of Computers,
Communications & Control, 8(5).

DOI: 10.35629/5252-06010104 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 4

You might also like