an andr droid oid s secu cure re c com ommunication
play

AN ANDR DROID OID S SECU CURE RE C COM OMMUNICATION - PowerPoint PPT Presentation

AN ANDR DROID OID S SECU CURE RE C COM OMMUNICATION UNICATION SYSTE TEM M U USING NG S STE TEGAN ANOGRAPH OGRAPHY Kleona Binjaku Elinda Kajo Mee DAAD Workshop "Cooperation at Academic Informatics Education across


  1. AN ANDR DROID OID S SECU CURE RE C COM OMMUNICATION UNICATION SYSTE TEM M U USING NG S STE TEGAN ANOGRAPH OGRAPHY Kleona Binjaku Elinda Kajo Meçe DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten , Croatia, 2nd - 8th September 2018

  2. Co Cont ntent nt ➢ Introduction ➢ Application Development Phases ➢ Demostration ➢ Conclusions DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten , Croatia, 2nd - 8th September 2018

  3. In Intr troduction oduction Why secure application for mobiles ? - we mostly use mobiles for communication -information we share is no more secure Why steganography? - the third party doesn’t even know if something is hidden -interesting way of hiding information. Why Android? -87% of users prefer Android operating system in their mobiles -easier to program DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten , Croatia, 2nd - 8th September 2018

  4. Stegano anogra graphy phy-Theor Theoret etica ical l back ckgrou round nd Since 1499 Used in World War to hide the information in a digital carrier, so that it is undetectable by Goal third party Does it contain a secret message? Cover object ESCAPE PLAN Stego-object DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten , Croatia, 2nd - 8th September 2018

  5. Ty Types s and me d meth thods ods fo for ste tegano ganograp graphy hy Steganograph y Text Image Audio Line shift LSB LSB Coding coding Masking & Word shift Phase coding filtering coding Spread Transformation Feature coding Spectrum DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten , Croatia, 2nd - 8th September 2018

  6. Software So tware devel velopment opment phas hases es WATERFAL ERFALL M MOD ODEL EL Requirements Analysis and Definition Design Implementation Testing DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten , Croatia, 2nd - 8th September 2018

  7. Use se cas ase di diag agram am Requirements Implementation Design Testing Analysis and Definition

  8. Clas ass s di diag agram am Requirements Implementation Design Testing Analysis and Definition

  9. Stegano anogr grap aphy hy techniq hnique ue LSB2 Message bytes Image bytes Why LSB2: • high capacity • high imperceptibility. Requirements Implementation Design Testing Analysis and Definition

  10. Proje ject ct sp specificatio ification NDROID TUDIO Application name : CryptoStego Minimum Required SDK : API 23 Target SDK: API 25 Screen size: Adaptive Screen mode: Portrait Online/Offline work: App works perfectly in offline mode. But, internet is needed to share images. Requirements Implementation Design Testing Analysis and Definition

  11. Applic icati ation st structure ure in Andr droid d Studi dio Fragments for different screens Java classes UI Layouts Requirements Implementation Design Testing Analysis and Definition

  12. Flow char art Alternative Encryption No Password set? Yes No Valid? Yes Requirements Implementation Design Testing Analysis and Definition

  13. Full l Encodi ding ng / De Decodi ding g Procedu dure re Cover Enc Encodin ding Cover image image 010 in byte 101 Secret Input AES LSB2 101 text/image 010 Input Encrypted Encoded image in byte input in byte Key Key generator Password Dec ecoding ding Output 101 Inverse LSB2 Inverse AES text/image 010 Encoded Encrypted Input image input in byte Key Key generator Password Requirements Implementation Design Testing Analysis and Definition

  14. Demost De strati ation on Encode text to image Text input Password (alternative) Button to load image Cover image uploaded Button for encoding Share image Help Requirements Implementation Design Testing Analysis and Definition

  15. Demost De strati ation on(2) 2) Decode text from image Button to load image Place where the chosen image will be shown Place where the hidden message will show Button for decoding Help Requirements Implementation Design Testing Analysis and Definition

  16. Test stin ing g metho hod Focus : on functions of applications Easier to implement Ensures that the software works as expected Ensures the proper working of all the functionalities Requirements Implementation Design Testing Analysis and Definition

  17. Test stona classifi ificatio cation tree and te test cases (Enco code de text xt to image) ge) Min. test cases = 7 Max. test cases = 1008= Requirements Implementation Design Testing Analysis and Definition

  18. Test st cas ases (Enco code de text xt to image) ge) Test case Text Password Image Image time Encode Share Help button Expected result type chosen button button 1.Encode without Chosen Not set png >=4*TextLen pushed unpushed unpushed Encoded image encryption before image gth+100 2.Encode with Chosen 1 to 15 jpg >=4*TextLen pushed unpushed unpushed Encoded image with encryption before image chars gth+100 encrypted info 3.Password longer Chosen Longer png >=4*TextLen pushed unpushed unpushed “Maximum than allowed before image than 15 gth+100 password length is chars 15 chars” ERROR MESSAGE 4.Non allowed format Chosen Not set Other >=4*TextLen pushed unpushed unpushed “Not allowed image before image gth+100 format type.Should be PNG or JPG” ERROR MESSAGE 5.Text after <=(ImageSize- 1 to 15 png before text pushed unpushed unpushed Encoded image image,image large 100)/4 chars enough to hide text 6.Text after >(ImageSize- 1 to 15 jpg before text pushed unpushed unpushed “Image not large image,image not large 100)/4 chars enough to hide text enough to hide text “ ERROR MESSAGE Requirements Implementation Design Testing Analysis and Definition

  19. Test st cas ases( s(2) (Enco code de text xt to image) ge) Test case Text Password Image Image time Encode Share Help Result type chosen button button button 7.Image not large Chosen before Not set png <4*TextLen pushed unpushed unpushed “Image not large enough to hide text image gth+100 enough to hide text”ERROR MESSAGE 8.Share button Chosen before 1 to 15 chars jpg >=4*TextLe pushed pushed unpushed pushed after image ngth+100 encoding 9.Share button Chosen before Not set png >=4*TextLe unpushed pushed pushed “No image encoded pushed before image ngth+100 “ ERROR MESSAGE encoding 10.Help button Chosen before 1 to 15 chars jpg >=4*TextLe pushed unpushed unpushed Help screen pushed image ngth+100 displayed 11.Text not entered Not entered Not set png Besore text pushed Unpushed Unpushed “Insert text on encode message”ERROR MESSAGE 12.Image not Chosen before Not set Not Not chosen pushed unpushed Unpushed “Cover image not entered on encode image chose chosen”ERROR n MESSAGE Requirements Implementation Design Testing Analysis and Definition

  20. Demost De strati ation on Requirements Implementation Design Testing Analysis and Definition

  21. Error m mess ssag ages Requirements Implementation Design Testing Analysis and Definition

  22. Co Conc nclusions lusions Developed new skills along with the learned ones The application : ✓ Hides the information successfully ✓ Uses steganography in an effective way ✓ Retrieves the hidden information correctly ✓ Decreases the possibility that the information will be caught by a third party using cryptography DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten , Croatia, 2nd - 8th September 2018

  23. THANK YOU!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend