AN ANDR DROID OID S SECU CURE RE C COM OMMUNICATION - - PowerPoint PPT Presentation

an andr droid oid s secu cure re c com ommunication
SMART_READER_LITE
LIVE PREVIEW

AN ANDR DROID OID S SECU CURE RE C COM OMMUNICATION - - PowerPoint PPT Presentation

AN ANDR DROID OID S SECU CURE RE C COM OMMUNICATION UNICATION SYSTE TEM M U USING NG S STE TEGAN ANOGRAPH OGRAPHY Kleona Binjaku Elinda Kajo Mee DAAD Workshop "Cooperation at Academic Informatics Education across


slide-1
SLIDE 1

AN ANDR DROID OID S SECU CURE RE C COM OMMUNICATION UNICATION SYSTE TEM M U USING NG S STE TEGAN ANOGRAPH OGRAPHY

Kleona Binjaku Elinda Kajo Meçe

DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten, Croatia, 2nd - 8th September 2018

slide-2
SLIDE 2

Co Cont ntent nt

➢Introduction ➢Application Development Phases ➢Demostration ➢Conclusions

DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten, Croatia, 2nd - 8th September 2018

slide-3
SLIDE 3

In Intr troduction

  • duction

Why secure application for mobiles?

  • we mostly use mobiles for communication
  • information we share is no more secure

Why steganography?

  • the third party doesn’t even know if something is hidden
  • interesting way of hiding information.

Why Android?

  • 87% of users prefer Android operating system in their mobiles
  • easier to program

DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten, Croatia, 2nd - 8th September 2018

slide-4
SLIDE 4

Stegano anogra graphy phy-Theor Theoret etica ical l back ckgrou round nd

Since 1499 Used in World War

ESCAPE PLAN

Does it contain a secret message?

Goal to hide the information in a digital carrier, so that it is undetectable by third party

Stego-object Cover object

DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten, Croatia, 2nd - 8th September 2018

slide-5
SLIDE 5

Ty Types s and me d meth thods

  • ds fo

for ste tegano ganograp graphy hy

Steganography Line shift coding Word shift coding Feature coding Text Audio Image LSB Masking & filtering Transformation Spread Spectrum Phase coding LSB Coding

DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten, Croatia, 2nd - 8th September 2018

slide-6
SLIDE 6

Requirements Analysis and Definition

Design Implementation Testing

WATERFAL ERFALL M MOD ODEL EL

So Software tware devel velopment

  • pment phas

hases es

DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten, Croatia, 2nd - 8th September 2018

slide-7
SLIDE 7

Requirements Analysis and Definition

Design Implementation Testing

Use se cas ase di diag agram am

slide-8
SLIDE 8

Design Implementation Testing

Requirements Analysis and Definition

Clas ass s di diag agram am

slide-9
SLIDE 9

LSB2

Message bytes Image bytes Why LSB2:

  • high capacity
  • high imperceptibility.

Testing Implementation Design

Requirements Analysis and Definition

Stegano anogr grap aphy hy techniq hnique ue

slide-10
SLIDE 10

Requirements Analysis and Definition

Design Implementation Testing

Proje ject ct sp specificatio ification Application name: CryptoStego Minimum Required SDK: API 23 Target SDK: API 25 Screen size: Adaptive Screen mode: Portrait Online/Offline work: App works perfectly in offline

  • mode. But, internet is needed to share images.

NDROID TUDIO

slide-11
SLIDE 11

Requirements Analysis and Definition

Design Implementation Testing

Applic icati ation st structure ure in Andr droid d Studi dio

Fragments for different screens Java classes UI Layouts

slide-12
SLIDE 12

Requirements Analysis and Definition

Design Implementation Testing

Flow char art

Password set? No Yes Valid? Yes

Alternative Encryption

No

slide-13
SLIDE 13

Requirements Analysis and Definition

Design Implementation Testing

Full l Encodi ding ng / De Decodi ding g Procedu dure re

Enc Encodin ding

Secret Input text/image

101 010

AES LSB2

010 101

Key generator Inverse LSB2 Inverse AES

101 010

Output text/image

Key generator

Dec ecoding ding

Input in byte Encoded image in byte Encrypted input Cover image in byte

Cover image

Encrypted input Encoded image Password Key Input in byte Password Key

slide-14
SLIDE 14

Requirements Analysis and Definition

Design Implementation Testing

De Demost strati ation

  • n

Encode text to image Text input Password (alternative) Button to load image Button for encoding Help Cover image uploaded Share image

slide-15
SLIDE 15

Requirements Analysis and Definition

Design Implementation Testing

De Demost strati ation

  • n(2)

2)

Decode text from image Button to load image Place where the chosen image will be shown Place where the hidden message will show Help Button for decoding

slide-16
SLIDE 16

Design Implementation Testing

Requirements Analysis and Definition

Test stin ing g metho hod

Focus : on functions of applications

Easier to implement Ensures that the software works as expected Ensures the proper working of all the functionalities

slide-17
SLIDE 17

Design Implementation Testing

Requirements Analysis and Definition

Test stona classifi ificatio cation tree and te test cases

(Enco code de text xt to image) ge)

  • Min. test cases = 7
  • Max. test cases = 1008=
slide-18
SLIDE 18

Design Implementation Testing

Requirements Analysis and Definition

Test st cas ases

(Enco code de text xt to image) ge)

Test case Text Password Image type Image time chosen Encode button Share button Help button Expected result 1.Encode without encryption Chosen before image Not set png >=4*TextLen gth+100 pushed unpushed unpushed Encoded image 2.Encode with encryption Chosen before image 1 to 15 chars jpg >=4*TextLen gth+100 pushed unpushed unpushed Encoded image with encrypted info 3.Password longer than allowed Chosen before image Longer than 15 chars png >=4*TextLen gth+100 pushed unpushed unpushed “Maximum password length is 15 chars” ERROR MESSAGE 4.Non allowed format image Chosen before image Not set Other >=4*TextLen gth+100 pushed unpushed unpushed “Not allowed format type.Should be PNG or JPG” ERROR MESSAGE 5.Text after image,image large enough to hide text <=(ImageSize- 100)/4 1 to 15 chars png before text pushed unpushed unpushed Encoded image 6.Text after image,image not large enough to hide text >(ImageSize- 100)/4 1 to 15 chars jpg before text pushed unpushed unpushed “Image not large enough to hide text “ ERROR MESSAGE

slide-19
SLIDE 19

Design Implementation Testing

Requirements Analysis and Definition

Test st cas ases( s(2)

(Enco code de text xt to image) ge)

Test case Text Password Image type Image time chosen Encode button Share button Help button Result 7.Image not large enough to hide text Chosen before image Not set png <4*TextLen gth+100 pushed unpushed unpushed “Image not large enough to hide text”ERROR MESSAGE 8.Share button pushed after encoding Chosen before image 1 to 15 chars jpg >=4*TextLe ngth+100 pushed pushed unpushed 9.Share button pushed before encoding Chosen before image Not set png >=4*TextLe ngth+100 unpushed pushed pushed “No image encoded “ ERROR MESSAGE 10.Help button pushed Chosen before image 1 to 15 chars jpg >=4*TextLe ngth+100 pushed unpushed unpushed Help screen displayed 11.Text not entered

  • n encode

Not entered Not set png Besore text pushed Unpushed Unpushed “Insert text message”ERROR MESSAGE 12.Image not entered on encode Chosen before image Not set Not chose n Not chosen pushed unpushed Unpushed “Cover image not chosen”ERROR MESSAGE

slide-20
SLIDE 20

Design Implementation Testing

Requirements Analysis and Definition

De Demost strati ation

  • n
slide-21
SLIDE 21

Design Implementation Testing

Requirements Analysis and Definition

Error m mess ssag ages

slide-22
SLIDE 22

Co Conc nclusions lusions

Developed new skills along with the learned ones The application :

✓ Hides the information successfully ✓ Uses steganography in an effective way ✓ Retrieves the hidden information correctly ✓ Decreases the possibility that the information will be caught by a third party using cryptography

DAAD Workshop "Cooperation at Academic Informatics Education across Balkan Countries and Beyond" Primošten, Croatia, 2nd - 8th September 2018

slide-23
SLIDE 23

THANK YOU!