PL EN
REVIEW PAPER
STEGODROID – MOBILE APPLICATION TO CONDUCT COVERT COMMUNICATION
 
More details
Hide details
1
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego w Warszawie
 
 
Publication date: 2014-12-05
 
 
SBN 2014;6(2): 139-150
 
KEYWORDS
ABSTRACT
Computers and mobile phones are tools used in almost all areas of daily life. The worldwide computer networks are connecting a personal computers as well as a large data centers and mobile devices such as a mobile phones. Ensuring the security of information systems requires the use of techniques to send data to remote sites in a way that ensures the confidentiality, integrity and availability. These goals are achieved by using an cryptographic and steganographic techniques. Cryptography process messages in such a way that they can not be easily understood, when steganography hides the message, so that their existence is impossible to discover. In some cases, transmission of encrypted messages can arouse suspicions, while messages sent using steganography will remain undetected. Both methods can be combined, so that the transmitted message can be protected in two ways. In this case, if the steganography fails and the message is detected, the content of the message will be still protected by cryptography. In this paper we described our implementation of proprietary steganographic algorithm using linear error correction codes. The developed application is designed for devices running under Android OS, thus there is a wide range of customers for such a software.
REFERENCES (10)
1.
http://meinkat.files.wordpress... using computer.jpg dostęp 16.07.2014.
 
3.
J. Fridrich, M. Goljan, Rui Du Detecting LSB steganography in color, and grayscale images. IEEE Multimedia 8 pp 22-28, 2001.
 
4.
J. Fridrich, M. Goljan, D. Hogea, D. Soukal, Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems 9, pp 288-302, 2003.
 
5.
N. Karsten, Ch. Paget, ”GSM: SRSLY?”, Chaos Communication Congress, 21.01.2010.
 
6.
W. Mochnacki, Kody korekcyjne i kryptografia, Oficyna Wydawnicza Politechniki Wrocławskiej, 2000.
 
7.
J. Gawinecki, J. Szmidt, ”Zastosowanie ciał skończonych i krzywych eliptycznych w kryptografii”, Wydawnictwo Instytutu Matematyki i Badań Operacyjnych, WAT, 1999.
 
8.
I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, T. Kalker, ”Digital Watermarking and Steganography” (Second Edition), Morgan Kaufmann, 2008.
 
9.
K. Kaczyński, Steganografia z wykorzystaniem cyklicznych kodów korekcji błędów. Biuletyn WAT, Vol. LXII, Nr 4, 2013, pp. 267–277.
 
10.
K. Kaczyński, Steganografia z wykorzystaniem optymalnych kodów liniowych, Nowe techniki badań kryminalistycznych a bezpieczeństwo informacji, Wyd. PWN 2014, ISBN 978-83-01-17890-1, str. 110–120.
 
ISSN:2082-2677
Journals System - logo
Scroll to top