Data Hiding Technique Based on NFC-Enabled Smartphones

作者: Abdelmgeid Ali , Al-Hussien Seddik Saad , Ahmed Hamdy Ismael

DOI: 10.1016/J.PROCS.2020.04.260

关键词:

摘要: Abstract The progressive advancement of smartphone which offers precise customized configuration and varied capacity abilities has dramatically reshaped the way we use technology. Many applications in many fields have been provided by integration Near Field Communication (NFC) into smartphones (for example electronic ticketing access control frameworks). This paper presents a data hiding technique creating highly secured connection based on NFC-Enabled Android Smartphones is called NFC-Stego. proposed solved one most challenging open problems restoring deleted files (cover-files) may help extracting payload from stego-file (Stego-analysis). experiments conducted showed that NFC-Stego powerfully user friendly system enables to be hidden along with high imperceptibility.

参考文章(29)
Paul Alvarez, Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis International Journal of Digital Evidence. ,vol. 2, ,(2004)
Andreas Westfeld, F5-A Steganographic Algorithm information hiding. ,vol. 2137, pp. 289- 302 ,(2001) , 10.1007/3-540-45496-9_21
Dominic Bucerzan, Crina Raţiu, Misu-Jan Manolescu, SmartSteg: A New Android Based Steganography Application International Journal of Computers Communications & Control. ,vol. 8, pp. 681- 688 ,(2013) , 10.15837/IJCCC.2013.5.642
Fucheng Zhou, Rener Yang, Ziwei Zheng, Jiaming He, None, Steganography in multimedia messaging service of mobile intelligent terminal international congress on image and signal processing. pp. 1340- 1343 ,(2012) , 10.1109/CISP.2012.6469954
Soon-Nyean Cheong, Huo-Chong Ling, Pei-Lee Teh, Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system Expert Systems With Applications. ,vol. 41, pp. 3561- 3568 ,(2014) , 10.1016/J.ESWA.2013.10.060
S.P. Mohanty, N. Ranganathan, R.K. Namballa, A VLSI architecture for watermarking in a secure still digital camera (S/sup 2/DC) design IEEE Transactions on Very Large Scale Integration Systems. ,vol. 13, pp. 808- 818 ,(2005) , 10.1109/TVLSI.2005.850095
Wojciech Mazurczyk, Luca Caviglione, Steganography in Modern Smartphones and Mitigation Techniques IEEE Communications Surveys and Tutorials. ,vol. 17, pp. 334- 357 ,(2015) , 10.1109/COMST.2014.2350994
Rainer Steffen, Jörg Preißinger, Tobias Schöllermann, Armin Müller, Ingo Schnabel, Near Field Communication (NFC) in an Automotive Environment 2010 Second International Workshop on Near Field Communication. pp. 15- 20 ,(2010) , 10.1109/NFC.2010.11
Vahab Iranmanesh, Ho Jing Wei, Sean Lee Dao-Ming, Olasimbo Ayodeji Arigbabu, None, On using emoticons and lingoes for hiding data in SMS 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET). pp. 103- 107 ,(2015) , 10.1109/ISTMET.2015.7359010
Dominic Bucerzan, Crina Raţiu, Image Processing with Android Steganography soft computing. pp. 27- 36 ,(2014) , 10.1007/978-3-319-18296-4_3