Abstract

Commercial applications cannot declare use of steganography as its security model so as not to spoil the norm of “hidden” secret. Proposed paper suggests a model that can withhold security even after declaration of steganography’s presence allowing applicability in commercial scope. File to be secured is compressed and converted to byte stream and hidden in both raster graphic and vector graphic cover images and encapsulated in a PDF and shared. To extract the secured file from the cover images a key is required by the party intending to receive the secured file. This key is shared by Elliptic Curve Diffie Hellman Key Agreement Protocol. The intended receiver extracts the file by applying steganalysis. To implement this model an android application is developed that shares files by securing it in aforesaid fashion and transferring them via Wi-Fi Direct. Most of the digital image steganography researched are based on raster graphic cover images. The proposed model is designed so that limitations present in raster and vector steganographies each can be counterfeited to produce a secure solution that can be offered in digital image steganography. This solution is suggested as security model in commercial scope.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call