Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Journal of Engineering and Applied Sciences
Year: 2017  |  Volume: 12  |  Issue: 17  |  Page No.: 4448 - 4452

Combining Steganography and Cryptography on Android Platform to Achive a High-Level Security

Sarkar Hasan Ahmed, Aram Mahmood Ahmed, Omed Hasan Ahmed and Wrya Karim Kadir    

Abstract: These days, using Smartphone is getting more common in the world and they are provided with powerful hardware resources and variety of communicating methods. A robust security model is applied to develop android operating systems that works on Smartphone and tablets. But it does not satisfy some users, especially whom with confidential and delicate data transmission and whom who keeps these kinds of data on their devices. At this time, users may turn to use third party applications to archive this satisfaction. In this research, a combination of Steganography and Cryptography techniques is proposed to design a third-party application for devices that run android platform to solve this issue. Also, resource limitations of different Smartphones and tablets is assessed to test whether this new technique can be handled by these devices or not as mobile devices has resource limitations if it compared to personal computers. Least Significant Bit (LSB) Steganography algorithm is used for hiding the texts and enhanced playfair algorithm as a Cryptography algorithm is used for encrypting the texts. It seems that through considering the attitudes to clean energies and their efficiency through inspiring past experiences in a combination of past and present time can not only show response to the coming problems but also it can cover some parts of economic considerations.

Fulltext    |   Related Articles   |   Back
  Related Articles

Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility