Development of Novel Algorithm for Data Hiding on Mobile Application

We can easily observe that in the current era of communication, Computers, mobile phones, and the Internet are widely used mediums. In such an environment, information security is an important issue. The most common techniques used for information security are Cryptography and Steganography. Many research works have been done on image Steganography. These images have different kinds of formats like BMP, GIF, and PNG. Several compression methods are available which applied to the images having the format BMP, GIF, and PNG is comparatively less effective than the JPEG image. JPEG compression steganography method is complex to implement even then some algorithms have been developed for it. They provide single-level or two-level information securities. This paper presents a method in which is the combination of Cryptography and Steganography is used over android mobile phones. Here we are performing encryption two times on data to be hidden and then that encrypted data hidden both in text and image. We are using the Advanced Encryption Standard (AES) algorithm to hide text within a text, Discrete Cosine transform (DCT) for image steganography, and Data Encryption Standard (DES) for encryption of text. This paper gives the idea of threelevel information security over the android environment. Keywords—Steganography encryption; discrete cosine transform; DES; F5Algorithm


I. INTRODUCTION
Information security is a popular research area. It attracted researchers towards the security concept of data by using different kinds of techniques. The commonly used are Steganography, watermarking, and cryptography. When we look at all these techniques, we found that Steganography gives more security comparatively other methods. As well as digital communication technology has changed security features also required some variations. Information security attracted many researchers and has become the widely scoped area of research in wireless and mobile communication. The field of Steganography is very vast, but researchers have been motivated toward mobile steganography because of the intensive use of mobile phones as well as the exchange of information among the users. In the same context, "Short Messaging System (SMS) was introduced with GSM mobile phones and became too much popular among users" [2]. After some time, the multimedia message was introduced and gained more popularity due to its advanced features. Later, smartphones have come to light with many advanced features for communication. It is a small handy portable device that the user can carry with him anywhere. Thus, users can use these devices in various ways like photo capturing, sharing of information in images, audios videos and calling, etc. To stop unauthorized access and attacks, we must have to use systems with some data security techniques. We have described few data security techniques earlier in which one of the trendiest techniques is steganography.

II. STEGANOGRAPHY
We start with the security of information that so many techniques are present. Fig. 1 depicts the different disciplines of information hiding. Steganography alludes to the study of "imperceptible" correspondence. In contrast to cryptography, where the objective is to make safe correspondences from a user, steganographic strategies endeavor to hide the very nearness of the message itself from an onlooker [4]. Steganography is the craftsmanship and study of imparting so that the nearness of a message can't be distinguished [5].
Steganography is the science that includes imparting mystery information in a suitable sight and sound bearer, e.g., Image, sound, and video. It goes under the presumption that if the element is noticeable, the purpose of assault is obvious, therefore the objective here is consistently to disguise the very presence of the installed information [9]. The word steganography is of Greek cause and signifies disguised composition from the Greek words steganos (στεγανός) signifying secured or ensured, and graphei (γράφη) signifying composing. The principal recorded utilization of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography masked as a book on enchantment. By and large, messages will give off an impression of being something different: pictures, articles, shopping records, or some other spread content, and, traditionally, the concealed message might be in undetectable ink between the obvious lines of a private letter [14]. Steganography implies concealing the presence of data in such a way along these lines that nobody can recognize. Three procedures of data security are fundamentally the same Cryptography, watermarking, and steganography. Pictures are used as the bearer to perform steganography. A mystery message is implanted in the transporter picture so that nobody can recognize that mystery message. Ancient steganography worries about the ways of inserting the mystery message in a spread picture. The implanting needs key without which an outsider cannot identify or evacuated the original message. The cover picture with the implanted message is called Stego Image. www.ijacsa.thesai.org

A. Working of Steganography
A steganography algorithm shows a combination of a mystery message-which needs to cover up, picturewhich contains the implanted message. The general working of steganography is to get the message to stow away, get the picture wherein information to cover up, Apply the suitable algorithm which produces the stego picture. This Stego picture sends to the beneficiary, receiver interprets the stego picture and gets the first message.
With the help of Fig. 2 general idea of steganography can be understood.
The message is the information that the correspondent needs to keep secret. It may be a plain content, figure text, another picture, or something that can be implanted in a bitstream, for example, a patent mark, an incognito correspondence, or a sequential digit. Key is a particular word, which guarantees that the beneficiary who realizes the relating disentangling key will have the option to remove the message from a Stego picture. The spread picture is likewise called a transporter. The generated picture with the secretly inserted message is known as the stego message. Recouping data from a Stego image requires the stego picture itself and a relating deciphering input if the input is used throughout the encoding procedure.

III. CRYPTOGRAPHY
Cryptography is the preparation and examination of disguising information. It consolidates the request for number juggling, programming building, and electrical structuring. Cryptography is encryption, which is the route toward changing over standard information into muddle information. Deciphering is the opposite system of getting authentic information from confounded information.

A. Working of Cryptography
A cryptographic estimation works in blend in with a keyword, number, or articulation-to encode the plain text. The proportional plain text scrambles to different text with different keys. The security of encoded data depends on two things: the nature of the cryptographic estimation and the secret key. A cryptographic algorithm, in addition to every potential key and all the conventions that make it work, involves a cryptosystem. With the help of Fig. 3, the general idea can be comprehended.

IV. LITERATURE REVIEW
Most of the work has been done in the field of steganography. Mainly steganography has been done on bit map pictures, gif pictures, and grayscale pictures.
The most widely recognized and easiest steganographic technique is the least significant bit inclusion strategy is presented earlier. The least Significant Bit Substitution strategies are called due to how the message information m is inserted inside a spread picture c. In software engineering, the word Least Significant Bit (LSB) alludes toward the littlest (right-most) piece of a parallel succession. The organization of binary is with the end goal that every number may just be either a 0 or a 1, frequently idea of as on separately. Beginning from the right, the worth (if on) signifies a 1. The incentive to one side (if on) means a 2, etc. wherever the qualities are twofold every time [1]. Afterward new encoding strategy utilizes a matrix. The best appropriate procedure for jpeg steganography is considered F5 algorithm [2]. The first recorded use of steganography found from 440 BC back when Herodotus informed to Greece about the forthcoming attack by writing a message on the wooden and covered it by wax. Another example of ancient steganography is Histiaeus who shaved the head of his slave and tattooed the message on it after hair grown message was hidden [3]. In this author has provided the review of steganography techniques and steganalysis technique [4]. According to this paper, a secure stego system is proposed using the stego text distribution close to the cover text distribution. Here observer no need to know about the secret key. The embedding function depends on the cover text distribution [5]. This paper presented and discussed www.ijacsa.thesai.org the possibility for using steganography in MMS and also suggested SMILE Steganography. Here presented algorithms and evaluation are on theoretical basis only [6].
As well as mobile phones became popular, so MMS techniques were used for communication. So, there was also some research in such area which shows the calculation for hiding information in MMS utilizing Portable Network Graphic picture also shows the novel strategy for steganography utilizing both content and pictures [7]. Steganography technique used in a game known as the Sudoku puzzle. It shows that how we can hide data in the Sudoku puzzle for secure information transfer [8]. In this paper different analysis of existing steganography has been done.
Here are also given some differences between steganography and watermarking. Some questions may also arise such that is this technique is useful or not? [9]. Here we find how we can use steganography in MMS for Smartphones. Two-level of security has provided using image and text both [10]. Here author suggested Elliptic Curve Cryptography method for MMS security purpose [11]. This paper gives a comparative study of different mobile environments and their development technology. Also, introduce security issues for android OS [12]. In this paper authors provided steganography for JPEG image over the mobile phone. Here algorithm is implemented through the combination of text, image, and encryption [13]. This paper gives idea of hiding the text message inside one small image using LSB and then hided that image in larger image using DWT algorithm. It is implemented on gray images not on color images [14]. In this paper author implemented steganography method on android environment using LSB method and also used TEA algorithm for cryptography also for reducing the size of message LZW compression method is used [15]. Multi-Level steganography with dissemination in painting and YASS Algorithm on the external level and One-Time stuffing of the mystery note with key picture and YASS on internal level used for steganography [16]. In another paper author described about a model called Ste-Chy as an evidence of idea of the blend of the strategies. This methodology helps the client as far as the trading of secret information by online offer in Android base media. In support of the classified confirmation reason, the secret message is concealed along with the objective picture. At an adequate level image is created by this work using nature of original and stego pictures [17]. In [18] authors were used emoticons or lingoes to hide the information. He has proposed his idea for embedding data in emoticons or using lingoes in SMS than the recipient can extract the hidden information. In [19] we find the information regarding different steganographic techniques and gives performance metrics for mobile image steganography. In [20], creators have built up an android application through which we can shroud information behind the picture, and we can share an apk document through WhatsApp. This application is created by utilizing steganography and the LZMA firmness strategy. In this research authors have given idea of video watermarking using steganography. For steganography they have used DCT method. Here water mark is embedded inside the quantized coefficients [21]. It gives improvement in multiphase encryption by encrypt the data with different encryption algorithms. Here proposed algorithm itself append the information along with secret text on the other hand in multiphase sender provide the specific order to receiver for decrypting the message [22]. In this work creators suggested Image steganography using k means clustering and AES encryption together. Messages are hided in object area which form as cluster with that encryption has also used for improvement [23]. Benefit of this application is it gives twofold security by utilizing hiding and firmness strategy. For jpeg image, a steganography technique is proposed. A part of data may be lost after the quantization of frequency values in the JPEG compression procedure, in the proposed method, the embedded message is added to the image after the discretization stage. The method utilizes two adjacent pixels in the steganography process [24]. The authors suggested cryptography and Steganography method for smart phones.
Here they have used RSA algorithm for encryption and LSB insertion method for information hiding [25]. Message is sliced in parts and hided in multiple images. LSB technique is used for each image and image contain some header information so that at the receiver side any specific order is not required [26]. This paper gives idea of different techniques for jpeg steganography. It summarizes various algorithms and techniques used in the past and in present. This paper also analysis's these algorithms based on the basic parameters of image steganography: Unidentifiable, robustness and hiding capacity [27]. Here author proposes a JPEG steganography algorithm to provide strength to the Stego image using DCT coefficient and maintain an even coefficient distribution based on the JPEG characteristic [28]. In this paper author has suggested LSB embedding method using BMP and PNG images. He has hided secret message in pixel values and modified values have shown in new generated images [29]. "This paper introduced the concept of steganography using bit selection of cover image. Basically, here also LSB Technique is used for hiding the secret message. Message can be in any format text or image. Here gray scale image has been taken as example to perform this operation. Secret message image must be smaller then cover image [30].This paper suggested the modification in F5 algorithm of data hiding. It is based on idea of modified matrix embedding (MME). In proposed method all nonzero AC coefficients collected in single array and divides array into small coefficient blocks, then find the coefficient with least distortion to embed message [31].
The rise of mobile phones has led to new demands of android operating systems and applications to run on it. Nowadays image steganography is a very wide area for research work. The field steganography is very vast but, in that field, and the present requirement mobile steganography work motivates the researchers to introduce some new and innovative ideas. Steganography poses a lot of interesting research problems and there are so many techniques to implement it and require some further improvement. There is still not too much work that has been done on JPEG steganography over cell phones.

V. MOTIVATION
There is too much research that has been done on image security over the different kinds of image formats BMP, GIF, and PNG. Several compression methods are available that applied to the image having the formats BMP, GIF, and PNG is comparatively less effective than the JPEG image. Even the www.ijacsa.thesai.org JPEG compression steganography method becomes difficult though some algorithms show JPEG Steganography. But they provide a single-level or two-level security. Most of the techniques are computer system based but not for mobile phones. Now day's everyone has a mobile phone became so handy. Chatting is one popular application of mobile through which one can share different kinds of data such as pictures, audio, and videos among users. When we consider information security over mobile phones, steganography is the best security procedure because most of the correspondence with the assistance of sharing pictures. Although steganography has been done in all types of image format still this technique is an interesting research area for mobile application. The motivation for this work is that steganography is the way to provide secure communication. Its main goal is to hide information so that no one can detect it and provide information securely to the sender. Hackers or attackers cannot identify the hidden message in any way. In this carrier, the image keeps a secret message and looks like an original image so that intruder cannot pay attention to it. Most security agencies are using this technology for secure communication. In the present scenario, the mobile phone has become a popular device for communication due to which information flows freely, so information security becomes a primary concern. Hence this motivated mobile application development.

VI. PROPOSED METHOD
Earlier work is carried out using text steganography and image steganography and for this purpose PNG (Portable Network Graphic) image was used [7].
In this work, we are using JPEG images for steganography. We will encrypt an original text message two times later split it into two halves to hide the first half in the image and the second half in the cover message.
Steps for procedure: Input: An Image (Cover Image), Text message (Plain Text), Text message to hide Output: Stego Image with hidden Text, One text file 1) Write Text to hide. 2) Take original image known as cover image.
3) Write Short text message which is known as plain text. 4) Encrypt the text which to be hidden using DES algorithm.
5) Re-encrypt the received encrypted data using the DES algorithm again to produce ciphertext.
6) Split the cipher text in two halves.

7)
Hide the first half cipher text in Cover image using matrix encoding algorithm.
8) Hide the second half cipher text in cover message using markove chain method. 9) Generate stego image and one text file. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 12, No. 8, 2021 227 | P a g e www.ijacsa.thesai.org For receiver side follow the procedure in reverse order but there we provide Stego image, Cover message and generated text file as input to extract original message Fig. 4 shows the basic idea of workflow.
Algorithm S1: Select the image on which we have to perform operation called original image. S2: Enter the message which must be hidden. S3: Enter Cover Message which is used for text steganography. S4: Apply DES Algorithm on message enter in step2 to get encrypted text. S5: Again, apply DES algorithm on received encrypted text from previous step to get final cipher text S6: Divide the final cipher text in two halves S7: Take one half of cipher text and Image loaded in Step1 and Apply F5 algorithm to hide the text in image S8: Take the other half of cipher text and Cover message (S2) apply Markov chain method to hide cipher text in cover message VII. IMPLEMENTATION To encrypt the text which has to hide, "DES Algorithm" has been used in this paper. We encrypted the text first by DES algorithm through which we received Encrypted Text and Further that encrypted text is encrypted again through the same DES Algorithm to get final ciphertext. After receiving this ciphertext, we have split the ciphertext in two half one portion to hide in the image and the other portion to hide in text. We have used the F5 algorithm to hide the text inside the image. It is most commonly used an algorithm based on matrix encoding.
We do quantization of coefficient and then we embed the message using bit position and performing XOR operation. We can understand it through an example.
We want to embed Two bits p1, p2 in three-bit places q1, q2, q3 changing one place at most.
There may be four condition arises. If we find p1 is equal to XOR operation between q1 and q3, and p2 is equal to XOR operation between q2 and q3 then we don't change in bits.
If we find p1 is not equal to the XOR operation between q1 and q3, and p2 is equal to the XOR operation between q2 and q3 then we change bit q1.If we find p1 is equal of XOR operation between q1 and q3, and p2 is not equal of XOR operation between q2 and q3 then we change in bits q2 bit.
If we find p1 is not equal of XOR operation between q1 and q3, and p2 is not equal of XOR operation between q2 and q3 then we change in bit q3. In all these conditions we do not change more than one bit.
Text hiding within text: Hide text in text with the help of cover messages using a Markov Chain method. This generates an encryption vector based on the relationship between the cumulative character score of the cover message and each character of an input string. Decrypt messages by reversing the encryption on the encryption vector and retrieving the original message based on the cumulative character score and the relationship between the cover message and the input string.
Generating an Encryption Vector: Take the sum of all the ascii character codes of each character in the cover message:

VIII. RESULT AND DISCUSSION
When we embed the data in the image it increases in the Mean Square Error (MSE). This automatically reduces the Peak Signal to Noise Ratio (PSNR) and vice versa. The PSNR is to be measured in decibels (dB). Usually, PSNR of more than 35db is considered good quality, so our results have good values. The lesser the MSE value higher will be the PSNR values. Equation 1 shows the formula for calculating PSNR.  We have used different images to embed the data inside. Here one message is conveyed, and text is hidden inside the image. Also, some part of the text is hidden in cover message.
Here we have used three-level security for data hiding on the android environment. Table I Fig. 9, Fig. 11 and Fig. 13 show the original images through which the secret message migrated.

IX. CONCLUSION
As we know that technologies have been improving in the field of communication, its result is that many microdevices have also arrived in the market. The most commonly and widely used device is the android smartphone. In such environments, the concern of security may arise that how can we keep protected our data and information. For this purpose, many researchers have used either cryptography or Steganography techniques. Some of them also tried a combination of both. When we see the previous work we found that very little work has been done over JPEG image format in the android environment and whatever the work has done they have to provide only one level or two-level security. Here we have given a method for enhancing the security by using cryptography and Steganography at three-level security over the android environment. Here hiding information in two different parts that are image and text makes it more robust to attack. We have encrypted the message two times with the DES Encryption algorithm and then divide that encrypted message into two halves so that one part is hidden in the image using the F5 algorithm and another part is hidden in the cover message using the Markov chain method for text Steganography. In this manner, two times encryption and further hiding in text and image make this system the best www.ijacsa.thesai.org application to ensure data security. Till now F5 algorithm implementation is not available for android application so it is very secure application for image steganography over mobile phone. It is extensively using DES algorithm with f5, so it takes some time in processing. In comparison of other this method has advantage of security at three level which has not implemented till now on android phone using F5 algorithm for JPEG images. The limitation of this application is that it is tested on the upper than android 6 version not supported on the lower version and gives the best result for short messages, not for long payload.