Search In this Thesis
   Search In this Thesis  
العنوان
A Study of Information Hiding Techniques Based on Smartphones /
المؤلف
Ali, Ahmed Hamdy Ismail,
هيئة الاعداد
باحث / أحمد حمدى إسماعيل على
مشرف / عبد المجيد أمين على
مشرف / الحسين صديق سعد
الموضوع
Smartphones. Mobile computing. Computational intelligence. Multimedia systems. Application software.
تاريخ النشر
2020.
عدد الصفحات
144 p. :
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
Computer Science (miscellaneous)
تاريخ الإجازة
1/1/2020
مكان الإجازة
جامعة المنيا - كلية العلوم - علوم الحاسب
الفهرس
Only 14 pages are availabe for public view

from 147

from 147

Abstract

The rapid developments in hardware and software in recent years have led to handheld telephones providing similar capabilities in desktops and laptops. That enforcement with system administration and functionalities, as well as advanced Graphical User Interfaces (GUIs), has led to new devices called smartphones which are the first selection to connect, entertain and store private information on the Internet.
The rapid developing of smartphones, which offer accurate customization and varied ability has changed the technology dramatically. Also, Near Field Communication (NFC) integration of smartphones has produced many applications in a variety of different fields (e.g. electronic ticketing and access control frameworks).
In this thesis, a three steganography techniques were designed and developed based on android NFC-Enabled smartphones. These techniques will be presented, explained and evaluated in the following chapters of this thesis.
The first proposed one is called NFC-Stego, NFC-Stego is a steganography technique that is responsible for presenting the service of information hiding. It depends on android NFC-Enabled smartphones and an available connection of internet. NFC-Stego consists of three main processes which are pairing, send and receive. In pairing phase; it is responsible for authentication of the receiver. While in send phase; the data will be selected and be prepared for sending. More in receive phase; the secret data will be checked and extracted to the authorized receiver only. NFC-Stego tested and evaluated based on security, imperceptibility and capacity. Finally it has been concluded that NFC-Stego is a powerfully secured user friendly system which enables highly capacity data to be hidden along with high imperceptibility.
The second proposed technique is called VRNFC-Stego. VRNFC-Stego is a steganography technique that is responsible for hiding secret data based on NFC-Enabled android smartphones and the use of virtual reality images as a cover. VRNFC-Stego consists of three main processes; pairing, embedding and extraction. Pairing is done based on NFC tag previously configured by the receiver. While embedding is done by inserting the secret data into the least significant bit of each pixel in the VR cover image. Finally in the extraction, the system collects the least significant bits from pixels of VR image. VRNFC-Stego is then tested and evaluated by using set of VR cover images with different sizes. It is concluded that VRNFC-Stego is applicable on smartphones besides it is supporting large embedding capacity and robustness against steganalysis methods such as correlation, histogram and image fidelity.
The third proposed technique is called PVDVRNFC-Stego. PVDVRNFC-Stego is a steganography technique that is responsible for hiding secret data based on NFC-Enabled android smartphones and the use of PVD in virtual reality as a cover. PVDVRNFC-Stego basically depends on PVD technique in embedding and extraction processes. The embedding is done by accessing VR cover pixels in raster scan pattern and splitting pixels into blocks of size 2 x 3 pixels. It uses the correlation of four corner pixels with two middle pixels. This correlation is used to calculate the adaptive ranges that is used to calculate the available bits capacity in each block. The technique has been tested and evaluated. It is proved that it is targeting higher capacity and more robustness against steganalysis.