Share Email Print

Proceedings Paper

Wireless steganography
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on SymbianTM/Series60TM architecture. Finally, two data hiding applications developed for SymbianTM/Series60TM mobile phones are presented.

Paper Details

Date Published: 10 February 2006
PDF: 12 pages
Proc. SPIE 6074, Multimedia on Mobile Devices II, 60740G (10 February 2006); doi: 10.1117/12.650263
Show Author Affiliations
Sos S. Agaian, The Univ. of Texas at San Antonio (United States)
David Akopian, The Univ. of Texas at San Antonio (United States)
Sunil D'Souza, The Univ. of Texas at San Antonio (United States)

Published in SPIE Proceedings Vol. 6074:
Multimedia on Mobile Devices II
Reiner Creutzburg; Jarmo H. Takala; Chang Wen Chen, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?