first: accept that someone “determined enough” could get at them no matter what you do (assuming they’re in your app *somewhere*)
having said that, unless you’ve got the next “Candy Crush” on your hands, it’s unlikely that anyone would bother with anything more than a quick attempt. so as long as you don’t store your keys as plain text you’d probably foil any such “casual attempt” at hacking.
how to not use plain text? your call, ranging from simple “break up the string and store substrings in varied (distant) places, some backwards, some not, some as raw character codes, etc, reassemble at run-time” (iow, simple “obfuscation”), to a DIY caesar cypher, or an xor cypher with the bit plugin, or strong encryption w openssl plugin (w its potential distribution problems). or take them out of your app entirely with a server-side facades/proxies to do the actual calls while hiding the account details (tho then you’d want to authenticate the caller, a similar problem, in case they instead hack at your proxy), etc. all boils down to how paranoid you want/need to be.
fwiw, hth