Araştırma Makalesi
BibTex RIS Kaynak Göster

DEVELOPMENT OF NOVEL COMPARISON BASED STEGANOGRAPHY ALGORITHMS ON MULTIMEDIA TO HIDE PRIVATE DATA

Yıl 2023, Cilt: 19 Sayı: 2, 133 - 157, 29.12.2023
https://doi.org/10.56850/jnse.1385482

Öz

Throughout history, humanity has had secrets to safeguard, information that needed to be conveyed to allies in a way that enemies couldn't decipher. To achieve this goal of safeguarding important and valuable information, cryptography and steganography have been frequently used methods both in the past and in today's world. This article introduces a steganographic algorithm designed for hiding data in the color images, along with two different algorithm designs derived from this method. The bits of the hidden message are embedded sequentially into each pixel using the bit comparison. The comparison method works by matching the bits of the image and the message. The least significant bits (LSB) of the carrier (cover) image bytes change depending on the number of matching bits between the carrier image and the hidden message. The proposed method has the potential to hide 1 byte of data within 5 bytes under optimal conditions. The designed algorithms have been tested on a series of color images, and satisfactory results have been achieved in terms of embedding a sufficient amount of data into the images without compromising image quality. The results have been compared with the results of the LSB technique and similar methods based on various performance criteria.

Etik Beyan

An ethical committee approval and/or legal/special permission has not been required within the scope of this study.

Kaynakça

  • Alattar, A. M. (2004). “Reversible watermark using the difference expansion of a generalized integer transform.” IEEE Transactions on Image Processing, 13(8), 1147–1156.
  • Bansal, R., & Badal, N. (2022). “A novel approach for dual layer security of message using Steganography and Cryptography.” Multimedia Tools and Applications, 81(15), 20669–20684. https://doi.org/10.1007/s11042-022-12084-y
  • Chan, C.-S. (2009). “On using LSB matching function for data hiding in pixels”. Fundamenta Informaticae, 96(1–2), 49–59.
  • Chang, C.-C., Chou, Y.-C., & Kieu, T. D. (2009). Information hiding in dual images with reversibility. 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 145–152. https://ieeexplore.ieee.org/abstract/document/5319030/
  • Durdu, A. (2021). “24-bit renkli imge içine 24-bit renkli imge gizleyen yüksek kapasiteli düşük bozulumlu tersinir kayıplı yeni bir veri gizleme yöntemi (YKKG).” Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, 27(2), 96–113.
  • Grībermans, D., Jeršovs, A., & Rusakovs, P. (2016). “Development of Requirements Specification for Steganographic Systems.” Applied Computer Systems, 20(1), 40–48. https://doi.org/10.1515/acss-2016-0014
  • Ker, A. D. (2004). Quantitative evaluation of pairs and RS steganalysis. Security, Steganography, and Watermarking of Multimedia Contents VI, 5306, 83–97. https://www.spiedigitallibrary.org/conferenceproceedingsofspie/5306/0000/Quantitativeevaluation-of-pairs-and-RS-steganalysis/10.1117/12.526720.short
  • Khan, A., & Sarfaraz, A. (2019). “Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method.” Soft Computing, 23(17), 8045–8056. https://doi.org/10.1007/s00500-018-3441-1
  • Li, C., Chen, Y., & Shang, Y. (2022). “A review of industrial big data for decision making in intelligent manufacturing.” Engineering Science and Technology, an International Journal, 29, 101021. https://doi.org/10.1016/j.jestch.2021.06.001
  • Lu, T.-C., Tseng, C.-Y., & Wu, J.-H. (2015). “Dual imaging-based reversible hiding technique using LSB matching.” Signal Processing, 108, 77–89.
  • Mielikainen, J. (2006). “LSB matching revisited.” IEEE Signal Processing Letters, 13(5), 285–287.
  • Milli, M., & Milli, M. (2023). Big Data and its Future. In Data Science with Semantic Technologies (pp. 27–43). CRC Press. https://www.taylorfrancis.com/chapters/edit/10.1201/9781003310785-2/big-data-future-musa-milli-mehmet-milli
  • Saran, N., & Olcay, C. (2013). “İmge içine bilgi gizlemede kullanılan lsb yöntemlerinin karşılaştırması.” Cankaya University Journal of Science and Engineering, 10(1). https://dergipark.org.tr/en/pub/cankujse/issue/33158/368988
  • Sharp, T. (2001). “An Implementation of Key-Based Digital Signal Steganography.” In I. S. Moskowitz (Ed.), Information Hiding (Vol. 2137, pp. 13–26). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45496-9_2
  • Swain, G. (2018). “High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis.” Security and Communication Networks, 2018. https://www.hindawi.com/journals/scn/2018/1505896/
  • Tian, J. (2003). “Reversible data embedding using a difference expansion.” IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 890–896.
  • Volkhonskiy, D., Nazarov, I., & Burnaev, E. (2020). Steganographic generative adversarial networks. Twelfth International Conference on Machine Vision (ICMV 2019), 11433, 991–1005. https://www.spiedigitallibrary.org/conference-proceedings-of-spie/11433/114333M/Steganographic-generative-adversarial-networks/10.1117/12.2559429.short
  • Wang, C.-M., Wu, N.-I., Tsai, C.-S., & Hwang, M.-S. (2008). “A high quality steganographic method with pixel-value differencing and modulus function.” Journal of Systems and Software, 81(1), 150–158.
  • Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). “Image quality assessment: From error visibility to structural similarity.” IEEE Transactions on Image Processing, 13(4), 600–612.
  • Wu, D.-C., & Tsai, W.-H. (2003). “A steganographic method for images by pixel-value differencing.” Pattern Recognition Letters, 24(9–10), 1613–1626.
  • Yalman, Y. (2010). Sayısal görüntüler için histogram temelli veri gizleme yöntemi ve uygulama yazılımı. http://dspace.kocaeli.edu.tr:8080/xmlui/bitstream/handle/11493/15107/275801.pdf?sequence=1
  • Zi, H., Zhang, Q., Yang, J., & Kang, X. (2018). Steganography with convincing normal image from a joint generative adversarial framework. 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 526–532. https://ieeexplore.ieee.org/abstract/document/8659716/

MULTİMEDYA ÜZERİNDE ÖZEL VERİLERİ GİZLEMEK İÇİN KARŞILAŞTIRMA TABANLI YENİ STEGANOGRAFİK ALGORİTMALARIN GELİŞTİRİLMESİ

Yıl 2023, Cilt: 19 Sayı: 2, 133 - 157, 29.12.2023
https://doi.org/10.56850/jnse.1385482

Öz

Tarih boyunca insanlığın korunması gereken sırları ve düşmanların çözemeyeceği şekilde müttefiklere iletilmesi gereken bilgileri vardı. Bu önemli ve değerli bilgilerin korunması hedefine ulaşmak için kriptografi ve steganografi hem geçmişte hem de günümüz dünyasında sıklıkla kullanılan yöntemlerden olmuştur. Bu makale, renkli görüntüler üzerinde veri gizleyen stenografik bir algoritma tasarımı ve bu algoritmadan türeyen iki farklı algoritma tasarımını tanımlar. Gizli mesajın bitleri, karşılaştırma yöntemi kullanılarak her bir piksele sırayla gömülür. Karşılaştırma yöntemi, görüntünün ve mesajın bitlerini eşleştirerek çalışır. Taşıyıcı imge ile gizli mesajın eşleşen bitlerinin sayısına bağlı olarak, taşıyıcı imge baytlarının en önemsiz bitleri (LSB) değişir. Önerilen yöntem, optimal koşullar altında 5 bayt içerisinde 1 baytlık veriyi gizleme potansiyeline sahiptir. Tasarlanan algoritmalar bir dizi renkli görüntü üzerinde test edilmiş ve görüntü kalitesinden ödün vermeden yeterli miktarda verinin görüntülere gömülmesi açısından tatmin edici sonuçlar elde edilmiştir. Elde edilen sonuçlar farklı performans kriterlerine göre LSB tekniği ve benzer yöntemlerin sonuçları ile karşılaştırılmıştır.

Kaynakça

  • Alattar, A. M. (2004). “Reversible watermark using the difference expansion of a generalized integer transform.” IEEE Transactions on Image Processing, 13(8), 1147–1156.
  • Bansal, R., & Badal, N. (2022). “A novel approach for dual layer security of message using Steganography and Cryptography.” Multimedia Tools and Applications, 81(15), 20669–20684. https://doi.org/10.1007/s11042-022-12084-y
  • Chan, C.-S. (2009). “On using LSB matching function for data hiding in pixels”. Fundamenta Informaticae, 96(1–2), 49–59.
  • Chang, C.-C., Chou, Y.-C., & Kieu, T. D. (2009). Information hiding in dual images with reversibility. 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 145–152. https://ieeexplore.ieee.org/abstract/document/5319030/
  • Durdu, A. (2021). “24-bit renkli imge içine 24-bit renkli imge gizleyen yüksek kapasiteli düşük bozulumlu tersinir kayıplı yeni bir veri gizleme yöntemi (YKKG).” Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, 27(2), 96–113.
  • Grībermans, D., Jeršovs, A., & Rusakovs, P. (2016). “Development of Requirements Specification for Steganographic Systems.” Applied Computer Systems, 20(1), 40–48. https://doi.org/10.1515/acss-2016-0014
  • Ker, A. D. (2004). Quantitative evaluation of pairs and RS steganalysis. Security, Steganography, and Watermarking of Multimedia Contents VI, 5306, 83–97. https://www.spiedigitallibrary.org/conferenceproceedingsofspie/5306/0000/Quantitativeevaluation-of-pairs-and-RS-steganalysis/10.1117/12.526720.short
  • Khan, A., & Sarfaraz, A. (2019). “Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method.” Soft Computing, 23(17), 8045–8056. https://doi.org/10.1007/s00500-018-3441-1
  • Li, C., Chen, Y., & Shang, Y. (2022). “A review of industrial big data for decision making in intelligent manufacturing.” Engineering Science and Technology, an International Journal, 29, 101021. https://doi.org/10.1016/j.jestch.2021.06.001
  • Lu, T.-C., Tseng, C.-Y., & Wu, J.-H. (2015). “Dual imaging-based reversible hiding technique using LSB matching.” Signal Processing, 108, 77–89.
  • Mielikainen, J. (2006). “LSB matching revisited.” IEEE Signal Processing Letters, 13(5), 285–287.
  • Milli, M., & Milli, M. (2023). Big Data and its Future. In Data Science with Semantic Technologies (pp. 27–43). CRC Press. https://www.taylorfrancis.com/chapters/edit/10.1201/9781003310785-2/big-data-future-musa-milli-mehmet-milli
  • Saran, N., & Olcay, C. (2013). “İmge içine bilgi gizlemede kullanılan lsb yöntemlerinin karşılaştırması.” Cankaya University Journal of Science and Engineering, 10(1). https://dergipark.org.tr/en/pub/cankujse/issue/33158/368988
  • Sharp, T. (2001). “An Implementation of Key-Based Digital Signal Steganography.” In I. S. Moskowitz (Ed.), Information Hiding (Vol. 2137, pp. 13–26). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45496-9_2
  • Swain, G. (2018). “High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis.” Security and Communication Networks, 2018. https://www.hindawi.com/journals/scn/2018/1505896/
  • Tian, J. (2003). “Reversible data embedding using a difference expansion.” IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 890–896.
  • Volkhonskiy, D., Nazarov, I., & Burnaev, E. (2020). Steganographic generative adversarial networks. Twelfth International Conference on Machine Vision (ICMV 2019), 11433, 991–1005. https://www.spiedigitallibrary.org/conference-proceedings-of-spie/11433/114333M/Steganographic-generative-adversarial-networks/10.1117/12.2559429.short
  • Wang, C.-M., Wu, N.-I., Tsai, C.-S., & Hwang, M.-S. (2008). “A high quality steganographic method with pixel-value differencing and modulus function.” Journal of Systems and Software, 81(1), 150–158.
  • Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). “Image quality assessment: From error visibility to structural similarity.” IEEE Transactions on Image Processing, 13(4), 600–612.
  • Wu, D.-C., & Tsai, W.-H. (2003). “A steganographic method for images by pixel-value differencing.” Pattern Recognition Letters, 24(9–10), 1613–1626.
  • Yalman, Y. (2010). Sayısal görüntüler için histogram temelli veri gizleme yöntemi ve uygulama yazılımı. http://dspace.kocaeli.edu.tr:8080/xmlui/bitstream/handle/11493/15107/275801.pdf?sequence=1
  • Zi, H., Zhang, Q., Yang, J., & Kang, X. (2018). Steganography with convincing normal image from a joint generative adversarial framework. 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 526–532. https://ieeexplore.ieee.org/abstract/document/8659716/
Toplam 22 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Görüntü İşleme
Bölüm Makaleler
Yazarlar

Musa Milli 0000-0001-8323-6366

Daniyar Khassenov 0000-0001-8323-6366

Erken Görünüm Tarihi 13 Aralık 2023
Yayımlanma Tarihi 29 Aralık 2023
Gönderilme Tarihi 3 Kasım 2023
Kabul Tarihi 8 Aralık 2023
Yayımlandığı Sayı Yıl 2023 Cilt: 19 Sayı: 2

Kaynak Göster

APA Milli, M., & Khassenov, D. (2023). DEVELOPMENT OF NOVEL COMPARISON BASED STEGANOGRAPHY ALGORITHMS ON MULTIMEDIA TO HIDE PRIVATE DATA. Journal of Naval Sciences and Engineering, 19(2), 133-157. https://doi.org/10.56850/jnse.1385482