Research Article
BibTex RIS Cite

Veri Gizlemek Amacıyla Labirent Oluşturma ve AES Veri Şifreleme Algoritması Tabanlı Bir Yöntem Önerisi

Year 2019, Volume: 6 Issue: 3, 668 - 680, 30.09.2019
https://doi.org/10.31202/ecjse.571030

Abstract

Görüntü, ses ve video gibi multimedya ortamlarında gizli verilerin iletilmesini sağlayan bilim dalına steganografi adı verilmektedir. Günlük hayatımızda internetin yaygın olarak kullanılması, kişiye özel bilgilerin iletilmesi problemini de beraberinde getirmiştir. Dolayısı ile steganografi bilimine olan ihtiyaç da artmıştır. Bu çalışmada kişiye özel bir anahtar yardımı ile veri gizlenecek ortam büyüklüğünde bir labirent üretilmektedir. Veri gizleme ortamı olarak farklı ölçülerde ve farklı formatlarda 24 bit derinliğe sahip renkli resimler kullanılmıştır. Labiret üretimi için hem labirentin oluşturulmasını hem de çözüm yolunun birlikte bulunmasını sağlayan Depth First Search algoritmasından faydalanılmıştır. Labirentten elde edilen çözüm yolu koordinatlarına denk gelecek şekilde görüntü üzerindeki piksellerin içerisine bilgi gizlenmektedir. Bilgi gizlemek için En Düşük Bite Ekleme yöntemi kullanılmıştır. Çalışmada önerilen yöntemin daha güçlü kılınması için, veri gizleme işleminden önce gizlenecek veriler AES şifreleme algoritması ile şifrelenmiştir. Böylelikle gizli verilerin üçüncü şahıslar tarafından elde edilmesi güç hale gelmektedir. Öne sürülen yöntem detaylı güvenlik analizleriyle test edilmiş ve veri gizleme/veri çıkarma işlemlerinin başarılı olduğu gözlenmiştir.


References

  • [1] Hui-Lung L., Chia-Feng L., Ling-Hwei C., "A perfect maze based steganographic method", Journal of Systems and Software, 2010,83(12), 2528-2535.
  • [2] Bradley H., Craigie W.A., Onions Ct., Ahm J., "The Oxford English Dictionary: Being a Corrected Re-issue", Clarendon Press, Oxford, (1970).
  • [3] Johnson N.F., Jajodia S., "Exploring Steganography: Seeing the Unseen", IEEE Computers, 1998,31(2), 26-34.
  • [4] Mohd B.J., Abed S., Al-Hayajneh T., Alouneh S. "FPGA hardware of the LSB steganography method", 2012 International Conference on Computer, Information and Telecommunication Systems (CITS), Amman, 1-4, (2012).
  • [5] Sharma S., Gupta A., Trivedi M.C., Yadav V.K. "Analysis of Different Text Steganography Techniques: A Survey", 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 130-133, (2016).
  • [6] Anderson R.J., "Information Hiding: First International Workshop", Springer-Verlag, Cambridge, U.K., (1996).
  • [7] Petitcolas F.A.P., Anderson R.J., M.G, K., "Information hiding-a survey", Proceedings of the IEEE, 1999,87(7), 1062 - 1078.
  • [8] Abboud G., Marean J., Yampolskiy R.V. "Steganography and Visual Cryptography in Computer Forensics", Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), Oakland, CA, 25-32, (2010).
  • [9] Polap D. "Designing mazes for 2D games by artificial ant colony algorithm", Proceedings of the International Symposium for Young Scientists in Technology, Engineering and Mathematics. SYSTEM 2015, Catania, Italy, 63-70, (2015).
  • [10] Lee H.L., Lee C.F., Chen L.H., "A perfect maze based steganographic method", Journal of Systems and Software, 2010,83(12), 2528-2535.
  • [11] Sukumar T., Santha K.R., "Maze Based Data Hiding Using Back Tracker Algorithm", International Journal of Engineering Research and Applications (IJERA), 2012,2(4), 499-504.
  • [12] Kozlova A., Brown J.A., Reading E. "Examination of representational expression in maze generation algorithms", IEEE Conference on Computational Intelligence and Games (CIG), Tainan, Taiwan, 532-533, (2015).
  • [13] Sun, Y., Wang, J., Duan, X. "Research on path planning algorithm of indoor mobile robot", International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shengyang, China, 1108-1111, (2013).
  • [14] Dumane A.R., Narole N.G., Wanjari P. "Design of advanced encryption standard on soft-core processor", World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), Coimbatore, India, 1-5, (2016).
  • [15] Pendli V., Pathuri M., Yandrathi S., Razaque A. "Improvising performance of Advanced Encryption Standard algorithm", Second International Conference on Mobile and Secure Services (MobiSecServ), Gainesville, FL, USA, 1-5, (2016).
  • [16] Garcia D.F. "Performance Evaluation of Advanced Encryption Standard Algorithm", Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), Sliema, Malta, 247-252, (2015).
  • [17] Güvenoğlu, E., "Resim Şifreleme Amacıyla Dinamik S Kutusu Tasarımı İçin Bir Yöntem", El-Cezerî Fen ve Mühendislik Dergisi, 2016,3(2), 179-191.
  • [18] Guvenoglu, E., "Maze Based Image Encryption Algorithm", International Research Journal of Engineering and Technology (IRJET) 2015,2(8), 1578-1585.
  • [19] Naveenkumar S.K., Panduranga H.T., Kiran. "Triple image encryption based on integer transform and chaotic map", International Conference on Optical Imaging Sensor and Security (ICOSS), Coimbatore, India, 1-6, (2013).
  • [20] Shannon C.E., "A Mathematical Theory of Communication", The Bell System Technical Journal, 1948,27, 379–423,623–656.
  • [21] Munir R. "Security analysis of selective image encryption algorithm based on chaos and CBC-like mode", 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), Bali, Indonesia, 142-146, (2012).
  • [22] Wang Z., Bovik A.C., Sheikh H.R., Simoncelli E.P., "Image quality assessment: from error visibility to structural similarity", IEEE Transactions on Image Processing, 2004,13(4), 600-612.

The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm

Year 2019, Volume: 6 Issue: 3, 668 - 680, 30.09.2019
https://doi.org/10.31202/ecjse.571030

Abstract

The field of science, which enables the transmission of private data in multimedia environments such as display, audio and video, is called steganography. The widespread use of the internet in our daily lives has brought about the problem of transmitting confidential information. Hence, the need for steganography science has also increased. In this study, a labyrinth is produced in the size of the environment in which the data can hide with the help of a private key. Color images with 24-bit depth were used as data hiding environment in different measures and different formats. For the production of maze, the Depth First Search algorithm, which ensures both the creation of the maze and the finding of solution path together with this, was utilized. It is made the information hide inside the pixels on the image, corresponding to the coordinates of the solution path obtained from the maze. The Lowest Bit Insertion method was used to hide information. In order to make the proposed method more robust, the data, which will be hidden before the data hiding process was encrypted with the AES encryption algorithm. This makes it difficult for third parties to obtain confidential data. The proposed method was tested with detailed security analysis and it was observed that data hiding / data extraction processes were successful.


References

  • [1] Hui-Lung L., Chia-Feng L., Ling-Hwei C., "A perfect maze based steganographic method", Journal of Systems and Software, 2010,83(12), 2528-2535.
  • [2] Bradley H., Craigie W.A., Onions Ct., Ahm J., "The Oxford English Dictionary: Being a Corrected Re-issue", Clarendon Press, Oxford, (1970).
  • [3] Johnson N.F., Jajodia S., "Exploring Steganography: Seeing the Unseen", IEEE Computers, 1998,31(2), 26-34.
  • [4] Mohd B.J., Abed S., Al-Hayajneh T., Alouneh S. "FPGA hardware of the LSB steganography method", 2012 International Conference on Computer, Information and Telecommunication Systems (CITS), Amman, 1-4, (2012).
  • [5] Sharma S., Gupta A., Trivedi M.C., Yadav V.K. "Analysis of Different Text Steganography Techniques: A Survey", 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 130-133, (2016).
  • [6] Anderson R.J., "Information Hiding: First International Workshop", Springer-Verlag, Cambridge, U.K., (1996).
  • [7] Petitcolas F.A.P., Anderson R.J., M.G, K., "Information hiding-a survey", Proceedings of the IEEE, 1999,87(7), 1062 - 1078.
  • [8] Abboud G., Marean J., Yampolskiy R.V. "Steganography and Visual Cryptography in Computer Forensics", Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), Oakland, CA, 25-32, (2010).
  • [9] Polap D. "Designing mazes for 2D games by artificial ant colony algorithm", Proceedings of the International Symposium for Young Scientists in Technology, Engineering and Mathematics. SYSTEM 2015, Catania, Italy, 63-70, (2015).
  • [10] Lee H.L., Lee C.F., Chen L.H., "A perfect maze based steganographic method", Journal of Systems and Software, 2010,83(12), 2528-2535.
  • [11] Sukumar T., Santha K.R., "Maze Based Data Hiding Using Back Tracker Algorithm", International Journal of Engineering Research and Applications (IJERA), 2012,2(4), 499-504.
  • [12] Kozlova A., Brown J.A., Reading E. "Examination of representational expression in maze generation algorithms", IEEE Conference on Computational Intelligence and Games (CIG), Tainan, Taiwan, 532-533, (2015).
  • [13] Sun, Y., Wang, J., Duan, X. "Research on path planning algorithm of indoor mobile robot", International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shengyang, China, 1108-1111, (2013).
  • [14] Dumane A.R., Narole N.G., Wanjari P. "Design of advanced encryption standard on soft-core processor", World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), Coimbatore, India, 1-5, (2016).
  • [15] Pendli V., Pathuri M., Yandrathi S., Razaque A. "Improvising performance of Advanced Encryption Standard algorithm", Second International Conference on Mobile and Secure Services (MobiSecServ), Gainesville, FL, USA, 1-5, (2016).
  • [16] Garcia D.F. "Performance Evaluation of Advanced Encryption Standard Algorithm", Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), Sliema, Malta, 247-252, (2015).
  • [17] Güvenoğlu, E., "Resim Şifreleme Amacıyla Dinamik S Kutusu Tasarımı İçin Bir Yöntem", El-Cezerî Fen ve Mühendislik Dergisi, 2016,3(2), 179-191.
  • [18] Guvenoglu, E., "Maze Based Image Encryption Algorithm", International Research Journal of Engineering and Technology (IRJET) 2015,2(8), 1578-1585.
  • [19] Naveenkumar S.K., Panduranga H.T., Kiran. "Triple image encryption based on integer transform and chaotic map", International Conference on Optical Imaging Sensor and Security (ICOSS), Coimbatore, India, 1-6, (2013).
  • [20] Shannon C.E., "A Mathematical Theory of Communication", The Bell System Technical Journal, 1948,27, 379–423,623–656.
  • [21] Munir R. "Security analysis of selective image encryption algorithm based on chaos and CBC-like mode", 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), Bali, Indonesia, 142-146, (2012).
  • [22] Wang Z., Bovik A.C., Sheikh H.R., Simoncelli E.P., "Image quality assessment: from error visibility to structural similarity", IEEE Transactions on Image Processing, 2004,13(4), 600-612.
There are 22 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Makaleler
Authors

Erdal Güvenoğlu 0000-0003-1333-5953

Can Razbonyalı This is me 0000-0001-6235-5323

Publication Date September 30, 2019
Submission Date May 28, 2019
Acceptance Date July 20, 2019
Published in Issue Year 2019 Volume: 6 Issue: 3

Cite

IEEE E. Güvenoğlu and C. Razbonyalı, “The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm”, El-Cezeri Journal of Science and Engineering, vol. 6, no. 3, pp. 668–680, 2019, doi: 10.31202/ecjse.571030.
Creative Commons License El-Cezeri is licensed to the public under a Creative Commons Attribution 4.0 license.
88x31.png