Research Article
BibTex RIS Cite

Goldbach Sanısı Tabanlı Yeni Bir Matematiksel Sayısal İmge Damgalama Yöntemi

Year 2018, Volume: 30 Issue: 1, 151 - 159, 01.03.2018

Abstract

Bu makalede Goldbach sanısı
kullanılarak yeni bir sayısal damgalama yöntemi önerilmiştir. Goldbach sanısına
göre 2’den büyük tüm çift sayılar iki asal sayının toplamından oluşmaktadır. Bu
makalede elde edilen asal sayıların oranları kullanılarak sayısal damgalama
işlemi gerçekleştirilmiştir. Bu yöntemde imge bloklara ayrılmış ve veri
gizlenecek piksel rastgele sayı üreteci kullanılarak seçilmiştir. Önerilen
yöntemi test etmek için görsel kalite, dayanıklılık ve çalışma zamanı
kullanılmıştır. Bu yöntem Çin Kalan Teoremi tabanlı sayısal damgalama
algoritmalarıyla karşılaştırılmıştır. Deneysel sonuçlar, goldbach sanısı
tabanlı sayısal damgalama yöntemini doküman, video ve imge içeriğini korumak
için kullanılacak pratik ve başarılı bir yöntem olduğunu göstermiştir.

References

  • 1. Doğan, Ş. (2016). A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review, 46(1), 129-143. 2. Akter, A., E-Tajnina, N., Ullah, M.A. (2014). Digital image watermarking based on DWT-DCT: evaluate for a new embedding algorithm, in: Third Int. Conf. On Informatics, Electronics & Vision, May 2014, Dhaka,Bangladesh, pp. 1–6. 3. Su, Q., Niu, Y., Wang, Q., Sheng, G. (2013). A blind color image watermarking based on DC component in thespatial domain, Optik 124 (23), 6255–6260. 4. Lang, J., Zhang, Z.-G. (2014). Blind digital watermarking method in the fractional Fourier transform domain, Opt. Lasers Eng. 53, 112–123. 5. Musrrat, A., Ahn, C.W., Pant, M. (2014). A robust image watermarking technique using SVD and differential evolution in DCT domain, Optik 125 (1), 428–434. 6. Tuncer, T., Avcı, E. (2016). Göktürk Alfabesi Tabanlı Görsel Sır Paylaşımı Metodu ile Veri Gizleme Uygulaması, Journal of the Faculty of Engineering and Architecture of Gazi University, 31, 3, 781-789. 7. Dogan, S. (2017). A reversible data hiding scheme based on graph neighbourhood degree. Journal of Experimental & Theoretical Artificial Intelligence, 29(4), 741-753. 8. Elibaşı E., Özdemir S. (2013). Kablosuz Çoklu Ortam Algılayıcı Ağlarında Damgalama İle Güvenli Veri Kümeleme, Journal of the Faculty of Engineering and Architecture of Gazi University Cilt 28, No 3, 587-594, Vol 28, No 3, pp. 587-594. 9. Dogan, S., Tuncer, T., Avci, E., Gulten, A. (2011). A robust color image watermarking with Singular Value Decomposition method. Advances in Engineering Software, 42(6), 336-346. 10. Mir, N. (2014). Copyright for web content using invisible text watermarking, Computers in Human Behavior, 30, 648–653. 11. Zheng, P.-P., Feng, J., Li, Z., Zhou, M.-Q. (2014). A novel SVD and LS-SVM combination algorithm for blind watermarking, Neurocomputing, 142, 520–528. 12. Hu, H.-T., Hsu, L.-Y. (2015). Exploring DWT–SVD–DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression, Computers and Electrical Engineering, 41, 52–63. 13. Abdallah, H. A., Ghazy, R. A., Kasban, H., Faragallah, O. S., Shaalan, A. A., Hadhoud, M. M., Dessouky, M. I., El-Fishawy, N. A., Alshebeili, S. A., Abd El-samie, F. E. (2014). Homomorphic image watermarking with a singular value decomposition algorithm, Information Processing and Management, 50, pp. 909–923. 14. Xiang-yang, W., Yu-nan, L., Shuo, L., Hong-ying, Y., Pan-pan, N., Yan, Z. (2015). A new robust digital watermarking using local polar harmonic transform, Computers and Electrical Engineering, 46, 403–418. 15. Khalili, M. (2015). DCT-Arnold chaotic based watermarking using JPEG-YCbCr, Optik, 126, 4367–4371. 16. Mehto, A., Mehra, N. (2016). Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT & DWT, International Conference on Information Security & Privacy (ICISP2015), 78, 88-94. 17. Botta, M., Cavagnino, D., Pomponiu, V. (2016). A modular framework for color image watermarking, Signal Processing, 119, 102–114. 18. Nguyen, T.-S., Chang, C.-C., Yang, X.-Q. (2016). A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain, Int. J. Electron. Commun. (AEÜ), 70, 1055–1061. 19. Shih, F. Y., Zhong, X. (2016). High-capacity multiple regions of interest watermarking for medical images, Information Sciences, 367–368, 648–659. 20. Patra, J. C., Karthik, A., Bornand, C. (2010). A novel CRT-based watermarking technique for authentication of multimedia contents, Digital Signal Processing, 20 , 442-453. 21. Patra, J. C., Karthik A., Bornand, C. (2010). A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression, Digital Signal Processing, 20, 1597-1611. 22. Thulasidharan, P. P., Nair, M. S. (2015). QR code based blind digital image watermarking with attack detection code, Int. J. Electron. Commun. (AEÜ), 69, pp. 1074–1084. 23. Idowu, M. A. (2015 ). A Novel Theoretical Framework Formulated for Information Discovery from Number System and Collatz Conjecture Data, Procedia Computer Science, 61, pp. 105 – 111. 24. Copot, M. (2016). Collatz Conjecture reverse-tree, https://codepen.io/towc/pen/mEaJjq, (Son Erişim Tarihi: 29/09/2016). 25. SIPI Image Dataset (2017). University of Southern California, Signal and Image Processing Institute, http://sipi.usc.edu/database/, (Son Erişim Tarihi: 16/10/2017) 26. Özkaynak, F. (2015). Kriptolojik Rasgele Sayı Üreteçleri. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, 8(2). 27. Özkaynak, F. (2014). Cryptographically secure random number generator with chaotic additional input. Nonlinear Dynamics, 78(3), 2015-2020.
Year 2018, Volume: 30 Issue: 1, 151 - 159, 01.03.2018

Abstract

References

  • 1. Doğan, Ş. (2016). A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review, 46(1), 129-143. 2. Akter, A., E-Tajnina, N., Ullah, M.A. (2014). Digital image watermarking based on DWT-DCT: evaluate for a new embedding algorithm, in: Third Int. Conf. On Informatics, Electronics & Vision, May 2014, Dhaka,Bangladesh, pp. 1–6. 3. Su, Q., Niu, Y., Wang, Q., Sheng, G. (2013). A blind color image watermarking based on DC component in thespatial domain, Optik 124 (23), 6255–6260. 4. Lang, J., Zhang, Z.-G. (2014). Blind digital watermarking method in the fractional Fourier transform domain, Opt. Lasers Eng. 53, 112–123. 5. Musrrat, A., Ahn, C.W., Pant, M. (2014). A robust image watermarking technique using SVD and differential evolution in DCT domain, Optik 125 (1), 428–434. 6. Tuncer, T., Avcı, E. (2016). Göktürk Alfabesi Tabanlı Görsel Sır Paylaşımı Metodu ile Veri Gizleme Uygulaması, Journal of the Faculty of Engineering and Architecture of Gazi University, 31, 3, 781-789. 7. Dogan, S. (2017). A reversible data hiding scheme based on graph neighbourhood degree. Journal of Experimental & Theoretical Artificial Intelligence, 29(4), 741-753. 8. Elibaşı E., Özdemir S. (2013). Kablosuz Çoklu Ortam Algılayıcı Ağlarında Damgalama İle Güvenli Veri Kümeleme, Journal of the Faculty of Engineering and Architecture of Gazi University Cilt 28, No 3, 587-594, Vol 28, No 3, pp. 587-594. 9. Dogan, S., Tuncer, T., Avci, E., Gulten, A. (2011). A robust color image watermarking with Singular Value Decomposition method. Advances in Engineering Software, 42(6), 336-346. 10. Mir, N. (2014). Copyright for web content using invisible text watermarking, Computers in Human Behavior, 30, 648–653. 11. Zheng, P.-P., Feng, J., Li, Z., Zhou, M.-Q. (2014). A novel SVD and LS-SVM combination algorithm for blind watermarking, Neurocomputing, 142, 520–528. 12. Hu, H.-T., Hsu, L.-Y. (2015). Exploring DWT–SVD–DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression, Computers and Electrical Engineering, 41, 52–63. 13. Abdallah, H. A., Ghazy, R. A., Kasban, H., Faragallah, O. S., Shaalan, A. A., Hadhoud, M. M., Dessouky, M. I., El-Fishawy, N. A., Alshebeili, S. A., Abd El-samie, F. E. (2014). Homomorphic image watermarking with a singular value decomposition algorithm, Information Processing and Management, 50, pp. 909–923. 14. Xiang-yang, W., Yu-nan, L., Shuo, L., Hong-ying, Y., Pan-pan, N., Yan, Z. (2015). A new robust digital watermarking using local polar harmonic transform, Computers and Electrical Engineering, 46, 403–418. 15. Khalili, M. (2015). DCT-Arnold chaotic based watermarking using JPEG-YCbCr, Optik, 126, 4367–4371. 16. Mehto, A., Mehra, N. (2016). Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT & DWT, International Conference on Information Security & Privacy (ICISP2015), 78, 88-94. 17. Botta, M., Cavagnino, D., Pomponiu, V. (2016). A modular framework for color image watermarking, Signal Processing, 119, 102–114. 18. Nguyen, T.-S., Chang, C.-C., Yang, X.-Q. (2016). A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain, Int. J. Electron. Commun. (AEÜ), 70, 1055–1061. 19. Shih, F. Y., Zhong, X. (2016). High-capacity multiple regions of interest watermarking for medical images, Information Sciences, 367–368, 648–659. 20. Patra, J. C., Karthik, A., Bornand, C. (2010). A novel CRT-based watermarking technique for authentication of multimedia contents, Digital Signal Processing, 20 , 442-453. 21. Patra, J. C., Karthik A., Bornand, C. (2010). A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression, Digital Signal Processing, 20, 1597-1611. 22. Thulasidharan, P. P., Nair, M. S. (2015). QR code based blind digital image watermarking with attack detection code, Int. J. Electron. Commun. (AEÜ), 69, pp. 1074–1084. 23. Idowu, M. A. (2015 ). A Novel Theoretical Framework Formulated for Information Discovery from Number System and Collatz Conjecture Data, Procedia Computer Science, 61, pp. 105 – 111. 24. Copot, M. (2016). Collatz Conjecture reverse-tree, https://codepen.io/towc/pen/mEaJjq, (Son Erişim Tarihi: 29/09/2016). 25. SIPI Image Dataset (2017). University of Southern California, Signal and Image Processing Institute, http://sipi.usc.edu/database/, (Son Erişim Tarihi: 16/10/2017) 26. Özkaynak, F. (2015). Kriptolojik Rasgele Sayı Üreteçleri. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, 8(2). 27. Özkaynak, F. (2014). Cryptographically secure random number generator with chaotic additional input. Nonlinear Dynamics, 78(3), 2015-2020.
There are 1 citations in total.

Details

Primary Language Turkish
Journal Section MBD
Authors

Türker Tuncer

Publication Date March 1, 2018
Submission Date August 15, 2017
Published in Issue Year 2018 Volume: 30 Issue: 1

Cite

APA Tuncer, T. (2018). Goldbach Sanısı Tabanlı Yeni Bir Matematiksel Sayısal İmge Damgalama Yöntemi. Fırat Üniversitesi Mühendislik Bilimleri Dergisi, 30(1), 151-159.
AMA Tuncer T. Goldbach Sanısı Tabanlı Yeni Bir Matematiksel Sayısal İmge Damgalama Yöntemi. Fırat Üniversitesi Mühendislik Bilimleri Dergisi. March 2018;30(1):151-159.
Chicago Tuncer, Türker. “Goldbach Sanısı Tabanlı Yeni Bir Matematiksel Sayısal İmge Damgalama Yöntemi”. Fırat Üniversitesi Mühendislik Bilimleri Dergisi 30, no. 1 (March 2018): 151-59.
EndNote Tuncer T (March 1, 2018) Goldbach Sanısı Tabanlı Yeni Bir Matematiksel Sayısal İmge Damgalama Yöntemi. Fırat Üniversitesi Mühendislik Bilimleri Dergisi 30 1 151–159.
IEEE T. Tuncer, “Goldbach Sanısı Tabanlı Yeni Bir Matematiksel Sayısal İmge Damgalama Yöntemi”, Fırat Üniversitesi Mühendislik Bilimleri Dergisi, vol. 30, no. 1, pp. 151–159, 2018.
ISNAD Tuncer, Türker. “Goldbach Sanısı Tabanlı Yeni Bir Matematiksel Sayısal İmge Damgalama Yöntemi”. Fırat Üniversitesi Mühendislik Bilimleri Dergisi 30/1 (March 2018), 151-159.
JAMA Tuncer T. Goldbach Sanısı Tabanlı Yeni Bir Matematiksel Sayısal İmge Damgalama Yöntemi. Fırat Üniversitesi Mühendislik Bilimleri Dergisi. 2018;30:151–159.
MLA Tuncer, Türker. “Goldbach Sanısı Tabanlı Yeni Bir Matematiksel Sayısal İmge Damgalama Yöntemi”. Fırat Üniversitesi Mühendislik Bilimleri Dergisi, vol. 30, no. 1, 2018, pp. 151-9.
Vancouver Tuncer T. Goldbach Sanısı Tabanlı Yeni Bir Matematiksel Sayısal İmge Damgalama Yöntemi. Fırat Üniversitesi Mühendislik Bilimleri Dergisi. 2018;30(1):151-9.