Research Article
BibTex RIS Cite

Sayıma dayalı gizli paylaşım yoluyla multimedya sesinin filigran yarı kimlik doğrulaması

Year 2022, Volume: 28 Issue: 2, 324 - 332, 30.04.2022

Abstract

Filigran, sahiplik telif hakkı kimlik doğrulamasını kanıtlamak için belirli verileri gömme işlemidir. Kimlik doğrulama doğruluğu için uygun izin olmadan medya dosyalarını kullanırken gereklidir. Mevcut filigran sorunu, esas olarak sahiplik kanıtından kaynaklanmaktadır, çünkü ses multimedya dosyasında filigrana zarar veren ve telif hakkı kanıtında zorluklara neden olan hafif bir kurcalama meydana gelir. Bu makale, multimedya ses dosyasının bir kısmı kurcalanmış olsa bile, yarı kimlik doğrulama olarak, sahiplik özgünlük damgasının onaylanmasına izin vermek için sayıma dayalı gizli paylaşım stratejisinin kullanılmasını önermektedir. Araştırma testi çalıştırma deneyleri, bu çalışma hala erken aşamalarında olmasına rağmen ilginç özellikler gösterdi. Kimlik doğrulama doğrulaması, LSB 3 modellerinde (1-LSB, 2-LSB, 3-LSB) olduğu gibi, ses ortamındaki gizliliği, veri test edilmiş gizleme kapasitesini ve PSNR güvenliğini araştırdı. Umut vaat eden araştırması, dikkate alınması gereken gerçek çekici katkı fırsatlarını gösteren tam veri bağımlılığı sonuçlarını ortaya çıkardı.

References

  • [1] Gutub A.“Watermarking ımages via counting-based secret sharing for lightweight semi-complete authentication”. International Journal of Information Security and Privacy (IJISP), 2022. http://doi.org/10.4018/IJISP.2022010118.
  • [2] Almazrooie M, Samsudin A, Gutub A, Salleh MS, Omar MA, Hassan SA. “Integrity verification for digital Holy Quran verses using cryptographic hash function and compression”. Journal of King Saud University-Computer and Information Sciences, 32(1), 24-34, 2020.
  • [3] Liang X, Xiang S. “Robust reversible audio watermarking based on high-order difference statistics”. Signal Processing, 2020. http://doi.org/10.1016/j.sigpro.2020. 107584.
  • [4] Gutub A, Ghouti L, Amin A, Alkharobi T, Ibrahim MK. “Utilizing extension character ‘kashida’ with pointed letters for arabic text digital watermarking”. International Conference on Security and Cryptography (SECRYPT), Barcelona, Spain, 28-31 July 2007.
  • [5] Gutub A, Al-Haidari F, Al-Kahsah K, Hamodi J. “e-Text watermarking: utilizing 'kashida' extensions in arabic language electronic writing”. Journal of Emerging Technologies in Web Intelligence (JETWI), 2(1), 48-55, 2010.
  • [6] Gutub A, Al-Juaid N, Khan E. “Counting-Based secret sharing technique for multimedia applications”. Multimedia Tools and Applications, 78(5), 5591-5619, 2019.
  • [7] AlKhodaidi T, Gutub A. “Trustworthy target key alteration helping counting-based secret sharing applicability”. Arabian Journal for Science and Engineering, 45, 3403-3423, 2020.
  • [8] Shuo Li, Zhanjie Song, Wenhuan Lu, Daniel Sun, Jianguo Wei. “Parameterization of LSB in self-recovery speech watermarking framework in big data mining”. Security and Communication Networks, 2017. http://doi.org/10.1155/2017/3847092.
  • [9] Gutub A, Al-Ghamdi M. “Hiding shares by multimedia ımage steganography for optimized counting-based secret sharing”. Multimedia Tools and Applications, 79(11), 7951-7985, 2020.
  • [10] Gutub A, Alaseri K. “Hiding shares of counting-based secret sharing via arabic text steganography for personal usage”. Arabian Journal for Science and Engineering, 45(4), 2433-2458, 2020.
  • [11] Richard Popa. An Analysis of Steganogrphic Techniques. Master Thesis, Department of Computer Science and Software Engineering, Faculty of Automatics and Computers, The Politehnica University of Timisoara, 1998.
  • [12] Gutub A, Fattani M. “A novel arabic text steganography method using letter points and extensions”. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 1(3), 502-505, 2007.
  • [13] Al-Nofaie S, Gutub A, Al-Ghamdi M. “Enhancing arabic text steganography for personal usage utilizing pseudospaces”. Journal King Saud University-Computer and Information Sciences, 2019.
  • [14] Gutub A, Alkhodaidi T. “Smart expansion of target key for more handlers to access multimedia counting-based secret sharing”. Multimedia Tools and Applications, 2020. https://doi.org/10.1007/s11042-020-08695-y.
  • [15] Nejad MY, Mosleh M, Heikalabad, SR. “An enhanced LSB-based quantum audio watermarking scheme for nano communication networks”. Multimedia Tools and Applications, 79, 26489-26515, 2020.
  • [16] Nejad MY, Mosleh M, Heikalabad SR. “An LSB-Based quantum audio watermarking using MSB as arbiter”. International Journal of Theoretical Physics, 58, 3828-3851, 2019.
  • [17] Nejad MY, Mosleh M, Heikalabad SR. “An enhanced LSBbased quantum audio watermarking scheme for nano communication networks”. Multimedia Tools and Applications, 79, 26489-26515, 2020.
  • [18] Bajpai J, Kaur A. “A literature survey-various audio watermarking techniques and their challenges”. IEEE International Conference-Cloud System and Big Data Engineering (Confluence), Noida, India, 14-15 January 2016.
  • [19] Al-Ghamdi M, Al-Ghamdi M, Gutub A. “Security enhancement of shares generation process for multimedia counting-based secret-sharing technique”. Multimedia Tools and Applications, 78, 16283-16310, 2019.
  • [20] Gutub A, Alaseri K. “Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing”. Journal King Saud University-Computer and Information Sciences, 2019. https://doi.org/10.1016/j.jksuci.2019.06.014.
  • [21] Gutub A, Al-Qurashi A. “Secure shares generation via mblocks partitioning for counting-based secret sharing”. Journal of Engineering Research, 8(3), 91-117, 2020.
  • [22] Gutub A, Al-Ghamdi M. “Image based steganography to facilitate ımproving counting-based secret sharing”. 3D Research, 2019. http://doi.org/10.1007/s13319-019- 0216-0.
  • [23] AlKhodaidi T, Gutub A. “Refining image steganography distribution for higher security multimedia countingbased secret-sharing”. Multimedia Tools and Applications, 2020. http://doi.org/10.1007/s11042-020-09720-w.
  • [24] Deshmukh R, Deshmukh P. “4 Layer enhanced security for audio signals using steganography by modified lsb algorithm and strong encryption key”. International Journal of Advanced Research in Computer Science, 2(2), 492-495, 2011.
  • [25] Ravali S, Neelima P, Sruthi P, Sai Dileep P, Manasa B. “Implementation of blowfish algorithm for efficient data hiding in audio”. International Journal of Computer Science and Information Technologies, 5(1), 748-750, 2014.
  • [26] Asad M, Gilani J, Khalid A. “An enhanced least significant bit modification technique for audio steganography”. IEEE International Conference on Computer Networks and Information Technology (ICCNIT), Abbottabad, Pakistan, 11-13 July 2011.
  • [27] Shaikh A, Solanki K, Uttekar V, Vishwakarma N. “Audio steganography and security using cryptography”. International Journal of Emerging Technology and Advanced Engineering, 4(2), 317-318, 2014.
  • [28] Padmashree G, Venugopala PS. “Audio steganography and cryptography: Using LSB algorithm at 4th and 5th LSB layers”. International Journal of Engineering and Innovative Technology (IJEIT), 2(4), 177-181, 2012.
  • [29] Saurabh J, Ambhaikar A. “Audio steganography using RPrime RSA and GA based LSB algorithm to enhance security”. International Journal of Science and Research (IJSR), 1(2), 62-65, 2012.
  • [30] Gutub A. “Pixel ındicator technique for RGB image steganography”. Journal of Emerging Technologies in Web Intelligence (JETWI), 2(1), 56-64, 2010.
  • [31] Swain, G. “Digital image steganography using variable length group of bits substitution”. Procedia Computer Science, 85, 31-38, 2016.
  • [32] Swain, G. "High capacity ımage steganography using modified LSB substitution and PVD against pixel difference histogram analysis". Security and Communication Networks, 2018. https://doi.org/10.1155/2018/1505896.
  • [33] Pradhan A, Sekhar K, Swain G. "Digital ımage steganography using LSB Substitution, PVD, and EMD". Mathematical Problems in Engineering, 2018. https://doi.org/10.1155/2018/1804953.
  • [34] Swain G. “Adaptive and Non-adaptive PVD steganography using overlapped pixel blocks”. Arabian Journal of Science and Engineering, 43, 7549-7562, 2018.
  • [35] Gutub A. “Merging GF(p) elliptic curve point adding and doubling on pipelined VLSI cryptographic ASIC architecture”. International Journal of Computer Science and Network Security (IJCSNS), 6(3A), 44-52, 2006.
  • [36] Bin-Hureib E, Gutub A. “Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography”. International Journal of Computer Science and Network Security (IJCSNS), 20(12), 232-241, 2020.
  • [37] Abu-Hashem M, Gutub A. “Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology”. CAAI Transactions on Intelligence Technology, IET (IEE)-Wiely, 2021. http://doi.org/10.1049/cit2.12070.
  • [38] Shambour MK, Gutub A. “Progress of IoT Research Technologies and Applications Serving Hajj and Umrah”. Arabian Journal for Science and Engineering, 2021. http://doi.org/10.1007/s13369-021-05838-7.
  • [39] Shambour MK, Gutub A. "Personal privacy evaluation of smart devices applications serving hajj and umrah rituals". Journal of Engineering Research, 2021. http://doi.org/10.36909/jer.13199.

Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing

Year 2022, Volume: 28 Issue: 2, 324 - 332, 30.04.2022

Abstract

Watermarking is the process of embedding specific data to prove ownership copyright authentication. It is needed whenever media-files are used without proper permission is granted for authentication accuracy. The current watermarking challenge comes from the ownership proof especially as slight tampering occurs on the audio multimedia file which injure the watermarking causing difficulty in its copyright proof. This paper proposes utilizing counting-based secret sharing strategy to allow validation of ownership correctness watermarking even if some of the multimedia audio-file is interfered, as semi-authentication. The research testing run experimentations showed interesting features although this work is still in its early stage. The authentication verification researched secrecy on the audio’s media remarked data altered as on LSB 3 models (1-LSB, 2-LSB, 3-LSB) testing hiding capacity capability as well as PSNR security. Its promising investigation revealed complete data dependency consequences showing real attractive contribution opportunities to be remarked.

References

  • [1] Gutub A.“Watermarking ımages via counting-based secret sharing for lightweight semi-complete authentication”. International Journal of Information Security and Privacy (IJISP), 2022. http://doi.org/10.4018/IJISP.2022010118.
  • [2] Almazrooie M, Samsudin A, Gutub A, Salleh MS, Omar MA, Hassan SA. “Integrity verification for digital Holy Quran verses using cryptographic hash function and compression”. Journal of King Saud University-Computer and Information Sciences, 32(1), 24-34, 2020.
  • [3] Liang X, Xiang S. “Robust reversible audio watermarking based on high-order difference statistics”. Signal Processing, 2020. http://doi.org/10.1016/j.sigpro.2020. 107584.
  • [4] Gutub A, Ghouti L, Amin A, Alkharobi T, Ibrahim MK. “Utilizing extension character ‘kashida’ with pointed letters for arabic text digital watermarking”. International Conference on Security and Cryptography (SECRYPT), Barcelona, Spain, 28-31 July 2007.
  • [5] Gutub A, Al-Haidari F, Al-Kahsah K, Hamodi J. “e-Text watermarking: utilizing 'kashida' extensions in arabic language electronic writing”. Journal of Emerging Technologies in Web Intelligence (JETWI), 2(1), 48-55, 2010.
  • [6] Gutub A, Al-Juaid N, Khan E. “Counting-Based secret sharing technique for multimedia applications”. Multimedia Tools and Applications, 78(5), 5591-5619, 2019.
  • [7] AlKhodaidi T, Gutub A. “Trustworthy target key alteration helping counting-based secret sharing applicability”. Arabian Journal for Science and Engineering, 45, 3403-3423, 2020.
  • [8] Shuo Li, Zhanjie Song, Wenhuan Lu, Daniel Sun, Jianguo Wei. “Parameterization of LSB in self-recovery speech watermarking framework in big data mining”. Security and Communication Networks, 2017. http://doi.org/10.1155/2017/3847092.
  • [9] Gutub A, Al-Ghamdi M. “Hiding shares by multimedia ımage steganography for optimized counting-based secret sharing”. Multimedia Tools and Applications, 79(11), 7951-7985, 2020.
  • [10] Gutub A, Alaseri K. “Hiding shares of counting-based secret sharing via arabic text steganography for personal usage”. Arabian Journal for Science and Engineering, 45(4), 2433-2458, 2020.
  • [11] Richard Popa. An Analysis of Steganogrphic Techniques. Master Thesis, Department of Computer Science and Software Engineering, Faculty of Automatics and Computers, The Politehnica University of Timisoara, 1998.
  • [12] Gutub A, Fattani M. “A novel arabic text steganography method using letter points and extensions”. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 1(3), 502-505, 2007.
  • [13] Al-Nofaie S, Gutub A, Al-Ghamdi M. “Enhancing arabic text steganography for personal usage utilizing pseudospaces”. Journal King Saud University-Computer and Information Sciences, 2019.
  • [14] Gutub A, Alkhodaidi T. “Smart expansion of target key for more handlers to access multimedia counting-based secret sharing”. Multimedia Tools and Applications, 2020. https://doi.org/10.1007/s11042-020-08695-y.
  • [15] Nejad MY, Mosleh M, Heikalabad, SR. “An enhanced LSB-based quantum audio watermarking scheme for nano communication networks”. Multimedia Tools and Applications, 79, 26489-26515, 2020.
  • [16] Nejad MY, Mosleh M, Heikalabad SR. “An LSB-Based quantum audio watermarking using MSB as arbiter”. International Journal of Theoretical Physics, 58, 3828-3851, 2019.
  • [17] Nejad MY, Mosleh M, Heikalabad SR. “An enhanced LSBbased quantum audio watermarking scheme for nano communication networks”. Multimedia Tools and Applications, 79, 26489-26515, 2020.
  • [18] Bajpai J, Kaur A. “A literature survey-various audio watermarking techniques and their challenges”. IEEE International Conference-Cloud System and Big Data Engineering (Confluence), Noida, India, 14-15 January 2016.
  • [19] Al-Ghamdi M, Al-Ghamdi M, Gutub A. “Security enhancement of shares generation process for multimedia counting-based secret-sharing technique”. Multimedia Tools and Applications, 78, 16283-16310, 2019.
  • [20] Gutub A, Alaseri K. “Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing”. Journal King Saud University-Computer and Information Sciences, 2019. https://doi.org/10.1016/j.jksuci.2019.06.014.
  • [21] Gutub A, Al-Qurashi A. “Secure shares generation via mblocks partitioning for counting-based secret sharing”. Journal of Engineering Research, 8(3), 91-117, 2020.
  • [22] Gutub A, Al-Ghamdi M. “Image based steganography to facilitate ımproving counting-based secret sharing”. 3D Research, 2019. http://doi.org/10.1007/s13319-019- 0216-0.
  • [23] AlKhodaidi T, Gutub A. “Refining image steganography distribution for higher security multimedia countingbased secret-sharing”. Multimedia Tools and Applications, 2020. http://doi.org/10.1007/s11042-020-09720-w.
  • [24] Deshmukh R, Deshmukh P. “4 Layer enhanced security for audio signals using steganography by modified lsb algorithm and strong encryption key”. International Journal of Advanced Research in Computer Science, 2(2), 492-495, 2011.
  • [25] Ravali S, Neelima P, Sruthi P, Sai Dileep P, Manasa B. “Implementation of blowfish algorithm for efficient data hiding in audio”. International Journal of Computer Science and Information Technologies, 5(1), 748-750, 2014.
  • [26] Asad M, Gilani J, Khalid A. “An enhanced least significant bit modification technique for audio steganography”. IEEE International Conference on Computer Networks and Information Technology (ICCNIT), Abbottabad, Pakistan, 11-13 July 2011.
  • [27] Shaikh A, Solanki K, Uttekar V, Vishwakarma N. “Audio steganography and security using cryptography”. International Journal of Emerging Technology and Advanced Engineering, 4(2), 317-318, 2014.
  • [28] Padmashree G, Venugopala PS. “Audio steganography and cryptography: Using LSB algorithm at 4th and 5th LSB layers”. International Journal of Engineering and Innovative Technology (IJEIT), 2(4), 177-181, 2012.
  • [29] Saurabh J, Ambhaikar A. “Audio steganography using RPrime RSA and GA based LSB algorithm to enhance security”. International Journal of Science and Research (IJSR), 1(2), 62-65, 2012.
  • [30] Gutub A. “Pixel ındicator technique for RGB image steganography”. Journal of Emerging Technologies in Web Intelligence (JETWI), 2(1), 56-64, 2010.
  • [31] Swain, G. “Digital image steganography using variable length group of bits substitution”. Procedia Computer Science, 85, 31-38, 2016.
  • [32] Swain, G. "High capacity ımage steganography using modified LSB substitution and PVD against pixel difference histogram analysis". Security and Communication Networks, 2018. https://doi.org/10.1155/2018/1505896.
  • [33] Pradhan A, Sekhar K, Swain G. "Digital ımage steganography using LSB Substitution, PVD, and EMD". Mathematical Problems in Engineering, 2018. https://doi.org/10.1155/2018/1804953.
  • [34] Swain G. “Adaptive and Non-adaptive PVD steganography using overlapped pixel blocks”. Arabian Journal of Science and Engineering, 43, 7549-7562, 2018.
  • [35] Gutub A. “Merging GF(p) elliptic curve point adding and doubling on pipelined VLSI cryptographic ASIC architecture”. International Journal of Computer Science and Network Security (IJCSNS), 6(3A), 44-52, 2006.
  • [36] Bin-Hureib E, Gutub A. “Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography”. International Journal of Computer Science and Network Security (IJCSNS), 20(12), 232-241, 2020.
  • [37] Abu-Hashem M, Gutub A. “Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology”. CAAI Transactions on Intelligence Technology, IET (IEE)-Wiely, 2021. http://doi.org/10.1049/cit2.12070.
  • [38] Shambour MK, Gutub A. “Progress of IoT Research Technologies and Applications Serving Hajj and Umrah”. Arabian Journal for Science and Engineering, 2021. http://doi.org/10.1007/s13369-021-05838-7.
  • [39] Shambour MK, Gutub A. "Personal privacy evaluation of smart devices applications serving hajj and umrah rituals". Journal of Engineering Research, 2021. http://doi.org/10.36909/jer.13199.
There are 39 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Elektrik Elektornik Müh. / Bilgisayar Müh.
Authors

Adnan Gutub This is me

Publication Date April 30, 2022
Published in Issue Year 2022 Volume: 28 Issue: 2

Cite

APA Gutub, A. (2022). Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, 28(2), 324-332.
AMA Gutub A. Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi. April 2022;28(2):324-332.
Chicago Gutub, Adnan. “Regulating Watermarking Semi-Authentication of Multimedia Audio via Counting-Based Secret Sharing”. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi 28, no. 2 (April 2022): 324-32.
EndNote Gutub A (April 1, 2022) Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi 28 2 324–332.
IEEE A. Gutub, “Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing”, Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, vol. 28, no. 2, pp. 324–332, 2022.
ISNAD Gutub, Adnan. “Regulating Watermarking Semi-Authentication of Multimedia Audio via Counting-Based Secret Sharing”. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi 28/2 (April 2022), 324-332.
JAMA Gutub A. Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi. 2022;28:324–332.
MLA Gutub, Adnan. “Regulating Watermarking Semi-Authentication of Multimedia Audio via Counting-Based Secret Sharing”. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, vol. 28, no. 2, 2022, pp. 324-32.
Vancouver Gutub A. Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi. 2022;28(2):324-32.

ESCI_LOGO.png    image001.gif    image002.gif        image003.gif     image004.gif