Research Article
BibTex RIS Cite

Digital Image as a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information

Year 2025, EARLY VIEW, 1 - 1
https://doi.org/10.2339/politeknik.1567237

Abstract

The widespread use of the Internet and the ability of data transfer between different types of devices have caused intense multimedia traffic today. More than a hundred thousand image files are transferred per second on Meta group social media platforms alone. In particular, multimedia objects that directly target human perception such as images, audio, and video can be used as cyber spies on the network. Steganography methods are generally used for this. This study proposes an alternative digital image steganography method. The proposed method works in both the frequency domain and bit plane slicing methods, which is unusual. Gray coding is applied to the secret data to obtain minimum entropy. The results of the method are presented with surface graphics and tables by performing many iterations on different gray code lengths and different bit planes. Steganalysis tests have been performed for the applicability of the method in the real world and the results are shown. The method has been compared with some methods in the literature in terms of imperceptibility, robustness, and data load. Despite the high data load, higher scores were obtained than similar methods in structural and perceptual mathematical tests.

References

  • [1] Apau R., Koranteng F.N., Gyamfi S.A, “Cyber-crime and its effects on E-commerce technologies”, Journal of Information, (5)1: 39–59, (2019).
  • [2] Park H.S., “Technology convergence, open innovation, and dynamic economy”, Journal of Open Innovation: Technology, Market, and Complexity, (3)4: 24, (2017).
  • [3] Norquay, J. 2023, “How Many Emails Are Sent Per Day In 2024?”, [Online] https://prosperitymedia.com.au/how-many-emails-are-sent-per-day-in-2024, (2024).
  • [4] Aslam S., “80+ Facebook Statistics You Need to Know in 2023—Omnicore.” [Online] https://www.omnicoreagency.com/facebook-statistics/, (2023).
  • [5] Aslam, S. “Instagram by the Numbers: Stats, Demographics & Fun Facts”, [Online] https://www.omnicoreagency.com/instagram-statistics/, (2024).
  • [6] Duarte, F., “Amount of Data Created Daily”, J [Online] https://explodingtopics.com/blog/data-generated-per-day, (2024).
  • [7] Waseso B.M.P., Setiyanto N.A., “Web phishing classification using combined machine learning methods”, Journal of Computing Theories and Applications, (1)1: 11–18, (2023).
  • [8] Sakr, H.A., El-Afifi, M.I. “A Framework for Confidential Document Leakage Detection and Prevention”, Nile Journal of Communication & Computer Science, (7), (2024).
  • [9] Apau R., Asante M., Twum F., Ben Hayfron-Acquah J., Peasah K.O., “Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review”, PLoS ONE, 19(9), (2024).
  • [10] Gautam, D., Agrawal, C., Sharma, P., Mehta M., Saini, P., "An Enhanced Cipher Technique Using Vigenère and Modified Caesar Cipher," 2nd International Conference on Trends in Electronics and Informatics, Tirunelveli, India, 1-9, (2018).
  • [11] Qadir A.M., Varol N., “A review paper on cryptography,” 7th International Symposium on Digital Forensics and Security, 1–6, (2019).
  • [12] Sahu A.K., Sahu M., “Digital image steganography and steganalysis: A journey of the past three decades,” Open Computer Science, (10)1: 296–342, (2020).
  • [13] Stallings W. Brown L., “Computer security: principles and practice”. Upper Saddle River: Pearson Education, IV. Edition, ISBN: 978-0133773927, England, (2017).
  • [14] Al-Batah, M.S., Alzboon, M.S., Alzyoud, M., Al-Shanableh, N. “Enhancing Image Cryptography Performance with Block Left Rotation Operations”, Applied Computational Intelligence and Soft Computing, (2024)1: 1-19, (2024).
  • [15] Westfeld, A., “Steganalysis in the Presence of Weak Cryptography and Encoding”, 5th International Workshop, Jeju Island, Korea, 19-35, (2006).
  • [16] Kour J., Verma, D., “Steganography Techniques – A Review Paper”, International Journal of Emerging Research in Management &Technology, 3(5): 132-135, (2014).
  • [17] Macit, H.B., Koyun, A., Güngör, O., “A Review and Comparison of Steganography Techniques”, 4’th International Academic Research Congress, Alanya, Türkiye, 37-44, (2018).
  • [18] Kurnaz H., "Hibrit Yaklaşımlı Yeni Bir Seganografi Yönteminin Geliştirilmesi," M.S. thesis, Kocaeli University, Institute of Science, (2019).
  • [19] Chaum D., “Untraceable Electronic Mail, Return DWTresses and Digital Pseudonyms”, Communications of the ACM, 24(2), 84-88, (1981).
  • [20] Jayaram, P., Ranganatha, H.R., Anupama, H.S. “Information Hiding Using Audio Steganography – A Survey”, The International Journal of Multimedia & Its Applications, (3)3: 86-96, (2011).
  • [21] Macit, H.B., “The Effect of Resolution and Watermark Strength on Multi-level DWT Image Watermarking”, Düzce Üniversitesi Bilim ve Teknoloji Dergisi, (12)2: 1178-1191, (2024).
  • [22] Kutucu, H., Dişli, A., Akça, M., “Çok Katmanlı Steganografi Tekniği Kullanılarak Mobil Cihazlara Haberleşme Uygulaması”, Akademik Bilişim Konferansı, Eskişehir, Türkiye, 672-678, (2015).
  • [23] Liu, B., Xu, E., Wang, J., Wei, Z., Xu, L., Zhao, B., Su, J., “Thwarting Audio Steganography Attacks in Cloud Storage Systems”, International Conference on Cloud and Service Computing, Hong Kong, 259-265, (2011).
  • [24] Rabah, K. “Steganography – The Art of Hiding Data”, Information Technology Journal, 3(3): 245-269, (2004).
  • [25] Cachin, C., “An information-theoretic model for steganography”, Information Hiding 2nd International Workshop, New York, 306–318, (1998).
  • [26] Rachid, R.S., “Binary Image Watermarking on Audio Signal Using Wavelet Transform”, M.S. thesis, Çankaya University, Institute of Science, (2014).
  • [27] Şener, D., Güney, S. “Enhancing Steganography in 256×256 Colored Images with U-Net: A Study on PSNR and SSIM Metrics with Variable-Sized Hidden Images”, Review of Computer Engineering Studies, (11)2: 13-29, (2024).
  • [28] Poornima R., Iswarya R.J., “An overview of digital image steganography”, International Journal of Computer Science & Engineering Survey, (4)1: 23–31, (2013).
  • [29] Özdemir B., Doğan N., “Data hiding to the image with bit plane slicing and double XOR”, MANAS Journal of Engineering, (10)1: 66-72, (2022).
  • [30] Jebur, S.A., Nawar, A.K., Kadhim, L.E., Jahefer, M.M. “Hiding Information in Digital Images Using LSB Steganography Technique”, International Journal of Interactive Mobile Technologies, 17(7): 167-178, (2023).
  • [31] Akbar S., Rao K.N., Anand T., “Bit-Plane Slicing Algorithm for Crime Data Security Using Fusion Technologies”, International Journal of Recent Technology and Engineering, (7): 323-325, (2019).
  • [32] Abdülkhaev, A., “A New Approach for Video Watermarking”, M.S. thesis, Gaziantep University, Institute of Science, (2016).
  • [33] Patel, M., Sajja, P.S., Sheth, R., “Analysis and Survey of Digital Watermarking Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, (3)10: 203-210, (2013).
  • [34] Araghi, T.K., Megías, D. “Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking”, Multimed Tools App, (83): 3895–3916, (2024).
  • [35] Pereira, S., Voloshyoskiy, Y., Pun, T., “Optimal transform domain watermark embedding via linear programming”, Signal Process, (81)6: 1251-1260, (2001).
  • [36] Hsieh, M., Tseng, D., Huang, Y., “Hiding Digital Watermarks Using Multiresolution Wavelet Transform”, IEEE Trans. on Industrial Electronics, 48(5): 875-882, (2001).
  • [37] Xia, X.G., Boncelet, C.G., Arce, G.R., “A multiresolution watermark for digital images”, IEEE International Conference on Image Processing, Santa Barbara, USA, 548-551, (1997).
  • [38] Yavuz, E., “Duruk İmgelerde Damgalama ve Veri Saklama”, PhD. thesis, Ankara University, Institute of Science, (2008).
  • [39] Abd-El-Atty, B., El-Affendi, M., El-Latif, A.A.A., “A novel image cryptosystem using Gray code, quantum walks, and Henon map for cloud applications”, Complex & Intelligent Systems, (9): 609–624, (2023).
  • [40] Ngyuen, B.C., Yoon, S.M., Lww, H.K., “Multi Bit Plane Image Steganography”, 5th International Workshop, Jeju Island, Korea, 8-10, (2006).
  • [41] Qi, W. Liu, Y., Sirui, G., Wang, X., Guo, Z. “An Adaptive Visible Watermark Embedding Method based on Region Selection”, Security and Communication Networks, (2021), 1-11, (2021).
  • [42] Mannepalli, P.K., Richhariya, V., Gupta, S.K. “A robust blockchain-based watermarking using edge detection and wavelet transform”, Multimed Tools Appl, (2024).
  • [43] Dinçer G., Entropi Kavramının İstatistikteki Bazı Uygulamaları, M.S. thesis, Yıldız Teknik University, Institute of Science, (2015).
  • [44] Shannon, C.E., “A mathematical theory of communication”, Bell Systems Technology Journal, (27): 379-423, (1948).
  • [45] Pal, N.R., Pal, S.K., “Entropy: A New Definition And Its Applications”, IEEE Transactions on Systems, Man and Cybernetics, (21)5: 1260-1270, (1991).
  • [46] Farrell, J. E., “Image quality evaluation in colour imaging: vision and technology”, Eds: MacDonald, L.W., Luo, M.R., John Wiley, Stanford, (1999).
  • [47] Cadik, M., Slavik, P., “Evaluation of two principal approaches to objective image quality assessment”, 8th International Conference on Information Visualisation, North Carolina, 513-551, (2004).
  • [48] Hore, A., Ziou, D., “Image quality metrics: PSNR vs. SSIM”, International Conference on Pattern Recognition, İstanbul, Türkiye, 2366-2369, (2010).
  • [49] Wang, Z., Bovik, A. C., Sheikh, H. R., Simoncelli, E. P., “Image quality assessment: from error visibility to structural similarity”, IEEE Transactions on Image Processing, (13)4: 600-612, (2004).
  • [50] Setiadi, D.R.I.M., Rustad, S., Andono, P.N., Shidik G.F., “Graded fuzzy edge detection for imperceptibility optimization of image steganography”, The Imaging Science Journal, (72)6: 693-705, (2024).
  • [51] Saeidi, Z., Yazdi, A., Mashhadi, S., Hadian, M. Gutub, A., “High performance image steganography integrating IWT and Hamming code within secret sharing”, IET Image Process, (2024)18: 129–139, (2024).
  • [52] Pramanik, S., “An adaptive image steganography approach depending on integer wavelet transform and genetic algorithm”, Multimed Tools App, (82): 34287–34319, (2023).
  • [53] Prasad, S. Pal, A.K., Mukherjee, S., “An RGB Color Image Steganography Scheme by Binary Lower Triangular Matrix”, IEEE Transactions on Intelligent Transportation Systems, (24)7: 6865-6873, (2023).
  • [54] Dumre, R., Dave, A., “Exploring LSB Steganography Possibilities in RGB Images”, 12th International Conference on Computing Communication and Networking Technologies, Kharagpur, India, 1-7, (2021).
  • [55] Abdel-aziz, M.M., Hosny, K.M., Lashin, N.A., “Improved data hiding method for securing color images”, Multimed Tools Appl, (80): 12641–12670, (2021).
  • [56] Kareem, H.R., Madhi, H.H., Mutlaq, KA., “Hiding encrypted text in image steganography”, Periodicals of Engineering and Natural Sciences (8)2, pp. 703–707, (2020).
  • [57] Pak, C. Kim, J. An. K., Kim, C., Kim, K., “A novel color image LSB steganography using improved 1D chaotic map”, Multimed Tools Appl, (79): 1409–1425, (2020).
  • [58] Rahman, S., Masood F., Khan, W.U., Ullah, N., Khan, F.Q., Tsaramirsis, G., Jan, S., Ashraf, “A Novel Approach of Image Steganography for Secure Communication Based on LSwB Substitution Technique”, Computers, Materials & Continua, (64)1: 31–61, (2020).
  • [59] Calanda, F.B., Sison, A.M., Molato, M.R.D., Medina, R.P., “A Modified Least Significant Bit Randomized Embedding Method based on Image Partitioning and Columnar Transposition with Encryption”, 2nd International Conference on Computing and Big Data, New York, 68–72, (2019).
  • [60] Solak, S., Altınışık, U., “A New Approach for Steganography: Bit Shifting Operation of Encrypted Data in LSB (SED-LSB)”, J Inf Tech, (12)1: 75–82, (2019).
  • [61] Setyono, A., Ignatius, D.R., Setiadi, M., “Securing and Hiding Secret Message in Image using XOR Transposition Encryption and LSB Method”, Journal of Physics, (1196): 1-6, (2019).
  • [62] Mukherjee, S., Sanyal, G., “A chaos based image steganographic system”, Multimed Tools Appl, (77)21: 27851–27876, (2018).
  • [63] Rajput G.G., Chavan R., “A Novel Approach for Image Steganography Based On Random LSB Insertion in Color Images”, International Conference on Intelligent Computing Systems, Tamilnadu, India, 265–273, (2017).
  • [64] Chauhan, S., Jyotsna, Kumar, J., Doegar, A., “Multiple layer Text security using Variable block size Cryptography and Image Steganography”, 3rd International Conference on Computational Intelligence & Communication Technology, Ghaziabad, India, 1-7, (2017).
  • [65] Dagar, S., “Highly Randomized Image Steganography using Secret Keys”, IEEE International Conference on Recent Advances and Innovations in Engineering, Jaipur, India, 1-5, (2014).
  • [66] Jaradat, A., Taqieddin, E., Mowafi, M., "A high-capacity image steganography method using chaotic particle swarm optimization", Hindawi Security and Communication Networks, (2021)1, 1-11, (2021).
  • [67] Babu, A.R., Al-Fatlawy, R.R., Veeranjaneyulu, K., Kumar, K.S., "Canonical Huffman Coding (CHC) - Discrete Wavelet Transform (DWT) Method for Image Steganography," 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), Raichur, India, 1-4, (2024).
  • [68] Yassin, N.I.R., El-Houby, E.M.F., "Image Steganography Technique Based on Integer Wavelet Transform Using Most Significant Bit Categories." International Journal of Intelligent Engineering & Systems, (15)1, 499-508, (2022).
  • [69] Fridrich, J., Goljan, M., Du, R., “Reliable Detection of LSB Steganography in Color and Grayscale Images”, ACM Workshop on Multimedia and Security, Ottawa, Canada, 27-30, (2001).
  • [70] Hassan, M.D., Amin, M.A.M., Mahdi, S.T., "Steganalysis Techniques and Comparison of Available Softwares", Proceedings of the 1st International Multi-Disciplinary Conference Theme: Sustainable Development and Smart Planning, IMDC-SDSP-2020, (2020).

Bir Siber Casus Olarak Dijital Görüntü: Gizli Bilgileri Aktarmak İçin Gri Kodlu Güvenli Bir Model

Year 2025, EARLY VIEW, 1 - 1
https://doi.org/10.2339/politeknik.1567237

Abstract

İnternetin yaygınlaşması ve veri transferinin farklı türde cihazlar arasında da gerçekleştirilebilir olması, günümüzde yoğun bir multimedya trafiğinin oluşmasına neden olmuştur. Yalnızca Meta grubuna bağlı sosyal medya platformlarında saniyede yüz binden fazla statik görüntü dosyası transferi gerçekleşmektedir. Özellikle görüntü, ses, video gibi doğrudan insan algısını hedef alan multimedya nesneleri ağ üzerinde birer siber casus olarak kullanılabilmektedir. Bunun için genellikle steganografi yöntemleri kullanılır. Bu çalışma, alternatif bir dijital görüntü steganografisi yöntemi önermektedir. Önerilen yöntem, alışılmışın dışında hem frekans alanında hem de bit düzlemi dilimleme yöntemi ile çalışmaktadır. Gizli veriye, minimum entropi elde etmek için gray kodlaması uygulanmıştır. Yöntemin sonuçları, farklı gray kodu uzunlukları ve farklı bit düzlemi dilimleri üzerinde çok sayıda iterasyon gerçekleştirerek yüzey grafikleri ve tablolar ile sunulmuştur. Yöntemin gerçek dünyada uygulanabilirliği için steganaliz testleri yapılmış ve sonuçları gösterilmiştir. Yöntem algılanamazlık, sağlamlık ve veri yükü açısından literatürdeki bazı yöntemlerle kıyaslanmıştır. Yüksek veri yüküne rağmen, yapısal ve algısal matematiksel testlerde benzer yöntemlerden daha yüksek skorlar elde edilmiştir.

References

  • [1] Apau R., Koranteng F.N., Gyamfi S.A, “Cyber-crime and its effects on E-commerce technologies”, Journal of Information, (5)1: 39–59, (2019).
  • [2] Park H.S., “Technology convergence, open innovation, and dynamic economy”, Journal of Open Innovation: Technology, Market, and Complexity, (3)4: 24, (2017).
  • [3] Norquay, J. 2023, “How Many Emails Are Sent Per Day In 2024?”, [Online] https://prosperitymedia.com.au/how-many-emails-are-sent-per-day-in-2024, (2024).
  • [4] Aslam S., “80+ Facebook Statistics You Need to Know in 2023—Omnicore.” [Online] https://www.omnicoreagency.com/facebook-statistics/, (2023).
  • [5] Aslam, S. “Instagram by the Numbers: Stats, Demographics & Fun Facts”, [Online] https://www.omnicoreagency.com/instagram-statistics/, (2024).
  • [6] Duarte, F., “Amount of Data Created Daily”, J [Online] https://explodingtopics.com/blog/data-generated-per-day, (2024).
  • [7] Waseso B.M.P., Setiyanto N.A., “Web phishing classification using combined machine learning methods”, Journal of Computing Theories and Applications, (1)1: 11–18, (2023).
  • [8] Sakr, H.A., El-Afifi, M.I. “A Framework for Confidential Document Leakage Detection and Prevention”, Nile Journal of Communication & Computer Science, (7), (2024).
  • [9] Apau R., Asante M., Twum F., Ben Hayfron-Acquah J., Peasah K.O., “Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review”, PLoS ONE, 19(9), (2024).
  • [10] Gautam, D., Agrawal, C., Sharma, P., Mehta M., Saini, P., "An Enhanced Cipher Technique Using Vigenère and Modified Caesar Cipher," 2nd International Conference on Trends in Electronics and Informatics, Tirunelveli, India, 1-9, (2018).
  • [11] Qadir A.M., Varol N., “A review paper on cryptography,” 7th International Symposium on Digital Forensics and Security, 1–6, (2019).
  • [12] Sahu A.K., Sahu M., “Digital image steganography and steganalysis: A journey of the past three decades,” Open Computer Science, (10)1: 296–342, (2020).
  • [13] Stallings W. Brown L., “Computer security: principles and practice”. Upper Saddle River: Pearson Education, IV. Edition, ISBN: 978-0133773927, England, (2017).
  • [14] Al-Batah, M.S., Alzboon, M.S., Alzyoud, M., Al-Shanableh, N. “Enhancing Image Cryptography Performance with Block Left Rotation Operations”, Applied Computational Intelligence and Soft Computing, (2024)1: 1-19, (2024).
  • [15] Westfeld, A., “Steganalysis in the Presence of Weak Cryptography and Encoding”, 5th International Workshop, Jeju Island, Korea, 19-35, (2006).
  • [16] Kour J., Verma, D., “Steganography Techniques – A Review Paper”, International Journal of Emerging Research in Management &Technology, 3(5): 132-135, (2014).
  • [17] Macit, H.B., Koyun, A., Güngör, O., “A Review and Comparison of Steganography Techniques”, 4’th International Academic Research Congress, Alanya, Türkiye, 37-44, (2018).
  • [18] Kurnaz H., "Hibrit Yaklaşımlı Yeni Bir Seganografi Yönteminin Geliştirilmesi," M.S. thesis, Kocaeli University, Institute of Science, (2019).
  • [19] Chaum D., “Untraceable Electronic Mail, Return DWTresses and Digital Pseudonyms”, Communications of the ACM, 24(2), 84-88, (1981).
  • [20] Jayaram, P., Ranganatha, H.R., Anupama, H.S. “Information Hiding Using Audio Steganography – A Survey”, The International Journal of Multimedia & Its Applications, (3)3: 86-96, (2011).
  • [21] Macit, H.B., “The Effect of Resolution and Watermark Strength on Multi-level DWT Image Watermarking”, Düzce Üniversitesi Bilim ve Teknoloji Dergisi, (12)2: 1178-1191, (2024).
  • [22] Kutucu, H., Dişli, A., Akça, M., “Çok Katmanlı Steganografi Tekniği Kullanılarak Mobil Cihazlara Haberleşme Uygulaması”, Akademik Bilişim Konferansı, Eskişehir, Türkiye, 672-678, (2015).
  • [23] Liu, B., Xu, E., Wang, J., Wei, Z., Xu, L., Zhao, B., Su, J., “Thwarting Audio Steganography Attacks in Cloud Storage Systems”, International Conference on Cloud and Service Computing, Hong Kong, 259-265, (2011).
  • [24] Rabah, K. “Steganography – The Art of Hiding Data”, Information Technology Journal, 3(3): 245-269, (2004).
  • [25] Cachin, C., “An information-theoretic model for steganography”, Information Hiding 2nd International Workshop, New York, 306–318, (1998).
  • [26] Rachid, R.S., “Binary Image Watermarking on Audio Signal Using Wavelet Transform”, M.S. thesis, Çankaya University, Institute of Science, (2014).
  • [27] Şener, D., Güney, S. “Enhancing Steganography in 256×256 Colored Images with U-Net: A Study on PSNR and SSIM Metrics with Variable-Sized Hidden Images”, Review of Computer Engineering Studies, (11)2: 13-29, (2024).
  • [28] Poornima R., Iswarya R.J., “An overview of digital image steganography”, International Journal of Computer Science & Engineering Survey, (4)1: 23–31, (2013).
  • [29] Özdemir B., Doğan N., “Data hiding to the image with bit plane slicing and double XOR”, MANAS Journal of Engineering, (10)1: 66-72, (2022).
  • [30] Jebur, S.A., Nawar, A.K., Kadhim, L.E., Jahefer, M.M. “Hiding Information in Digital Images Using LSB Steganography Technique”, International Journal of Interactive Mobile Technologies, 17(7): 167-178, (2023).
  • [31] Akbar S., Rao K.N., Anand T., “Bit-Plane Slicing Algorithm for Crime Data Security Using Fusion Technologies”, International Journal of Recent Technology and Engineering, (7): 323-325, (2019).
  • [32] Abdülkhaev, A., “A New Approach for Video Watermarking”, M.S. thesis, Gaziantep University, Institute of Science, (2016).
  • [33] Patel, M., Sajja, P.S., Sheth, R., “Analysis and Survey of Digital Watermarking Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, (3)10: 203-210, (2013).
  • [34] Araghi, T.K., Megías, D. “Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking”, Multimed Tools App, (83): 3895–3916, (2024).
  • [35] Pereira, S., Voloshyoskiy, Y., Pun, T., “Optimal transform domain watermark embedding via linear programming”, Signal Process, (81)6: 1251-1260, (2001).
  • [36] Hsieh, M., Tseng, D., Huang, Y., “Hiding Digital Watermarks Using Multiresolution Wavelet Transform”, IEEE Trans. on Industrial Electronics, 48(5): 875-882, (2001).
  • [37] Xia, X.G., Boncelet, C.G., Arce, G.R., “A multiresolution watermark for digital images”, IEEE International Conference on Image Processing, Santa Barbara, USA, 548-551, (1997).
  • [38] Yavuz, E., “Duruk İmgelerde Damgalama ve Veri Saklama”, PhD. thesis, Ankara University, Institute of Science, (2008).
  • [39] Abd-El-Atty, B., El-Affendi, M., El-Latif, A.A.A., “A novel image cryptosystem using Gray code, quantum walks, and Henon map for cloud applications”, Complex & Intelligent Systems, (9): 609–624, (2023).
  • [40] Ngyuen, B.C., Yoon, S.M., Lww, H.K., “Multi Bit Plane Image Steganography”, 5th International Workshop, Jeju Island, Korea, 8-10, (2006).
  • [41] Qi, W. Liu, Y., Sirui, G., Wang, X., Guo, Z. “An Adaptive Visible Watermark Embedding Method based on Region Selection”, Security and Communication Networks, (2021), 1-11, (2021).
  • [42] Mannepalli, P.K., Richhariya, V., Gupta, S.K. “A robust blockchain-based watermarking using edge detection and wavelet transform”, Multimed Tools Appl, (2024).
  • [43] Dinçer G., Entropi Kavramının İstatistikteki Bazı Uygulamaları, M.S. thesis, Yıldız Teknik University, Institute of Science, (2015).
  • [44] Shannon, C.E., “A mathematical theory of communication”, Bell Systems Technology Journal, (27): 379-423, (1948).
  • [45] Pal, N.R., Pal, S.K., “Entropy: A New Definition And Its Applications”, IEEE Transactions on Systems, Man and Cybernetics, (21)5: 1260-1270, (1991).
  • [46] Farrell, J. E., “Image quality evaluation in colour imaging: vision and technology”, Eds: MacDonald, L.W., Luo, M.R., John Wiley, Stanford, (1999).
  • [47] Cadik, M., Slavik, P., “Evaluation of two principal approaches to objective image quality assessment”, 8th International Conference on Information Visualisation, North Carolina, 513-551, (2004).
  • [48] Hore, A., Ziou, D., “Image quality metrics: PSNR vs. SSIM”, International Conference on Pattern Recognition, İstanbul, Türkiye, 2366-2369, (2010).
  • [49] Wang, Z., Bovik, A. C., Sheikh, H. R., Simoncelli, E. P., “Image quality assessment: from error visibility to structural similarity”, IEEE Transactions on Image Processing, (13)4: 600-612, (2004).
  • [50] Setiadi, D.R.I.M., Rustad, S., Andono, P.N., Shidik G.F., “Graded fuzzy edge detection for imperceptibility optimization of image steganography”, The Imaging Science Journal, (72)6: 693-705, (2024).
  • [51] Saeidi, Z., Yazdi, A., Mashhadi, S., Hadian, M. Gutub, A., “High performance image steganography integrating IWT and Hamming code within secret sharing”, IET Image Process, (2024)18: 129–139, (2024).
  • [52] Pramanik, S., “An adaptive image steganography approach depending on integer wavelet transform and genetic algorithm”, Multimed Tools App, (82): 34287–34319, (2023).
  • [53] Prasad, S. Pal, A.K., Mukherjee, S., “An RGB Color Image Steganography Scheme by Binary Lower Triangular Matrix”, IEEE Transactions on Intelligent Transportation Systems, (24)7: 6865-6873, (2023).
  • [54] Dumre, R., Dave, A., “Exploring LSB Steganography Possibilities in RGB Images”, 12th International Conference on Computing Communication and Networking Technologies, Kharagpur, India, 1-7, (2021).
  • [55] Abdel-aziz, M.M., Hosny, K.M., Lashin, N.A., “Improved data hiding method for securing color images”, Multimed Tools Appl, (80): 12641–12670, (2021).
  • [56] Kareem, H.R., Madhi, H.H., Mutlaq, KA., “Hiding encrypted text in image steganography”, Periodicals of Engineering and Natural Sciences (8)2, pp. 703–707, (2020).
  • [57] Pak, C. Kim, J. An. K., Kim, C., Kim, K., “A novel color image LSB steganography using improved 1D chaotic map”, Multimed Tools Appl, (79): 1409–1425, (2020).
  • [58] Rahman, S., Masood F., Khan, W.U., Ullah, N., Khan, F.Q., Tsaramirsis, G., Jan, S., Ashraf, “A Novel Approach of Image Steganography for Secure Communication Based on LSwB Substitution Technique”, Computers, Materials & Continua, (64)1: 31–61, (2020).
  • [59] Calanda, F.B., Sison, A.M., Molato, M.R.D., Medina, R.P., “A Modified Least Significant Bit Randomized Embedding Method based on Image Partitioning and Columnar Transposition with Encryption”, 2nd International Conference on Computing and Big Data, New York, 68–72, (2019).
  • [60] Solak, S., Altınışık, U., “A New Approach for Steganography: Bit Shifting Operation of Encrypted Data in LSB (SED-LSB)”, J Inf Tech, (12)1: 75–82, (2019).
  • [61] Setyono, A., Ignatius, D.R., Setiadi, M., “Securing and Hiding Secret Message in Image using XOR Transposition Encryption and LSB Method”, Journal of Physics, (1196): 1-6, (2019).
  • [62] Mukherjee, S., Sanyal, G., “A chaos based image steganographic system”, Multimed Tools Appl, (77)21: 27851–27876, (2018).
  • [63] Rajput G.G., Chavan R., “A Novel Approach for Image Steganography Based On Random LSB Insertion in Color Images”, International Conference on Intelligent Computing Systems, Tamilnadu, India, 265–273, (2017).
  • [64] Chauhan, S., Jyotsna, Kumar, J., Doegar, A., “Multiple layer Text security using Variable block size Cryptography and Image Steganography”, 3rd International Conference on Computational Intelligence & Communication Technology, Ghaziabad, India, 1-7, (2017).
  • [65] Dagar, S., “Highly Randomized Image Steganography using Secret Keys”, IEEE International Conference on Recent Advances and Innovations in Engineering, Jaipur, India, 1-5, (2014).
  • [66] Jaradat, A., Taqieddin, E., Mowafi, M., "A high-capacity image steganography method using chaotic particle swarm optimization", Hindawi Security and Communication Networks, (2021)1, 1-11, (2021).
  • [67] Babu, A.R., Al-Fatlawy, R.R., Veeranjaneyulu, K., Kumar, K.S., "Canonical Huffman Coding (CHC) - Discrete Wavelet Transform (DWT) Method for Image Steganography," 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), Raichur, India, 1-4, (2024).
  • [68] Yassin, N.I.R., El-Houby, E.M.F., "Image Steganography Technique Based on Integer Wavelet Transform Using Most Significant Bit Categories." International Journal of Intelligent Engineering & Systems, (15)1, 499-508, (2022).
  • [69] Fridrich, J., Goljan, M., Du, R., “Reliable Detection of LSB Steganography in Color and Grayscale Images”, ACM Workshop on Multimedia and Security, Ottawa, Canada, 27-30, (2001).
  • [70] Hassan, M.D., Amin, M.A.M., Mahdi, S.T., "Steganalysis Techniques and Comparison of Available Softwares", Proceedings of the 1st International Multi-Disciplinary Conference Theme: Sustainable Development and Smart Planning, IMDC-SDSP-2020, (2020).
There are 70 citations in total.

Details

Primary Language English
Subjects Software Engineering (Other)
Journal Section Research Article
Authors

Hüseyin Bilal Macit 0000-0002-5325-5416

Early Pub Date July 7, 2025
Publication Date
Submission Date October 14, 2024
Acceptance Date June 29, 2025
Published in Issue Year 2025 EARLY VIEW

Cite

APA Macit, H. B. (2025). Digital Image as a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information. Politeknik Dergisi1-1. https://doi.org/10.2339/politeknik.1567237
AMA Macit HB. Digital Image as a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information. Politeknik Dergisi. Published online July 1, 2025:1-1. doi:10.2339/politeknik.1567237
Chicago Macit, Hüseyin Bilal. “Digital Image As a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information”. Politeknik Dergisi, July (July 2025), 1-1. https://doi.org/10.2339/politeknik.1567237.
EndNote Macit HB (July 1, 2025) Digital Image as a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information. Politeknik Dergisi 1–1.
IEEE H. B. Macit, “Digital Image as a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information”, Politeknik Dergisi, pp. 1–1, July 2025, doi: 10.2339/politeknik.1567237.
ISNAD Macit, Hüseyin Bilal. “Digital Image As a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information”. Politeknik Dergisi. July 2025. 1-1. https://doi.org/10.2339/politeknik.1567237.
JAMA Macit HB. Digital Image as a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information. Politeknik Dergisi. 2025;:1–1.
MLA Macit, Hüseyin Bilal. “Digital Image As a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information”. Politeknik Dergisi, 2025, pp. 1-1, doi:10.2339/politeknik.1567237.
Vancouver Macit HB. Digital Image as a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information. Politeknik Dergisi. 2025:1-.