Research Article
BibTex RIS Cite

İkili İmgeler için Kaos Tabanlı Yeni bir Steganografik Yöntem

Year 2016, Volume: 9 Issue: 1, 29 - 36, 07.06.2017

Abstract

İkili
imgelere veri gizlemek gri seviyeli ve renkli imgelere ver gizlemekten daha zor
bir işlemdir çünkü ikili imgelerin piksel değerleri 0 ve 1’dir. Bundan dolayı
gri ve renkli imgeler için önerilen Steganografik yöntemler ikili imgeler için
kullanılamamaktadır ancak ikili imgeler için önerilen Steganografik yöntemler
gri ve renkli imgeler için kullanılabilmektedir. Bu makalede ikili imgeler için
kaos tabanlı yeni bir Steganografik yöntem önerilmiştir. Önerilen yöntem blok
tabanlıdır ve 2 x 2, 3 x 3 veya M x N boyutunda örtüşmeyen bloklar
kullanılabilmektedir. Kaotik haritalardan olan lojistik harita kullanılarak
gizli verinin bloğun hangi noktasına gömüleceği tespit edilmektedir ve böylece
önerilen Steganografik yöntemin gizliliği sağlanmaktadır. Deneysel sonuçlarda,
önerilen yöntemin veri gizleme kapasitesi, görsel kalitesi, gizliliği ve
çalışma zamanı ölçülmüştür. Elde edilen sonuçlar, önerilen yöntemin başarılı
olduğunu göstermektedir.

References

  • [1] Z. Ni, Y.-Q. Shi, N. Ansari, W. Su, Reversible Data Hiding, IEEE Transactions On Circuits And Systems For Video Technology, 16 (3), 2006.
  • [2] M. B. Begum, Y. Venkataramani, LSB Based Audio Steganography Based On Text Compression, Procedia Engineering, 30, 703-710, 2012.
  • [3] F. Perez-Gonzlez F. Balado, Quantized projection data hiding, inProc. IEEE Int. Conf. Image Process., 2, 889–892, 2002.
  • [4] Y. Q. Shi, Z. Ni, D. Zou, C. Liang, Lossless data hiding: fundamentals, algorithms and applications, IEEE Int. Symp. Circuits Syst., 33–36, 2004.
  • [5] Q. Mao, A fast algorithm for matrix embedding steganography, Digital Signal Processing, 25, 248-254, 2014. [6] L. Von Ahn and N. J. Hopper, Public-key steganography, in Advances in Cryptology-Eurocrypt, Berlin, Germany: Springer-Verlag, 3027, 323–341, 2004.
  • [7] G.S. Lin, Y.T. Chang, W.N. Lie, A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm, IEEE Trans. Multimedia, 12 (5), 345–357, 2010.
  • [8] E. Avci, T. Tuncer, F. Ertam, Çok katmanlı görüntü steganografi, 7. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, 2014.
  • [9] K. Matsui, K. Tanaka, Video-steganography: how to secretly embed a signature in a picture, in: Proc. IMA Intellectual Property Project, 1994, pp.187–206.
  • [10] S.H. Low, N.F. Maxemchuk, A.M. Lapone, Document identification for copyright protection using centroid detection, IEEE Trans. Commun. (1998) 372–383.
  • [11] J.T. Brassil, S.H. Low, N.F. Maxemchuk, Copyright protection for the electronic distribution of text documents, in: Proc. of IEEE, 1999, pp. 1181-1196.
  • [12] E. Koch, J. Zhao, Embedding robust labels into images for copyright protection, in: Proc. of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge & New Technologies, 1995, pp. 242–251.
  • [13] M. Wu, E. Tang, B. Liu, Data hiding in digital binary images, in: IEEE Inter. Conf. on Multimedia & Expo, 2000, pp. 393–396.
  • [14] C. Liu, Y. Dai, Z. Wang, A novel information hiding method in binary images, J. Southeast Univ. (2003).
  • [15] M. Wu, B. Liu, Data hiding in binary image for authentication and annotation, IEEE Trans. Multimedia (2004) 528–538.
  • [16] M. Venkatesan, P. Meenakshidevi, K. Duraiswamy, K. Thiagarajah, A new data hiding scheme with quality control for binary images using block parity,in: 3rd Inter. Symposium on Information Assurance and Security, 2007, pp. 468–471.
  • [17] K.H. Yung, K.Y. Yoo, Data hiding method in binary images based on block masking for key authentication, Information Sciences, 277 (2014), pp. 188-196.
  • [18] K.H. Yung, K.Y. Yoo, Data hiding method with quality control for binary images, J. Software Engineering & Applications, 2 (2009), pp. 20-24.
  • [19] C.C. Wang, Y.F. Chang, C.C. Chang, J.K. Jang, C.C. Lin, A high capacity data hiding scheme for binary images basedon block patterns, The Journal of Systems and Software, 93, (2014), 152–162
  • [20] B. Feng, W. Lu, W. Sun, Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 2, FEBRUARY,2015, pp. 243-255.
  • [21] D. Bandyopadhyay, K. Dasgupta, J. K. Manda, P. Dutta, "A NOVEL SECURE IMAGE STEGANOGRAPHY METHOD BASED ON CHAOS THEORY IN SPATIAL DOMAIN", International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 1, February 2014.
  • [22] D.-C. Lou, C.-H. Sung, "A Steganographic Scheme for Secure Communications Based on the Chaos and Euler Theorem", IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 3, JUNE 2004.
  • [23] http://geoffboeing.com/2015/03/chaos-theory-logistic-map/ (Son Erişim Tarihi: 23.04.2016)
  • [24] F. Özkaynak, A. B. Özer, Lojistik Harita ile Rastgele Sayı Üretilmesi ve İstatistiki Yöntemlerle Sınanması, Journal of Istanbul Kültür University, 2006.
  • [25] H.W. Tseng, F.R. Wu, C.P. Hsieh, Data hiding for binary images using weight mechanism, IIHMSP, 307– 310, 2007.
  • [26] T. Tuncer, D. Avcı, E. Avcı, A new data hiding algorithm based on minesweeper game for binary images, Journal of the Faculty of Engineering and Architecture of Gazi University 31:4 (2016) 951-959.
Year 2016, Volume: 9 Issue: 1, 29 - 36, 07.06.2017

Abstract

References

  • [1] Z. Ni, Y.-Q. Shi, N. Ansari, W. Su, Reversible Data Hiding, IEEE Transactions On Circuits And Systems For Video Technology, 16 (3), 2006.
  • [2] M. B. Begum, Y. Venkataramani, LSB Based Audio Steganography Based On Text Compression, Procedia Engineering, 30, 703-710, 2012.
  • [3] F. Perez-Gonzlez F. Balado, Quantized projection data hiding, inProc. IEEE Int. Conf. Image Process., 2, 889–892, 2002.
  • [4] Y. Q. Shi, Z. Ni, D. Zou, C. Liang, Lossless data hiding: fundamentals, algorithms and applications, IEEE Int. Symp. Circuits Syst., 33–36, 2004.
  • [5] Q. Mao, A fast algorithm for matrix embedding steganography, Digital Signal Processing, 25, 248-254, 2014. [6] L. Von Ahn and N. J. Hopper, Public-key steganography, in Advances in Cryptology-Eurocrypt, Berlin, Germany: Springer-Verlag, 3027, 323–341, 2004.
  • [7] G.S. Lin, Y.T. Chang, W.N. Lie, A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm, IEEE Trans. Multimedia, 12 (5), 345–357, 2010.
  • [8] E. Avci, T. Tuncer, F. Ertam, Çok katmanlı görüntü steganografi, 7. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, 2014.
  • [9] K. Matsui, K. Tanaka, Video-steganography: how to secretly embed a signature in a picture, in: Proc. IMA Intellectual Property Project, 1994, pp.187–206.
  • [10] S.H. Low, N.F. Maxemchuk, A.M. Lapone, Document identification for copyright protection using centroid detection, IEEE Trans. Commun. (1998) 372–383.
  • [11] J.T. Brassil, S.H. Low, N.F. Maxemchuk, Copyright protection for the electronic distribution of text documents, in: Proc. of IEEE, 1999, pp. 1181-1196.
  • [12] E. Koch, J. Zhao, Embedding robust labels into images for copyright protection, in: Proc. of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge & New Technologies, 1995, pp. 242–251.
  • [13] M. Wu, E. Tang, B. Liu, Data hiding in digital binary images, in: IEEE Inter. Conf. on Multimedia & Expo, 2000, pp. 393–396.
  • [14] C. Liu, Y. Dai, Z. Wang, A novel information hiding method in binary images, J. Southeast Univ. (2003).
  • [15] M. Wu, B. Liu, Data hiding in binary image for authentication and annotation, IEEE Trans. Multimedia (2004) 528–538.
  • [16] M. Venkatesan, P. Meenakshidevi, K. Duraiswamy, K. Thiagarajah, A new data hiding scheme with quality control for binary images using block parity,in: 3rd Inter. Symposium on Information Assurance and Security, 2007, pp. 468–471.
  • [17] K.H. Yung, K.Y. Yoo, Data hiding method in binary images based on block masking for key authentication, Information Sciences, 277 (2014), pp. 188-196.
  • [18] K.H. Yung, K.Y. Yoo, Data hiding method with quality control for binary images, J. Software Engineering & Applications, 2 (2009), pp. 20-24.
  • [19] C.C. Wang, Y.F. Chang, C.C. Chang, J.K. Jang, C.C. Lin, A high capacity data hiding scheme for binary images basedon block patterns, The Journal of Systems and Software, 93, (2014), 152–162
  • [20] B. Feng, W. Lu, W. Sun, Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 2, FEBRUARY,2015, pp. 243-255.
  • [21] D. Bandyopadhyay, K. Dasgupta, J. K. Manda, P. Dutta, "A NOVEL SECURE IMAGE STEGANOGRAPHY METHOD BASED ON CHAOS THEORY IN SPATIAL DOMAIN", International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 1, February 2014.
  • [22] D.-C. Lou, C.-H. Sung, "A Steganographic Scheme for Secure Communications Based on the Chaos and Euler Theorem", IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 3, JUNE 2004.
  • [23] http://geoffboeing.com/2015/03/chaos-theory-logistic-map/ (Son Erişim Tarihi: 23.04.2016)
  • [24] F. Özkaynak, A. B. Özer, Lojistik Harita ile Rastgele Sayı Üretilmesi ve İstatistiki Yöntemlerle Sınanması, Journal of Istanbul Kültür University, 2006.
  • [25] H.W. Tseng, F.R. Wu, C.P. Hsieh, Data hiding for binary images using weight mechanism, IIHMSP, 307– 310, 2007.
  • [26] T. Tuncer, D. Avcı, E. Avcı, A new data hiding algorithm based on minesweeper game for binary images, Journal of the Faculty of Engineering and Architecture of Gazi University 31:4 (2016) 951-959.
There are 25 citations in total.

Details

Journal Section Makaleler(Araştırma)
Authors

Türker Tuncer

Publication Date June 7, 2017
Published in Issue Year 2016 Volume: 9 Issue: 1

Cite

APA Tuncer, T. (2017). İkili İmgeler için Kaos Tabanlı Yeni bir Steganografik Yöntem. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, 9(1), 29-36.
AMA Tuncer T. İkili İmgeler için Kaos Tabanlı Yeni bir Steganografik Yöntem. TBV-BBMD. June 2017;9(1):29-36.
Chicago Tuncer, Türker. “İkili İmgeler için Kaos Tabanlı Yeni Bir Steganografik Yöntem”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi 9, no. 1 (June 2017): 29-36.
EndNote Tuncer T (June 1, 2017) İkili İmgeler için Kaos Tabanlı Yeni bir Steganografik Yöntem. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 9 1 29–36.
IEEE T. Tuncer, “İkili İmgeler için Kaos Tabanlı Yeni bir Steganografik Yöntem”, TBV-BBMD, vol. 9, no. 1, pp. 29–36, 2017.
ISNAD Tuncer, Türker. “İkili İmgeler için Kaos Tabanlı Yeni Bir Steganografik Yöntem”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 9/1 (June 2017), 29-36.
JAMA Tuncer T. İkili İmgeler için Kaos Tabanlı Yeni bir Steganografik Yöntem. TBV-BBMD. 2017;9:29–36.
MLA Tuncer, Türker. “İkili İmgeler için Kaos Tabanlı Yeni Bir Steganografik Yöntem”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, vol. 9, no. 1, 2017, pp. 29-36.
Vancouver Tuncer T. İkili İmgeler için Kaos Tabanlı Yeni bir Steganografik Yöntem. TBV-BBMD. 2017;9(1):29-36.

Article Acceptance

Use user registration/login to upload articles online.

The acceptance process of the articles sent to the journal consists of the following stages:

1. Each submitted article is sent to at least two referees at the first stage.

2. Referee appointments are made by the journal editors. There are approximately 200 referees in the referee pool of the journal and these referees are classified according to their areas of interest. Each referee is sent an article on the subject he is interested in. The selection of the arbitrator is done in a way that does not cause any conflict of interest.

3. In the articles sent to the referees, the names of the authors are closed.

4. Referees are explained how to evaluate an article and are asked to fill in the evaluation form shown below.

5. The articles in which two referees give positive opinion are subjected to similarity review by the editors. The similarity in the articles is expected to be less than 25%.

6. A paper that has passed all stages is reviewed by the editor in terms of language and presentation, and necessary corrections and improvements are made. If necessary, the authors are notified of the situation.

0

.   This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.