Araştırma Makalesi
BibTex RIS Kaynak Göster

Bilgiyi Matematiksel İfadeye Gizlemek İçin Yeni Bir Yaklaşım

Yıl 2020, Cilt: 7 Sayı: 2, 739 - 754, 30.12.2020
https://doi.org/10.35193/bseufbd.634578

Öz

Bilgi gizleme son zamanlarda çok ilgi gördü. Steganografi için çeşitli yöntemler geliştirilmiş ve aynı zamanda gizli verileri tespit etmek için uygun steganalizler tasarlanmıştır. Bununla birlikte, steganaliz tarafınden dikkate alınmamasi için yeni bir kapak türünde sunulan bir yaklaşım daha az şüpheli olabilir. Bu makale bir mesajı matematiksel ifadeye dönüştürebilen bir yöntem önermektedir. Oluşturulan matematiksel ifade, oldukça güvenli bir metinle birlikte mesajı iletmek için bir kapak olarak kullanılabilir. Önerilen yöntem, uygun bir stokastik dilbilgisi kullanarak, belirli bir metne dayalı matematiksel bir ifade oluşturma yeteneğine sahiptir. Dilbilgisi kurallarının olasılığı, taşıyıcı metne göre ve matematiksel ifadelerin türüne göre belirlenebilir.

Kaynakça

  • Gupta, B.B., D. Agrawal, and S. Yamaguchi. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. New York: IGI Global, 2016.
  • Bhattacharyya, S., I. Banerjee, and G. Sanyal. "A novel approach of secure text based steganography model using word mapping method (WMM)." International Journal of Computer and Information Engineering, 2010: Vol. 4, No. 2, pp.96–103.
  • Lockwood, Robert, and Curran Kevin. "Text based steganography." International Journal of Information Privacy, Security and Integrity 3-2 (2017): 134-153.
  • Li, J., C. YU, B.B. Gupta, and X. Ren. "Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition." Multimedia Tools and Applications, 1027: 1–17.
  • Balaji, R., and Naveen Garewal. "Secure data transmission using video Steganography."IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY. 2011.
  • Nikam, G., A. Gupta, V. Kalal, and P. Waghmare. "A Survey of Video Steganography Techniques." Journal of Network Communications and Emerging Technologies (JNCET), 2017: 33-35.
  • Cuttnel, J.D., and K.W. Johnson. Physics, 4th ed., Wiley, New York. 4th. New York: Wiley, 1998.
  • Mishra, Shilpi, Yadav Virendra Kumar, Trivedi Munesh Chand, and ShrimaliTarun. "Audio Steganography Techniques: A Survey." Advances in Computer and Computational Sciences. Springer, 2018: 581-589.
  • Johnson, Neil F., and JajodiaSushil. "Steganalysis of images created using current steganography software." International Workshop on Information Hiding. Berlin, 1998.
  • Provos, Niels, and Honeyman Peter. "Hide and seek: An introduction to steganography." 2003. 32-44.
  • Czaplewski, Bartosz. "Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes." PrzeglądTelekomunikacyjny+ WiadomościTelekomunikacyjne, 2017: 1121-1125.
  • Wayner, P. "Mimic functions." Cryptologia 16, no. 3 (Jul 1992): 193-214.
  • Chang, Ching-Yun, and Clark Stephen. "Linguistic Steganography Using Automatically Generated Paraphrases." In Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. 2010. 591-599.
  • Sampat, Vivek, S. Karmokar, J. Madia, K. Dave, and P. Toprani. "Audio Steganography using Dynamic Cover Generation." IJCA Proceedings on National Conference on Advancement of Technologies. 2012. 26-30.
  • Seifedine, Kadry, and Sara Nasr. "New Generating Technique for Image Steganography." Lecture Notes on Software Engineering 1, no. 2 (2013): 190-193.
  • Johnson, Stephen C. Yacc: Yet another compiler-compiler. Vol. 32. Murray Hill, NJ: Bell Laboratories, 1975.
  • Levine, John R., Mason Tony, and Brown Doug .Lex&yacc. O'Reilly Media, Inc., 1992.
  • Kodaganallur, Viswanathan. "Incorporating language processing into java applications: A JavaCC tutorial." IEEE software 21, no. 4 (2004): 70-77.
  • Ryan, Conor, O’Neill Michael, and Collins J. J. "Grammatical evolution: solving trigonometric identities." proceedings of Mendel, 1998.
  • Newmeyer, Frederick J. "Grammar is grammar and usage is usage." Language 79, no. 4 (2003): 682-707.
  • Donnelly, Charles, and Stallman Richard. "Bison. The YACC-compatible parser generator." 2000.
  • Earley, Jay. "An efficient context-free parsing algorithm." Communications of the ACM, 1970: 94-102.
  • Marlow, Simon, and Gill Andy. Happy: The parser generator for haskell. 2004. https://www.haskell.org/happy/.
  • Hudson, S. E. JAVACUP: LALR parser generator for Java. User’s manual, GVU Center, Georgia Institute of Technology, 1996.
  • Adnan Gutub, LahouariGhouti, Alaaeldin Amin, TalalAlkharobi, andMohammad K. Ibrahim, “Utilizing Extension Character ‘Kashida’ With PointedLetters For Arabic Text Digital Watermarking”, International Conference on Securityand Cryptography - SECRYPT, Barcelona, Spain, July 28 - 31, 2007.
  • Aabed, M. A., Awaideh, S. M., Elshafei, A. R. M., &Gutub, A. A. (2007, November). Arabic diacritics based steganography. In Signal Processing and Communications, 2007. ICSPC 2007. IEEE International Conference on (pp. 756-759). IEEE.
  • K. Qazanfari, R. Safabakhsh, A new steganography method which preserves histogram: Generalization of LSB++, Information Sciences, 277 (2014) 90-101.
  • K. Muhammad, J. Ahmad, N.U. Rehman, Z. Jan, M. Sajjad, CISSKA-LSB: color image steganography using stegokeydirected adaptive LSB substitution method, Multimedia Tools and Applications, (2016) 1-30

A Novel Approach for Hiding Information into Mathematical Expression

Yıl 2020, Cilt: 7 Sayı: 2, 739 - 754, 30.12.2020
https://doi.org/10.35193/bseufbd.634578

Öz

Information hiding has received a lot of attention recently. Various methods have been developed for steganography, and at the same time, proper steganalysis has been designed to detect hidden data. However, an approach that is introduced in a new type of cover can be less doubtful due to the lack of attention to steganalysis analyses. This paper proposes a method that can convert a message into a mathematical expression. The generated mathematical expression can be used as a cover to transmit the message along with a highly secure text. The proposed method, using a suitable stochastic grammar, has the ability to create a mathematical expression based on a given text. Probability of grammar rules can be determined in accordance with the carrier text and based on the type of mathematical expressions.

Kaynakça

  • Gupta, B.B., D. Agrawal, and S. Yamaguchi. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. New York: IGI Global, 2016.
  • Bhattacharyya, S., I. Banerjee, and G. Sanyal. "A novel approach of secure text based steganography model using word mapping method (WMM)." International Journal of Computer and Information Engineering, 2010: Vol. 4, No. 2, pp.96–103.
  • Lockwood, Robert, and Curran Kevin. "Text based steganography." International Journal of Information Privacy, Security and Integrity 3-2 (2017): 134-153.
  • Li, J., C. YU, B.B. Gupta, and X. Ren. "Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition." Multimedia Tools and Applications, 1027: 1–17.
  • Balaji, R., and Naveen Garewal. "Secure data transmission using video Steganography."IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY. 2011.
  • Nikam, G., A. Gupta, V. Kalal, and P. Waghmare. "A Survey of Video Steganography Techniques." Journal of Network Communications and Emerging Technologies (JNCET), 2017: 33-35.
  • Cuttnel, J.D., and K.W. Johnson. Physics, 4th ed., Wiley, New York. 4th. New York: Wiley, 1998.
  • Mishra, Shilpi, Yadav Virendra Kumar, Trivedi Munesh Chand, and ShrimaliTarun. "Audio Steganography Techniques: A Survey." Advances in Computer and Computational Sciences. Springer, 2018: 581-589.
  • Johnson, Neil F., and JajodiaSushil. "Steganalysis of images created using current steganography software." International Workshop on Information Hiding. Berlin, 1998.
  • Provos, Niels, and Honeyman Peter. "Hide and seek: An introduction to steganography." 2003. 32-44.
  • Czaplewski, Bartosz. "Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes." PrzeglądTelekomunikacyjny+ WiadomościTelekomunikacyjne, 2017: 1121-1125.
  • Wayner, P. "Mimic functions." Cryptologia 16, no. 3 (Jul 1992): 193-214.
  • Chang, Ching-Yun, and Clark Stephen. "Linguistic Steganography Using Automatically Generated Paraphrases." In Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. 2010. 591-599.
  • Sampat, Vivek, S. Karmokar, J. Madia, K. Dave, and P. Toprani. "Audio Steganography using Dynamic Cover Generation." IJCA Proceedings on National Conference on Advancement of Technologies. 2012. 26-30.
  • Seifedine, Kadry, and Sara Nasr. "New Generating Technique for Image Steganography." Lecture Notes on Software Engineering 1, no. 2 (2013): 190-193.
  • Johnson, Stephen C. Yacc: Yet another compiler-compiler. Vol. 32. Murray Hill, NJ: Bell Laboratories, 1975.
  • Levine, John R., Mason Tony, and Brown Doug .Lex&yacc. O'Reilly Media, Inc., 1992.
  • Kodaganallur, Viswanathan. "Incorporating language processing into java applications: A JavaCC tutorial." IEEE software 21, no. 4 (2004): 70-77.
  • Ryan, Conor, O’Neill Michael, and Collins J. J. "Grammatical evolution: solving trigonometric identities." proceedings of Mendel, 1998.
  • Newmeyer, Frederick J. "Grammar is grammar and usage is usage." Language 79, no. 4 (2003): 682-707.
  • Donnelly, Charles, and Stallman Richard. "Bison. The YACC-compatible parser generator." 2000.
  • Earley, Jay. "An efficient context-free parsing algorithm." Communications of the ACM, 1970: 94-102.
  • Marlow, Simon, and Gill Andy. Happy: The parser generator for haskell. 2004. https://www.haskell.org/happy/.
  • Hudson, S. E. JAVACUP: LALR parser generator for Java. User’s manual, GVU Center, Georgia Institute of Technology, 1996.
  • Adnan Gutub, LahouariGhouti, Alaaeldin Amin, TalalAlkharobi, andMohammad K. Ibrahim, “Utilizing Extension Character ‘Kashida’ With PointedLetters For Arabic Text Digital Watermarking”, International Conference on Securityand Cryptography - SECRYPT, Barcelona, Spain, July 28 - 31, 2007.
  • Aabed, M. A., Awaideh, S. M., Elshafei, A. R. M., &Gutub, A. A. (2007, November). Arabic diacritics based steganography. In Signal Processing and Communications, 2007. ICSPC 2007. IEEE International Conference on (pp. 756-759). IEEE.
  • K. Qazanfari, R. Safabakhsh, A new steganography method which preserves histogram: Generalization of LSB++, Information Sciences, 277 (2014) 90-101.
  • K. Muhammad, J. Ahmad, N.U. Rehman, Z. Jan, M. Sajjad, CISSKA-LSB: color image steganography using stegokeydirected adaptive LSB substitution method, Multimedia Tools and Applications, (2016) 1-30
Toplam 28 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Muhammed Milani 0000-0003-2450-0280

Yayımlanma Tarihi 30 Aralık 2020
Gönderilme Tarihi 18 Ekim 2019
Kabul Tarihi 22 Haziran 2020
Yayımlandığı Sayı Yıl 2020 Cilt: 7 Sayı: 2

Kaynak Göster

APA Milani, M. (2020). A Novel Approach for Hiding Information into Mathematical Expression. Bilecik Şeyh Edebali Üniversitesi Fen Bilimleri Dergisi, 7(2), 739-754. https://doi.org/10.35193/bseufbd.634578