Araştırma Makalesi
BibTex RIS Kaynak Göster

İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması

Yıl 2013, Cilt: 10 Sayı: 1, - , 01.05.2013

Öz

Digital image steganography techniques deal with three subjects lossy/lossless
compressed images, uncompressed images. Steganography techniques embed secret data
pixel directly into uncompressed and lossless compressed cover images. The most popular
data hiding method is, changing pixels’ left most digits or last two, known as Least
Significant Bit (LSB). Lossless image formats like .bmp, .png, and 8-bit gray-scale .gif are
usable for LSB methods. LSB embedding method is not usable for palette images because
of changing just last bit of a pixel causes a big difference on image. After embedding all of
secret message to palette image, Human Visual System (HVS) can detect manipulations
on image. In this study, we compare some of the most popular LSB techniques; Chan’s
algorithm [3], 2/3 efficient embedding [4], matrix embedding for large payloads [5], image
blocks method [6] and pixel-value differencing method [7]-[8].

Kaynakça

  • 1] N. F. Johnson and S. Katzenbeisser, A survey of steganographic techniques, in: Information Hiding Techniques for Steganography and Digital Watermarking (eds. S. Katzenbeisser and F. A. P. Petitcolas), Artech House Books (2000), 43–78.
  • [2] J. Mielikainen, LSB matching revisited, IEEE Signal Processing Letters 13 (2006), 285–287.
  • [3] C. S. Chan, On using LSB matching function for data hiding in pixels, Fundamenta Informaticae 96 (2009), 49–59.
  • [4] A. D. Ker, Information hiding and covert communication, www.sti.uniurb.it/events/ fosad08/slides/ker-slides-part2.pdf. Online; accessed 26-February-2013.
  • [5] J. Fridrich and D. Soukal, Matrix embedding for large payloads, Proceedings of the SPIE 6072 (2006), 727–738.
  • [6] O. Kurtuldu ve N. Arıca, ¨ ˙Imge kareleri kullanan yeni bir steganografi y¨ontemi, Journal of Naval Science and Engineering 5 (2009), 107–118.
  • [7] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24 (2003), 1613–1626.
  • [8] C. M. Wang, N. I. Wu, C. S. Tsaib and M. S. Hwang, A high quality steganographic method with pixel-value differencing and modulus function, Journal of Systems and Software 81 (2008), 150–158.
  • [9] B. Li, J. He, J. Huang and Y. Q. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing 2 (2011), 142–172.
  • [10] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information hiding: A survey, Proceedings of the IEEE 87 (1999), 1062–78.
  • [11] H. K. Pan, Y. Y. Chen and Y. C. Tseng, A secure data hiding scheme for two-color images, Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 750–755.
  • [12] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2000.
  • [13] D. Artz, Digital steganography: hiding data within data, Internet Computing 5 (2001), 75–80.
  • [14] A. S¸ahin, G¨or¨unt¨u Steganografide Kullanılan Yeni Metodlar ve Bu Metodların G¨uvenilirlikleri, Doktora Tezi, Trakya Universitesi, Edirne 2007.
  • [15] ShantalaSureh and Vishvanath, Edge-steganography for secure communication, TENCON 2006, IEEE Region 10 Conference (2006), 1–4.
  • [16] Kh. M. Singh, L. S. Singh, A. B. Singh and Kh. S. Devi, Hiding secret message in edges of the images, International Conference on Information and Communication Technology (ICICT 2007) (2007), 238–241.
  • [17] A. D. Ker, Quantitative evaluation of pairs and RS steganalysis, Proceedings of the SPIE 5306 (2004), 83–95.
Yıl 2013, Cilt: 10 Sayı: 1, - , 01.05.2013

Öz

Kaynakça

  • 1] N. F. Johnson and S. Katzenbeisser, A survey of steganographic techniques, in: Information Hiding Techniques for Steganography and Digital Watermarking (eds. S. Katzenbeisser and F. A. P. Petitcolas), Artech House Books (2000), 43–78.
  • [2] J. Mielikainen, LSB matching revisited, IEEE Signal Processing Letters 13 (2006), 285–287.
  • [3] C. S. Chan, On using LSB matching function for data hiding in pixels, Fundamenta Informaticae 96 (2009), 49–59.
  • [4] A. D. Ker, Information hiding and covert communication, www.sti.uniurb.it/events/ fosad08/slides/ker-slides-part2.pdf. Online; accessed 26-February-2013.
  • [5] J. Fridrich and D. Soukal, Matrix embedding for large payloads, Proceedings of the SPIE 6072 (2006), 727–738.
  • [6] O. Kurtuldu ve N. Arıca, ¨ ˙Imge kareleri kullanan yeni bir steganografi y¨ontemi, Journal of Naval Science and Engineering 5 (2009), 107–118.
  • [7] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24 (2003), 1613–1626.
  • [8] C. M. Wang, N. I. Wu, C. S. Tsaib and M. S. Hwang, A high quality steganographic method with pixel-value differencing and modulus function, Journal of Systems and Software 81 (2008), 150–158.
  • [9] B. Li, J. He, J. Huang and Y. Q. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing 2 (2011), 142–172.
  • [10] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information hiding: A survey, Proceedings of the IEEE 87 (1999), 1062–78.
  • [11] H. K. Pan, Y. Y. Chen and Y. C. Tseng, A secure data hiding scheme for two-color images, Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 750–755.
  • [12] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2000.
  • [13] D. Artz, Digital steganography: hiding data within data, Internet Computing 5 (2001), 75–80.
  • [14] A. S¸ahin, G¨or¨unt¨u Steganografide Kullanılan Yeni Metodlar ve Bu Metodların G¨uvenilirlikleri, Doktora Tezi, Trakya Universitesi, Edirne 2007.
  • [15] ShantalaSureh and Vishvanath, Edge-steganography for secure communication, TENCON 2006, IEEE Region 10 Conference (2006), 1–4.
  • [16] Kh. M. Singh, L. S. Singh, A. B. Singh and Kh. S. Devi, Hiding secret message in edges of the images, International Conference on Information and Communication Technology (ICICT 2007) (2007), 238–241.
  • [17] A. D. Ker, Quantitative evaluation of pairs and RS steganalysis, Proceedings of the SPIE 5306 (2004), 83–95.
Toplam 17 adet kaynakça vardır.

Ayrıntılar

Konular Mühendislik
Bölüm Makaleler
Yazarlar

Nurdan Saran

Cem Olcay Bu kişi benim

Yayımlanma Tarihi 1 Mayıs 2013
Yayımlandığı Sayı Yıl 2013 Cilt: 10 Sayı: 1

Kaynak Göster

APA Saran, N., & Olcay, C. (2013). İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması. Cankaya University Journal of Science and Engineering, 10(1).
AMA Saran N, Olcay C. İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması. CUJSE. Mayıs 2013;10(1).
Chicago Saran, Nurdan, ve Cem Olcay. “İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması”. Cankaya University Journal of Science and Engineering 10, sy. 1 (Mayıs 2013).
EndNote Saran N, Olcay C (01 Mayıs 2013) İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması. Cankaya University Journal of Science and Engineering 10 1
IEEE N. Saran ve C. Olcay, “İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması”, CUJSE, c. 10, sy. 1, 2013.
ISNAD Saran, Nurdan - Olcay, Cem. “İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması”. Cankaya University Journal of Science and Engineering 10/1 (Mayıs 2013).
JAMA Saran N, Olcay C. İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması. CUJSE. 2013;10.
MLA Saran, Nurdan ve Cem Olcay. “İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması”. Cankaya University Journal of Science and Engineering, c. 10, sy. 1, 2013.
Vancouver Saran N, Olcay C. İmge İçine Bilgi Gizlemede Kullanılan LSB Yöntemlerinin Karşılaştırması. CUJSE. 2013;10(1).