BibTex RIS Kaynak Göster

A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES

Yıl 2013, Cilt: 2 Sayı: 3, 53 - 60, 01.09.2013

Öz

With the rapid growth of information technology and internet, security has become a critical issue. Therefore, data hiding gained importance for delivering secret messages. Data hiding techniques hide messages such as images, videos, texts, etc. A data hiding technique is different from cryptology. A cryptographic scheme encrypts the message and then the message is sent, which is more secure and unpredictable, to the receiver’s side. Since the message has a meaningless and uncommon content, the communication makes the observer aware of the exchange, so there is always a threat from a malicious attacker.Steganography is the art of writing secret data in such a way that no one except the intended receiver knows about the existence of secret data. Successful steganography depends on the carrier medium not to raise attention. In this study, a steganographic scheme that employs URL of web pages, has been proposed. Images have been used as the carriers. LZW coding and DES cryption algorithms have been used to increase the security. Experimental results showed that the proposed method is feasible for any communication between two parties. Since the communication is performed via only a web address, it does not raise suspicion in case of an observation.

Kaynakça

  • Huang, H. C., and Fang, W. C., (2010). Techniques and applications of intelligent multimedia data hiding, Telecommunication Systems, 44(3-4):241-251.
  • Weng, C. Y., Tso, H. K., Wang, S. J., (2012). Steganographic data hiding in image processing using predictive differencing, Opto-Electronics Review, 20(2):126-133. Swain, G., and Lenka, S. K., (2013). Steganography using two sided, three sided, and four sided side match methods, CSI Transactions on ICT, 1(2):127-133.
  • Cheddad, A., Condell, J., Curran, K., McKevitt, P., (2010). Digital image steganography: Survey and analysis of current methods, Signal Processing, 90(3):727-752.
  • Satir, E., and Isik, H., (2012). A compression-based text steganography method, Journal of Systems and Software, 85(10): 2385-2394.
  • Ioannidou, A., Halkidis, S., T., Stephanides, G., (2012). A novel technique for image steganography based on a high payload method and edge detection, Expert Systems with Applications, 39(14): 11517–11524.
  • Bailey, K., and Curran, K., (2006). An evaluation of image based steganography methods using visual inspection and automated detection techniques, Multimedia Tools and Applications, 31(3):327.
  • Fu, Y., Zhang, R., Ma, S., Qu, Z., Nıu, X., Yang, Y., (2009). Fast coding in digital steganography, The Journal of China Universities of Posts and Telecommunications, 16(6):92-96. http://www.tr.lipsum.com/feed/html, (Last Accessed: 28.11.2013).

A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES

Yıl 2013, Cilt: 2 Sayı: 3, 53 - 60, 01.09.2013

Öz

Kaynakça

  • Huang, H. C., and Fang, W. C., (2010). Techniques and applications of intelligent multimedia data hiding, Telecommunication Systems, 44(3-4):241-251.
  • Weng, C. Y., Tso, H. K., Wang, S. J., (2012). Steganographic data hiding in image processing using predictive differencing, Opto-Electronics Review, 20(2):126-133. Swain, G., and Lenka, S. K., (2013). Steganography using two sided, three sided, and four sided side match methods, CSI Transactions on ICT, 1(2):127-133.
  • Cheddad, A., Condell, J., Curran, K., McKevitt, P., (2010). Digital image steganography: Survey and analysis of current methods, Signal Processing, 90(3):727-752.
  • Satir, E., and Isik, H., (2012). A compression-based text steganography method, Journal of Systems and Software, 85(10): 2385-2394.
  • Ioannidou, A., Halkidis, S., T., Stephanides, G., (2012). A novel technique for image steganography based on a high payload method and edge detection, Expert Systems with Applications, 39(14): 11517–11524.
  • Bailey, K., and Curran, K., (2006). An evaluation of image based steganography methods using visual inspection and automated detection techniques, Multimedia Tools and Applications, 31(3):327.
  • Fu, Y., Zhang, R., Ma, S., Qu, Z., Nıu, X., Yang, Y., (2009). Fast coding in digital steganography, The Journal of China Universities of Posts and Telecommunications, 16(6):92-96. http://www.tr.lipsum.com/feed/html, (Last Accessed: 28.11.2013).
Toplam 7 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Bölüm Makaleler
Yazarlar

Esra Şatır Bu kişi benim

Oğuzhan Kendirli Bu kişi benim

Yayımlanma Tarihi 1 Eylül 2013
Yayımlandığı Sayı Yıl 2013 Cilt: 2 Sayı: 3

Kaynak Göster

APA Şatır, E., & Kendirli, O. (2013). A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES. İleri Teknoloji Bilimleri Dergisi, 2(3), 53-60.
AMA Şatır E, Kendirli O. A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES. İleri Teknoloji Bilimleri Dergisi. Eylül 2013;2(3):53-60.
Chicago Şatır, Esra, ve Oğuzhan Kendirli. “A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES”. İleri Teknoloji Bilimleri Dergisi 2, sy. 3 (Eylül 2013): 53-60.
EndNote Şatır E, Kendirli O (01 Eylül 2013) A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES. İleri Teknoloji Bilimleri Dergisi 2 3 53–60.
IEEE E. Şatır ve O. Kendirli, “A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES”, İleri Teknoloji Bilimleri Dergisi, c. 2, sy. 3, ss. 53–60, 2013.
ISNAD Şatır, Esra - Kendirli, Oğuzhan. “A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES”. İleri Teknoloji Bilimleri Dergisi 2/3 (Eylül 2013), 53-60.
JAMA Şatır E, Kendirli O. A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES. İleri Teknoloji Bilimleri Dergisi. 2013;2:53–60.
MLA Şatır, Esra ve Oğuzhan Kendirli. “A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES”. İleri Teknoloji Bilimleri Dergisi, c. 2, sy. 3, 2013, ss. 53-60.
Vancouver Şatır E, Kendirli O. A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES. İleri Teknoloji Bilimleri Dergisi. 2013;2(3):53-60.