Araştırma Makalesi
BibTex RIS Kaynak Göster

DESIGN AND IMPLEMENTATION OF A CRYPTOGRAPHIC METHOD ON MATHEMATICAL EXPRESSIONS

Yıl 2020, Cilt: 16 Sayı: 2, 121 - 129, 30.12.2020

Öz

Data hiding has been a very interesting issue recently and various methods have been developed to deal with this issue. With the development of data hiding techniques, suitable steganalysis design to detect hidden data appears in studies. However, an approach to common valves followed by steganalyses to a new type of valve may be less questionable. In this study, a method for hiding messages in mathematical expressions is proposed. In the proposed method, the mathematical expression is used as a cover to convey the message with a secure text. In line with the study, we propose a methodology for problems that can be included in the computer algebra system. Its method involves developing a grammar-based interpreter who can recognize the syntax and meaning of mathematical expressions and turn it into an abstract syntax tree (AST).

Kaynakça

  • Gong, L.-H., et al., Single Channel Quantum Color Image Encryption Algorithm Based on HSI Model and Quantum Fourier Transform. International Journal of Theoretical Physics, 2018. 57(1): p. 59-73.
  • Wu, J., X. Liao, and B. Yang, Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Processing, 2017. 141: p. 109-124.
  • Wu, X., J. Weng, and W. Yan, Adopting secret sharing for reversible data hiding in encrypted images. Signal Processing, 2018. 143: p. 269-281.
  • Maniccam, S. and N.G. Bourbakis, Lossless image compression and encryption using SCAN. Pattern Recognition, 2001. 34(6): p. 1229-1245.
  • Yan, B. and S. Bai. Design of image confusion-diffusion cryptosystem based on vector quantization and cross chaotic map. in Image, Vision and Computing (ICIVC), 2017 2nd International Conference on. 2017. IEEE.
  • Gupta, B., D.P. Agrawal, and S. Yamaguchi, Handbook of research on modern cryptographic solutions for computer and cyber security. 2016: IGI Global .
  • Rahkar Farshi, T.: Battle royale optimization algorithm. Neural Comput. Appl. 1–19 (2020)
  • Orujpour, M., Feizi-Derakhshi, M. R., & Rahkar-Farshi, T. (2019). Multi-modal forest optimization algorithm. Neural Computing and Applications, 1-15.
  • Bhattacharyya, S., I. Banerjee, and G. Sanyal, A novel approach of secure text based steganography model using word mapping method (WMM). International Journal of Computer and Information Engineering, 2010. 4(2): p. 96-103.
  • Lockwood, R. and K. Curran, Text based steganography. International Journal of Information Privacy, Security and Integrity, 2017. 3(2): p. 134-153.
  • Li, J., et al., Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimedia Tools and Applications, 2018. 77(4): p. 4545-4561.
  • Balaji, R. and G. Naveen. Secure data transmission using video Steganography. in Electro/Information Technology (EIT), 2011 IEEE International Conference on. 2011. IEEE.
  • Nikam, G., et al., A Survey of Video Steganography Techniques. Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org, 2017. 7(5).
  • Mishra, S., et al., Audio Steganography Techniques: A Survey, in Advances in Computer and Computational Sciences. 2018, Springer. p. 581-589.
  • Johnson, N.F. and S. Jajodia. Steganalysis of images created using current steganography software. in International Workshop on Information Hiding. 1998. Springer .
  • Provos, N. and P. Honeyman, Hide and seek: An introduction to steganography. IEEE security & privacy, 2003. 99(3): p. 32-44.
  • Czaplewski, B., Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes. Przegląd Telekomunikacyjny+ Wiadomości Telekomunikacyjne, 2017: p. 1121-1125.
  • Wayner, P., Mimic functions. Cryptologia, 1992. 16(3): p. 193-214.
  • Johnson, S.C., Yacc: Yet another compiler-compiler. Vol. 32. 1975: Bell Laboratories Murray Hill, NJ.
  • Kodaganallur, V., Incorporating language processing into java applications: A JavaCC tutorial. Software, IEEE, 2004. 21(4): p. 70-77.
  • Viswanadha, S. and S. Sankar, Java compiler compiler (JavaCC)-The java parser generator. Java. net, https://javacc. dev. java. net/, accessed Aug, 2009. 23.
  • Ryan, C., M. O’Neill, and J. Collins. Grammatical evolution: solving trigonometric identities. in Proceedings of Mendel. 1998. Citeseer

MATEMATIKSEL İFADELER ÜZERİNE BİR KRİPTOGRAFİK YÖNTEMİN TASARIMI VE GERÇEKLEMESİ

Yıl 2020, Cilt: 16 Sayı: 2, 121 - 129, 30.12.2020

Öz

Veri gizleme son zamanlarda çok dikkat çekici konulardan olmuştur ve bu konu ile ilgili çeşitli yöntemler geliştirilmiştir. Veri gizleme tekniklerin gelişmesi ile birlikte gizli verileri saptamak için uygun steganaliz tasarlama çalışmalarda görünmektedir. Ancak, steganalizler tarafından izlenilen genel kapaklar yeni tipte bir kapağa getirilen bir yaklaşım daha az şüpheli olabilir. Bu çalışmada, matematik ifadeler içerisinde mesaj gizleme için bir yöntem önerilmiştir. Önerilen yöntemde matematiksel ifade, mesajı güvenli bir metinle birlikte iletmek için bir kapak olarak kullanılmaktadır. Çalışma doğrultusunda, bilgisayar cebir sistemine dahil edilebilecek problemleri için bir metodoloji öneriyoruz. Metodolojini matematiksel ifadelerin sözdizimini ve anlamını açıklayan biçimsel bir gramerin geliştirilmesini ve belirli bir matematiksel ifadeyi Özet Sözdizimi Ağacına (AST) dönüştürmek kapsar.

Kaynakça

  • Gong, L.-H., et al., Single Channel Quantum Color Image Encryption Algorithm Based on HSI Model and Quantum Fourier Transform. International Journal of Theoretical Physics, 2018. 57(1): p. 59-73.
  • Wu, J., X. Liao, and B. Yang, Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Processing, 2017. 141: p. 109-124.
  • Wu, X., J. Weng, and W. Yan, Adopting secret sharing for reversible data hiding in encrypted images. Signal Processing, 2018. 143: p. 269-281.
  • Maniccam, S. and N.G. Bourbakis, Lossless image compression and encryption using SCAN. Pattern Recognition, 2001. 34(6): p. 1229-1245.
  • Yan, B. and S. Bai. Design of image confusion-diffusion cryptosystem based on vector quantization and cross chaotic map. in Image, Vision and Computing (ICIVC), 2017 2nd International Conference on. 2017. IEEE.
  • Gupta, B., D.P. Agrawal, and S. Yamaguchi, Handbook of research on modern cryptographic solutions for computer and cyber security. 2016: IGI Global .
  • Rahkar Farshi, T.: Battle royale optimization algorithm. Neural Comput. Appl. 1–19 (2020)
  • Orujpour, M., Feizi-Derakhshi, M. R., & Rahkar-Farshi, T. (2019). Multi-modal forest optimization algorithm. Neural Computing and Applications, 1-15.
  • Bhattacharyya, S., I. Banerjee, and G. Sanyal, A novel approach of secure text based steganography model using word mapping method (WMM). International Journal of Computer and Information Engineering, 2010. 4(2): p. 96-103.
  • Lockwood, R. and K. Curran, Text based steganography. International Journal of Information Privacy, Security and Integrity, 2017. 3(2): p. 134-153.
  • Li, J., et al., Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimedia Tools and Applications, 2018. 77(4): p. 4545-4561.
  • Balaji, R. and G. Naveen. Secure data transmission using video Steganography. in Electro/Information Technology (EIT), 2011 IEEE International Conference on. 2011. IEEE.
  • Nikam, G., et al., A Survey of Video Steganography Techniques. Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org, 2017. 7(5).
  • Mishra, S., et al., Audio Steganography Techniques: A Survey, in Advances in Computer and Computational Sciences. 2018, Springer. p. 581-589.
  • Johnson, N.F. and S. Jajodia. Steganalysis of images created using current steganography software. in International Workshop on Information Hiding. 1998. Springer .
  • Provos, N. and P. Honeyman, Hide and seek: An introduction to steganography. IEEE security & privacy, 2003. 99(3): p. 32-44.
  • Czaplewski, B., Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes. Przegląd Telekomunikacyjny+ Wiadomości Telekomunikacyjne, 2017: p. 1121-1125.
  • Wayner, P., Mimic functions. Cryptologia, 1992. 16(3): p. 193-214.
  • Johnson, S.C., Yacc: Yet another compiler-compiler. Vol. 32. 1975: Bell Laboratories Murray Hill, NJ.
  • Kodaganallur, V., Incorporating language processing into java applications: A JavaCC tutorial. Software, IEEE, 2004. 21(4): p. 70-77.
  • Viswanadha, S. and S. Sankar, Java compiler compiler (JavaCC)-The java parser generator. Java. net, https://javacc. dev. java. net/, accessed Aug, 2009. 23.
  • Ryan, C., M. O’Neill, and J. Collins. Grammatical evolution: solving trigonometric identities. in Proceedings of Mendel. 1998. Citeseer
Toplam 22 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Bahar Milani 0000-0002-5295-4215

Muhammed Milani 0000-0003-2450-0280

Özlem Orhan 0000-0003-0058-0431

Yayımlanma Tarihi 30 Aralık 2020
Gönderilme Tarihi 5 Aralık 2020
Yayımlandığı Sayı Yıl 2020 Cilt: 16 Sayı: 2

Kaynak Göster

APA Milani, B., Milani, M., & Orhan, Ö. (2020). MATEMATIKSEL İFADELER ÜZERİNE BİR KRİPTOGRAFİK YÖNTEMİN TASARIMI VE GERÇEKLEMESİ. Electronic Letters on Science and Engineering, 16(2), 121-129.