Araştırma Makalesi
BibTex RIS Kaynak Göster

A new approach for Steganography: Bit shifting operation of encrypted data in LSB (SED-LSB)

Yıl 2019, , 75 - 81, 31.01.2019
https://doi.org/10.17671/gazibtd.435437

Öz

In this article, a new method is presented by
adding bit shift of encrypted data in LSB method (SED-LSB). The message to be
embedded in the cover image is encrypted by the key received from the user.
Then, secret data are obtained by bit shifting operation using this encrypted
text. Finally, the secret data is hidden inside the cover image using the LSB
method. SED-LSB is performed by preparing GUI in MATLAB. The quality of the
cover image is measured by Peak Signal-to-Noise Ratio (PSNR), besides the similarity
between the cover and stego image is determined by the Structural Similarity
Index (SSIM). The 512 x 512 size of colored images as Lena,
Peppers, Fruits and Baboon are used to hide 87373 byte data. PSNR values are
between 51.615 – 51.656 and SSIM values are between 0.99937 – 0.99982. In the
proposed method, when data are hidden at a higher capacity, stage image is
found not only secure but also high quality.

Kaynakça

  • [1] W. Diffie, M. Hellman, “New directions in cryptography”, IEEE transactions on Information Theory, 22(6), 644-654, 1976.
  • [2] C. E. Shannon, “Communication theory of secrecy systems”, Bell Labs Technical Journal, 28(4), 656-715, 1949.
  • [3] N. Topaloğlu, M. H. Calp, B. Türk, “Bilgi Güvenliği Kapsamında Yeni Bir Veri Şifreleme Algoritması Tasarımı ve Gerçekleştirilmesi”, Bilişim Teknolojileri Dergisi, 9 (3), 291-301, 2016.
  • [4] A. Coşkun, Ü. Ülker, “Ulusal Bilgi Güvenliğine Yönelik Bir Kriptografi Algoritması Geliştirilmesi ve Harf Frekans Analizinine Karşı Güvenirlik Tespiti”, Bilişim Teknolojileri Dergisi, 6 (2), 31-39, 2013.
  • [5] V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, E. De Win, “The cipher SHARK”, In International Workshop on Fast Software Encryption, Springer, Berlin, Heidelberg, 99-111, February, 1996.
  • [6] R. Anderson, E. Biham, “Two practical and provably secure block ciphers: BEAR and LION”, In International Workshop on Fast Software Encryption, Springer, Berlin, Heidelberg, 113-120, February, 1996.
  • [7] M. T. Ahvanooey, Q. Li, J. Hou, H. D. Mazraeh, J. Zhang, “AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media”, IEEE Access, 6, 65981-65995, 2018.
  • [8] J. Daemen, V. Rijmen, “AES proposal: Rijndael”, 1996.
  • [9] J. R. Padilla-López, A. A. Chaaraoui, F. Flórez-Revuelta, “Visual privacy protection methods: A survey”, Expert Systems with Applications, 42(9), 4177-4195, 2015.
  • [10] I. C. Lin, Y. B. Lin, C. M. Wang, “Hiding data in spatial domain images with distortion tolerance”, Computer Standards & Interfaces, 31(2), 458-464, 2009.
  • [11] S. Solak, U. Altınışık, “LSB Substitution and PVD performance analysis for image steganography”, International Journal of Computer Sciences and Engineering, 6(10), 1-4, 2018.
  • [12] S. Solak, U. Altınışık, “En Düşük Anlamlı Son Üç Bitin Değiştirilmesi Yöntemi Kullanılarak Renkli Görüntülere Verilerin Gizlenmesi”, Uluslararası Marmara Fen ve Sosyal Bilimler Kongresi (IMASCON), 344-347, Kocaeli, Turkey, 2018.
  • [13] M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. Ho, K. H. Jung, “Image steganography in spatial domain: A survey”, Signal Processing: Image Communication, 65, 46-66, 2018.
  • [14] H. Al-Dmour, A. Al-Ani, “A steganography embedding method based on edge identification and XOR coding”, Expert systems with Applications, 46, 293-306, 2016.
  • [15] W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding”, IBM systems journal, 35(3.4), 313-336, 1996.
  • [16] R. Z. Wang, C. F. Lin, J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm”, Pattern recognition, 34(3), 671-683, 2001.
  • [17] C. K. Chan, L. M. Cheng, “Hiding data in images by simple LSB substitution”, Pattern recognition, 37(3), 469-474, 2004.
  • [18] K. Muhammad, J. Ahmad, N. U. Rehman, Z. Jan, M. Sajjad, “CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method”, Multimedia Tools and Applications, 76(6), 8597-8626, 2017.
  • [19] C. Kocak, “Clsm: Couple Layered Security Model A High-Capacity Data Hiding Scheme Using With Steganography”, Image Analysis & Stereology, 36(1), 15-23, 2017.
  • [20] T. Aydoğan, C. Bayilmiş, “A new efficient block matching data hiding method based on scanning order selection in medical images”, Turkish Journal of Electrical Engineering & Computer Sciences, 25(1), 461-473, 2017.
  • [21] A. Hore, D. Ziou, “Image quality metrics: PSNR vs. SSIM”, In Pattern recognition (icpr) 20th international conference on IEEE, 2366-2369, 2010.
  • [22] Z. Wang, E. P. Simoncelli, A. C. Bovik, “Multiscale structural similarity for image quality assessment”, In Signals, Systems and Computers Conference Record of the Thirty-Seventh Asilomar Conference on, 2, 1398-1402, 2004.
  • [23] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction”, IEEE Transactions on Circuits and Systems for Video Technology, 19(7), 989-999, 2009.
  • [24] W. Hong, “Adaptive reversible data hiding method based on error energy control and histogram shifting”, Optics Communications, 285(2), 101–108, 2012.
  • [25] B. Ou, X. Li, Y. Zhao, R. Ni, “Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding”, Signal Processing, 108, 642-657, 2015.
  • [26] R. Bhardwaj, V. Sharma, “Image steganography based on complemented message and inverted bit LSB substitution”, Procedia Computer Science, 93, 832-838, 2016.

Steganografi için yeni bir yaklaşım: (SED-LSB) LSB ile şifrelenmiş verilerin bit kaydırma işlemi

Yıl 2019, , 75 - 81, 31.01.2019
https://doi.org/10.17671/gazibtd.435437

Öz

Makalede, veri gizlemede yaygın kullanılan LSB yöntemine bit kaydırma
özelliği eklenerek yeni bir yöntem sunulmaktadır. Örtü görüntüye saklanacak
olan metinler ilk olarak kullanıcıdan alınan anahtar sayesinde
şifrelenmektedir. Bu işlemin ardından bit kaydırma özelliği kullanılarak gizli
veri oluşturulmaktadır. Gizli veri, LSB yöntemi kullanılarak örtü görüntü
içerisine gizlenmektedir. Çalışma MATLAB ortamında GUI hazırlanarak
gerçekleştirilmiş olup, elde edilen PSNR ve SSIM değerleri makalede sunulmaktadır.
512 x 512 boyutlarında kullanılan Lena, Peppers, Fruits ve Baboon resimlerine
87373 bayt veri gizlenmiştir. PSNR değerlerinin 51,615 ile 51,656 arasında,
SSIM değerlerinin ise 0,99937 ile 0,99982 arasında olduğu gözlenmiştir.
Önerilen yöntem ile resimlerin içerisine yüksek kapasitede veriler güvenli bir
şekilde gizlenmekte ve örtü görüntü ile stego görüntünün benzerliği yüksek
çıkmaktadır. 

Kaynakça

  • [1] W. Diffie, M. Hellman, “New directions in cryptography”, IEEE transactions on Information Theory, 22(6), 644-654, 1976.
  • [2] C. E. Shannon, “Communication theory of secrecy systems”, Bell Labs Technical Journal, 28(4), 656-715, 1949.
  • [3] N. Topaloğlu, M. H. Calp, B. Türk, “Bilgi Güvenliği Kapsamında Yeni Bir Veri Şifreleme Algoritması Tasarımı ve Gerçekleştirilmesi”, Bilişim Teknolojileri Dergisi, 9 (3), 291-301, 2016.
  • [4] A. Coşkun, Ü. Ülker, “Ulusal Bilgi Güvenliğine Yönelik Bir Kriptografi Algoritması Geliştirilmesi ve Harf Frekans Analizinine Karşı Güvenirlik Tespiti”, Bilişim Teknolojileri Dergisi, 6 (2), 31-39, 2013.
  • [5] V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, E. De Win, “The cipher SHARK”, In International Workshop on Fast Software Encryption, Springer, Berlin, Heidelberg, 99-111, February, 1996.
  • [6] R. Anderson, E. Biham, “Two practical and provably secure block ciphers: BEAR and LION”, In International Workshop on Fast Software Encryption, Springer, Berlin, Heidelberg, 113-120, February, 1996.
  • [7] M. T. Ahvanooey, Q. Li, J. Hou, H. D. Mazraeh, J. Zhang, “AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media”, IEEE Access, 6, 65981-65995, 2018.
  • [8] J. Daemen, V. Rijmen, “AES proposal: Rijndael”, 1996.
  • [9] J. R. Padilla-López, A. A. Chaaraoui, F. Flórez-Revuelta, “Visual privacy protection methods: A survey”, Expert Systems with Applications, 42(9), 4177-4195, 2015.
  • [10] I. C. Lin, Y. B. Lin, C. M. Wang, “Hiding data in spatial domain images with distortion tolerance”, Computer Standards & Interfaces, 31(2), 458-464, 2009.
  • [11] S. Solak, U. Altınışık, “LSB Substitution and PVD performance analysis for image steganography”, International Journal of Computer Sciences and Engineering, 6(10), 1-4, 2018.
  • [12] S. Solak, U. Altınışık, “En Düşük Anlamlı Son Üç Bitin Değiştirilmesi Yöntemi Kullanılarak Renkli Görüntülere Verilerin Gizlenmesi”, Uluslararası Marmara Fen ve Sosyal Bilimler Kongresi (IMASCON), 344-347, Kocaeli, Turkey, 2018.
  • [13] M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. Ho, K. H. Jung, “Image steganography in spatial domain: A survey”, Signal Processing: Image Communication, 65, 46-66, 2018.
  • [14] H. Al-Dmour, A. Al-Ani, “A steganography embedding method based on edge identification and XOR coding”, Expert systems with Applications, 46, 293-306, 2016.
  • [15] W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding”, IBM systems journal, 35(3.4), 313-336, 1996.
  • [16] R. Z. Wang, C. F. Lin, J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm”, Pattern recognition, 34(3), 671-683, 2001.
  • [17] C. K. Chan, L. M. Cheng, “Hiding data in images by simple LSB substitution”, Pattern recognition, 37(3), 469-474, 2004.
  • [18] K. Muhammad, J. Ahmad, N. U. Rehman, Z. Jan, M. Sajjad, “CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method”, Multimedia Tools and Applications, 76(6), 8597-8626, 2017.
  • [19] C. Kocak, “Clsm: Couple Layered Security Model A High-Capacity Data Hiding Scheme Using With Steganography”, Image Analysis & Stereology, 36(1), 15-23, 2017.
  • [20] T. Aydoğan, C. Bayilmiş, “A new efficient block matching data hiding method based on scanning order selection in medical images”, Turkish Journal of Electrical Engineering & Computer Sciences, 25(1), 461-473, 2017.
  • [21] A. Hore, D. Ziou, “Image quality metrics: PSNR vs. SSIM”, In Pattern recognition (icpr) 20th international conference on IEEE, 2366-2369, 2010.
  • [22] Z. Wang, E. P. Simoncelli, A. C. Bovik, “Multiscale structural similarity for image quality assessment”, In Signals, Systems and Computers Conference Record of the Thirty-Seventh Asilomar Conference on, 2, 1398-1402, 2004.
  • [23] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction”, IEEE Transactions on Circuits and Systems for Video Technology, 19(7), 989-999, 2009.
  • [24] W. Hong, “Adaptive reversible data hiding method based on error energy control and histogram shifting”, Optics Communications, 285(2), 101–108, 2012.
  • [25] B. Ou, X. Li, Y. Zhao, R. Ni, “Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding”, Signal Processing, 108, 642-657, 2015.
  • [26] R. Bhardwaj, V. Sharma, “Image steganography based on complemented message and inverted bit LSB substitution”, Procedia Computer Science, 93, 832-838, 2016.
Toplam 26 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgisayar Yazılımı
Bölüm Makaleler
Yazarlar

Serdar Solak 0000-0003-1081-1598

Umut Altınışık 0000-0003-3119-3338

Yayımlanma Tarihi 31 Ocak 2019
Gönderilme Tarihi 21 Haziran 2018
Yayımlandığı Sayı Yıl 2019

Kaynak Göster

APA Solak, S., & Altınışık, U. (2019). A new approach for Steganography: Bit shifting operation of encrypted data in LSB (SED-LSB). Bilişim Teknolojileri Dergisi, 12(1), 75-81. https://doi.org/10.17671/gazibtd.435437