Araştırma Makalesi
BibTex RIS Kaynak Göster

GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI

Yıl 2021, Cilt: 29 Sayı: 1, 28 - 42, 30.04.2021
https://doi.org/10.31796/ogummf.825306

Öz

İnternet kullanımının artması ve teknolojik gelişmelerle beraber insanlar her gün yüzlerce fotoğraf çekmektedir. Gün geçtikçe artan fotoğraflar telefon hafızasında fazlasıyla yer kaplamaktadır. Flash disk, bilgisayar ve telefonlarda bu fotoğrafların saklanması, kaybolma ve bozulma gibi durumlar nedeniyle çok güvenilir olmamaktadır. Bu durum telefon dışında yeni depolama alanları ihtiyacını ortaya çıkarmıştır. Bu noktada alternatif olarak bulut depolama sistemleri kullanılmaktadır. Bulut depolama alanları sisteme erişim ve saldırılara karşı güvenlik tedbirleri içermektedir fakat sisteme yüklenen resimler üzerinde doğrudan bir işlem yapmamaktadır. Bulut hesaplar bazen kötü niyetli kişiler tarafından ele geçirilmekte ve kişilerin fotoğrafları çalınabilmektedir. Bu durumu önlemek için depolama işleminden önce görüntü üzerinde şifreleme algoritmaları kullanan bir sistem önerilmiştir. Sistemde CodeIgniter (PHP Framework) altındaki çeşitli simetrik şifreleme algoritmaları karşılaştırılarak incelenmiş ve uygulama sonuçları sunulmuştur. Görüntülerin şifrelenerek farklı bir dosya uzantısı ile bulut depolama(AWS) ortamında ya da lokal ortamda saklanması sağlanmıştır. Bu çalışmada önerilen sistem ile görüntülerin tutuldukları ortamdan bağımsız olarak daha güvenli bir depolama imkanı sağlanması hedeflenmiştir.

Kaynakça

  • Adams, C., Heys, H., Tavares, S., & Wiener, M. (1999). An analysis of the CAST-256 cipher. Paper presented at the Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No. 99TH8411).
  • Anandakumar, S. (2015). Image Cryptography Using RSA Algorithm in Network Security. International Journal of Computer Science & Engineering Technology, 5(9), 326-330.
  • Askar, S. S., Karawia, A., & Alshamrani, A. M. (2015). Image Encryption Algorithm Based on Chaotic Economic Model. Mathematical Problems in Engineering, 2015, 1-10.
  • Babenko, L., Ishchukova, E., & Maro, E. (2013). GOST encryption algorithm and approaches to its analysis. In Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 34-61): IGI Global.
  • Brown, L., & Pieprzyk, J. (1998). Introducing the new LOKI97 block cipher. Paper presented at the First AES Candidate Conference.
  • Calzavara , S. ( 2020 ) . Security I I - CSRF & XSSI.
  • Chang, C.-C., Hwang, M.-S., & Chen, T.-S. (2001). A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), 83-91. doi:https://doi.org/10.1016/S0164-1212(01)00029-2
  • Chepuri, S. (2017). An RGB image encryption using RSA algorithm. International Journal of Current Trends in Engineering & Research (IJCTER), 3(3), 1-7.
  • Çiflikli, C., & Aba, K. TEA ve XTEA Şifreleme Algoritmaları İçin Kaos Tabanlı Kaydırma Dizisi Oluşturulması ve Uygulanması.
  • Dong, X., Li, L., Jia, K., & Wang, X. (2015). Improved attacks on reduced-round Camellia-128/192/256. Paper presented at the Cryptographers’ Track at the RSA Conference.
  • DuBois, P. (2008). MySQL : Pearson Education.
  • Gajda, W. (2013). Instant PhpStorm Starter: Packt Publishing Ltd.
  • Ghoradkar, S., & Shinde, A. (2015). Review on image encryption and decryption using AES algorithm. International Journal of Computer Applications, 975, 8887.
  • Goel, A., & Chandra, N. (2012). A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based On Sorting Group-Wise Of RGB Values and Explosive Inter-Pixel Displacement. International Journal of Image, Graphics and Signal Processing, 4, 16-22.
  • Guvenoglu, E. (2016). Resim Şifreleme Amacıyla Dinamik S Kutusu Tasarımı İçin Bir Yöntem. El-Cezeri Journal of Science and Engineering, 3(2).
  • Güvenoglu, E., & Esin, E. M. (2009). Knutt / Durstenfeld Shuffle Algoritmasinin Resim Sifreleme Amaciyla Kullanilmasi.
  • Halfond, W. G., Viegas, J., & Orso, A. (2006). A classification of SQL-injection attacks and countermeasures. Paper presented at the Proceedings of the IEEE international symposium on secure software engineering.
  • Hariyanto, E., & Rahim, R. (2016). Arnold’s cat map algorithm in digital image encryption. International Journal of Science and Research (IJSR), 5(10), 1363-1365.
  • Kester, Q.-A. (2013). Image Encryption based on the RGB PIXEL Transposition and Shuffling. International Journal of Computer Network and Information Security, 5(7), 43.
  • Knudsen, L. R., Rijmen, V., Rivest, R. L., & Robshaw, M. J. B. (1998). On the Design and Security of RC2. In (pp. 206-221): Springer Berlin Heidelberg.
  • Kumar, R. R., & Mathew, J. (2020). Image Encryption:Traditional Methods vs Alternative Methods. 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), 1-7.
  • Kumari, M., Gupta, S., & Sardana, P. (2017). A Survey of Image Encryption Algorithms. 3D Research, 8, 1-35.
  • Kumari, S. (2017). A research Paper on Cryptography Encryption and Compression Techniques. International Journal of Engineering and Computer Science, 6.
  • Liu, K., & Dong, L.-j. (2012). Research on Cloud Data Storage Technology and Its Architecture Implementation. Procedia Engineering, 29, 133-137. doi:https://doi.org/10.1016/j.proeng.2011.12.682
  • Liu, X., Xiao, D., & Xiang, Y. (2018). Quantum image encryption using intra and inter bit permutation based on logistic map. IEEE Access, 7, 6937-6946.
  • Maniccam, S. S., & Bourbakis, N. G. (2001). Lossless image compression and encryption using SCAN. Pattern Recognition, 34(6), 1229-1245. doi:https://doi.org/10.1016/S0031-3203(00)00062-5
  • Nie, T., & Zhang, T. (2009). A study of DES and Blowfish encryption algorithm. Paper presented at the Tencon 2009-2009 IEEE Region 10 Conference.
  • Sakal, H., & Yıldırım, M. (2016). Görüntü şifreleme için scan paternlerini kullanan hibrit bir yöntem. Selçuk-Teknik Dergisi, 15(3), 264-283.
  • Selent, D. (2010). Advanced encryption standard. Rivier Academic Journal, 6(2), 1-14.
  • Sharma, P., Godara, M., Singh, R., Tech, S. M., & Sabo, T. (2012). Digital Image Encryption Techniques: A Review. International Journal of Computing & Business Research, 2229-6166.
  • Sharmila, D., & Neelaveni, R. (2009). A Proposed SAFER plus security algorithm using Fast Walsh Hadamard transform for Bluetooth technology. International Journal of Wireless & Mobile Networks (IJWMN), 1(2), 80-88.
  • Siame, A., & Kunda, D. (2017). Evolution of PHP Applications: A Systematic Literature Review. Int. J. Recent Contributions Eng. Sci. IT, 5, 28-39.
  • Thakur, J., & Kumar, N. (2011). DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis. International journal of emerging technology and advanced engineering, 1(2), 6-12.
  • Upadhyaya, A., Shokeen, V., & Srivastava, G. (2015). Image encryption: using aes, feature extraction and random no. generation. Paper presented at the 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions).
  • Upton, D. (2007). CodeIgniter for rapid php application development: Packt Publishing Ltd.
  • Varia, J., & Mathew, S. (2014). Overview of amazon web services. Amazon Web Services, 1-22.
  • Verma, H. K., & Singh, R. K. (2012). Performance analysis of RC6, Twofish and Rijndael block cipher algorithms. International Journal of Computer Applications, 42(16), 1-7.
  • Vijayalakshmi, K., & Syed Mohamed, E. (2020). Case Study: Extenuation of XSS Attacks through Various Detecting and Defending Techniques. Journal of Applied Security Research, 1-36.
  • Yen, J.-C., & Guo, J.-I. (1999). A new image encryption algorithm and its VLSI architecture. Paper presented at the 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No. 99TH8461).

SAFE STORAGE OF IMAGE FILES BY ENCRYPTING

Yıl 2021, Cilt: 29 Sayı: 1, 28 - 42, 30.04.2021
https://doi.org/10.31796/ogummf.825306

Öz

With the increase in internet usage and technological developments, people take hundreds of photos every day. Photos increasing day by day take up a lot of space in the phone memory. Storing these photos in flash disk, computers and phones is not very reliable due to situations such as loss and deterioration. This situation has created the need for new storage areas other than the phone. At this point, cloud storage systems are used as an alternative. Cloud storage areas contain security measures against system access and attacks, but they do not directly work on the images uploaded to the system. Cloud accounts are sometimes hijacked by malicious people and photos of people can be stolen. In order to prevent this situation, a system that uses encryption algorithms on the images before storage has been proposed. Various symmetric encryption algorithms under CodeIgniter (PHP Framework) have been compared in the system and the application results are presented. Images are encrypted and stored in cloud storage (AWS) or local environment with a different file extension. With the system proposed in this study, it is aimed to provide a safer storage opportunity independent of the environment in which the images are stored.

Kaynakça

  • Adams, C., Heys, H., Tavares, S., & Wiener, M. (1999). An analysis of the CAST-256 cipher. Paper presented at the Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No. 99TH8411).
  • Anandakumar, S. (2015). Image Cryptography Using RSA Algorithm in Network Security. International Journal of Computer Science & Engineering Technology, 5(9), 326-330.
  • Askar, S. S., Karawia, A., & Alshamrani, A. M. (2015). Image Encryption Algorithm Based on Chaotic Economic Model. Mathematical Problems in Engineering, 2015, 1-10.
  • Babenko, L., Ishchukova, E., & Maro, E. (2013). GOST encryption algorithm and approaches to its analysis. In Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 34-61): IGI Global.
  • Brown, L., & Pieprzyk, J. (1998). Introducing the new LOKI97 block cipher. Paper presented at the First AES Candidate Conference.
  • Calzavara , S. ( 2020 ) . Security I I - CSRF & XSSI.
  • Chang, C.-C., Hwang, M.-S., & Chen, T.-S. (2001). A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), 83-91. doi:https://doi.org/10.1016/S0164-1212(01)00029-2
  • Chepuri, S. (2017). An RGB image encryption using RSA algorithm. International Journal of Current Trends in Engineering & Research (IJCTER), 3(3), 1-7.
  • Çiflikli, C., & Aba, K. TEA ve XTEA Şifreleme Algoritmaları İçin Kaos Tabanlı Kaydırma Dizisi Oluşturulması ve Uygulanması.
  • Dong, X., Li, L., Jia, K., & Wang, X. (2015). Improved attacks on reduced-round Camellia-128/192/256. Paper presented at the Cryptographers’ Track at the RSA Conference.
  • DuBois, P. (2008). MySQL : Pearson Education.
  • Gajda, W. (2013). Instant PhpStorm Starter: Packt Publishing Ltd.
  • Ghoradkar, S., & Shinde, A. (2015). Review on image encryption and decryption using AES algorithm. International Journal of Computer Applications, 975, 8887.
  • Goel, A., & Chandra, N. (2012). A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based On Sorting Group-Wise Of RGB Values and Explosive Inter-Pixel Displacement. International Journal of Image, Graphics and Signal Processing, 4, 16-22.
  • Guvenoglu, E. (2016). Resim Şifreleme Amacıyla Dinamik S Kutusu Tasarımı İçin Bir Yöntem. El-Cezeri Journal of Science and Engineering, 3(2).
  • Güvenoglu, E., & Esin, E. M. (2009). Knutt / Durstenfeld Shuffle Algoritmasinin Resim Sifreleme Amaciyla Kullanilmasi.
  • Halfond, W. G., Viegas, J., & Orso, A. (2006). A classification of SQL-injection attacks and countermeasures. Paper presented at the Proceedings of the IEEE international symposium on secure software engineering.
  • Hariyanto, E., & Rahim, R. (2016). Arnold’s cat map algorithm in digital image encryption. International Journal of Science and Research (IJSR), 5(10), 1363-1365.
  • Kester, Q.-A. (2013). Image Encryption based on the RGB PIXEL Transposition and Shuffling. International Journal of Computer Network and Information Security, 5(7), 43.
  • Knudsen, L. R., Rijmen, V., Rivest, R. L., & Robshaw, M. J. B. (1998). On the Design and Security of RC2. In (pp. 206-221): Springer Berlin Heidelberg.
  • Kumar, R. R., & Mathew, J. (2020). Image Encryption:Traditional Methods vs Alternative Methods. 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), 1-7.
  • Kumari, M., Gupta, S., & Sardana, P. (2017). A Survey of Image Encryption Algorithms. 3D Research, 8, 1-35.
  • Kumari, S. (2017). A research Paper on Cryptography Encryption and Compression Techniques. International Journal of Engineering and Computer Science, 6.
  • Liu, K., & Dong, L.-j. (2012). Research on Cloud Data Storage Technology and Its Architecture Implementation. Procedia Engineering, 29, 133-137. doi:https://doi.org/10.1016/j.proeng.2011.12.682
  • Liu, X., Xiao, D., & Xiang, Y. (2018). Quantum image encryption using intra and inter bit permutation based on logistic map. IEEE Access, 7, 6937-6946.
  • Maniccam, S. S., & Bourbakis, N. G. (2001). Lossless image compression and encryption using SCAN. Pattern Recognition, 34(6), 1229-1245. doi:https://doi.org/10.1016/S0031-3203(00)00062-5
  • Nie, T., & Zhang, T. (2009). A study of DES and Blowfish encryption algorithm. Paper presented at the Tencon 2009-2009 IEEE Region 10 Conference.
  • Sakal, H., & Yıldırım, M. (2016). Görüntü şifreleme için scan paternlerini kullanan hibrit bir yöntem. Selçuk-Teknik Dergisi, 15(3), 264-283.
  • Selent, D. (2010). Advanced encryption standard. Rivier Academic Journal, 6(2), 1-14.
  • Sharma, P., Godara, M., Singh, R., Tech, S. M., & Sabo, T. (2012). Digital Image Encryption Techniques: A Review. International Journal of Computing & Business Research, 2229-6166.
  • Sharmila, D., & Neelaveni, R. (2009). A Proposed SAFER plus security algorithm using Fast Walsh Hadamard transform for Bluetooth technology. International Journal of Wireless & Mobile Networks (IJWMN), 1(2), 80-88.
  • Siame, A., & Kunda, D. (2017). Evolution of PHP Applications: A Systematic Literature Review. Int. J. Recent Contributions Eng. Sci. IT, 5, 28-39.
  • Thakur, J., & Kumar, N. (2011). DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis. International journal of emerging technology and advanced engineering, 1(2), 6-12.
  • Upadhyaya, A., Shokeen, V., & Srivastava, G. (2015). Image encryption: using aes, feature extraction and random no. generation. Paper presented at the 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions).
  • Upton, D. (2007). CodeIgniter for rapid php application development: Packt Publishing Ltd.
  • Varia, J., & Mathew, S. (2014). Overview of amazon web services. Amazon Web Services, 1-22.
  • Verma, H. K., & Singh, R. K. (2012). Performance analysis of RC6, Twofish and Rijndael block cipher algorithms. International Journal of Computer Applications, 42(16), 1-7.
  • Vijayalakshmi, K., & Syed Mohamed, E. (2020). Case Study: Extenuation of XSS Attacks through Various Detecting and Defending Techniques. Journal of Applied Security Research, 1-36.
  • Yen, J.-C., & Guo, J.-I. (1999). A new image encryption algorithm and its VLSI architecture. Paper presented at the 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No. 99TH8461).
Toplam 39 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Bilgisayar Yazılımı
Bölüm Araştırma Makaleleri
Yazarlar

Merve Ceyhan 0000-0003-0733-3652

Esra Yolaçan 0000-0002-0008-1037

Yayımlanma Tarihi 30 Nisan 2021
Kabul Tarihi 8 Ocak 2021
Yayımlandığı Sayı Yıl 2021 Cilt: 29 Sayı: 1

Kaynak Göster

APA Ceyhan, M., & Yolaçan, E. (2021). GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI. Eskişehir Osmangazi Üniversitesi Mühendislik Ve Mimarlık Fakültesi Dergisi, 29(1), 28-42. https://doi.org/10.31796/ogummf.825306
AMA Ceyhan M, Yolaçan E. GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI. ESOGÜ Müh Mim Fak Derg. Nisan 2021;29(1):28-42. doi:10.31796/ogummf.825306
Chicago Ceyhan, Merve, ve Esra Yolaçan. “GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI”. Eskişehir Osmangazi Üniversitesi Mühendislik Ve Mimarlık Fakültesi Dergisi 29, sy. 1 (Nisan 2021): 28-42. https://doi.org/10.31796/ogummf.825306.
EndNote Ceyhan M, Yolaçan E (01 Nisan 2021) GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI. Eskişehir Osmangazi Üniversitesi Mühendislik ve Mimarlık Fakültesi Dergisi 29 1 28–42.
IEEE M. Ceyhan ve E. Yolaçan, “GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI”, ESOGÜ Müh Mim Fak Derg, c. 29, sy. 1, ss. 28–42, 2021, doi: 10.31796/ogummf.825306.
ISNAD Ceyhan, Merve - Yolaçan, Esra. “GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI”. Eskişehir Osmangazi Üniversitesi Mühendislik ve Mimarlık Fakültesi Dergisi 29/1 (Nisan 2021), 28-42. https://doi.org/10.31796/ogummf.825306.
JAMA Ceyhan M, Yolaçan E. GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI. ESOGÜ Müh Mim Fak Derg. 2021;29:28–42.
MLA Ceyhan, Merve ve Esra Yolaçan. “GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI”. Eskişehir Osmangazi Üniversitesi Mühendislik Ve Mimarlık Fakültesi Dergisi, c. 29, sy. 1, 2021, ss. 28-42, doi:10.31796/ogummf.825306.
Vancouver Ceyhan M, Yolaçan E. GÖRÜNTÜ DOSYALARININ ŞİFRELENEREK GÜVENLİ ŞEKİLDE SAKLANMASI. ESOGÜ Müh Mim Fak Derg. 2021;29(1):28-42.

20873 13565 13566 15461 13568  14913