Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB
Yıl 2017,
Cilt: 10 Sayı: 1, 48 - 53, 03.10.2017
Türker Tuncer
,
Engin Avcı
Öz
Bir Steganografik metodun değerlendirme kriterlerinden
biri de dayanıklılıktır. Bu çalışmada, iletim hattı boyunca örtü verinin
uğrayabileceği saldırılara karşı gizlenmiş veriyi korumak hedeflenmiştir.
Resmin parlaklık değişimlerine karşı gizlenmiş mesajı korumak için yerel ikili
örüntü (LBP) operatörünün kullanılması önerilmiştir. Daha önceden damgalama
tekniklerinde kullanılan bu metodun, daha farklı bir yaklaşımla steganografide
kullanılması önerilmiştir. Resme LBP operatörü uygulandıktan sonra LBP haritasının
üzerinde, LSB metodu kullanılarak veri gizlenecektir. Önerilen algoritmanın
saldırılara karşı dayanıklılığı, kapasitesi ve taşıyıcıdaki değişim
ölçülecektir.
Kaynakça
- [1] Shen, S. Y., Huang, L. H., “A data hiding scheme using pixel value differencing and improving exploiting modification directions”, Computers & Security, Cilt 48, 131-141, 2015.
- [2] Lin, C. C., Liu, X. L., Yuan, S. M., “Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping”, Information Sciences, Cilt 293, 314-326, 2015.
- [3] Lu, T. C., Tseng, C. Y., Deng, K. M., “Reversible data hiding using local edge sensing prediction methods and adaptive thresholds”, Signal Processing, Cilt 104, 152-166, 2014.
- [4] S. U. Maheswari, S. U., Hemanth, D. J., “Frequency domain QR code based image steganography using Fresnelet transform”, AEU - International Journal of Electronics and Communications, Cilt 69, No 2, 539-544, 2015.
- [5] Roy, S., Venkateswaran, P., “A Text based Steganography Technique with Indian Root”, Procedia Technology, Cilt 10,167-171, 2013.
- [6] Dasgupta, K., Mondal, J. K., Dutta P., “Optimized Video Steganography Using Genetic Algorithm (GA)”, Procedia Technology, Cilt 10,131-137, 2013.
- [7] Mali, S. N., Patil, P. M., Jalnekar, R. M., “Robust and secured image-adaptive data hiding”, Digital Signal Processing, Cilt 22, No 2, 314-323, 2012.
- [8] Yan, D., Wang, R., Yu, X., Zhu J., “Steganalysis for MP3Stego using differential statistics of quantization step”, Digital Signal Processing, Cilt 23, No 4, 1181-1185, 2013.
- [9] Tang, M., Hu, J., Song W., “A high capacity image steganography using multi-layer embedding”, Optik - International Journal for Light and Electron Optics, Cilt 125, No 15, 3972-3976, 2014.
- [10] Wu, M. Y., Ho, Y. K., Lee J., H., “An iterative method of palette-based image steganography”, Pattern Recognition Letters, Cilt 25, No 3, 301-309, 2004.
- [11] Şahin Mesut A., Mesut A.,Saklı M.T., “Görüntü Steganografide Gizlilik Paylaşım Şemalarının Kullanılması ve Güvenliğe Etkileri”, III Ağ ve Bilgi Güvenliği Sempozyumu, Ankara-Türkiye, 2010.
- [12] Chen, W. Y., “Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques”, Applied Mathematics and Computation, Cilt 196, No 1, 40-54, 2008.
- [13] Ioannidou, A., Halkidis, S. T., Stephanides, G., “A novel technique for image steganography based on a high payload method and edge detection”, Expert Systems with Applications, Cilt 39, No 14, 11517-11524, 2012.
- [14] Elshoura, S. M., Megherbi, D. B., “A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments”, Signal Processing: Image Communication, Cilt 28, No 5, 531-552, 2013.
- [15] Yang, C. H., “Inverted pattern approach to improve image quality of information hiding by LSB substitution”, Pattern Recognition, Cilt 41, No 8, 2674-2683, 2008.
- [16] Chen, S. K., “A module-based LSB substitution method with lossless secret data compression”, Computer Standards & Interfaces, Cilt 33, No 4, 367-371, 2011.
- [17] Chang, C.C., Hsiao, J.Y., Chen, C.S., “Finding optimal Least-Significant-Bit substitutionin image hiding by dynamic programming strategy”, Pattern Recognition, Cilt 36, 1583–1595, 2003.
- [18] Chan, C. K., Cheng, L. M., “Improved hiding data in images by optimal moderately significant-bit replacement”, IEE Electron. Lett., Cilt 37, No 16, 1017–1018, 2001.
- [19] Yang, B., Chen, S., “A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image”, Neurocomputing, Cilt 120, 365-379, 2013.
- [20] Luo, Y., Wu, C. M., Zhang, Y., “Facial expression feature extraction using hybrid PCA and LBP”, The Journal of China Universities of Posts and Telecommunications, Cilt 20, No 2, 120-124, 2013.
- [21] Nanni, L., Lumini, A., Brahnam, S., “Survey on LBP based texture descriptors for image classification”, Expert Systems with Applications, Cilt 39, No 3, 3634-3641, 2012.
- [22] Kanan, H. R., Nazeri B., “A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm”, Expert Systems with Applications, Cilt 41, No 14, 6123-6130, 2014.
Yıl 2017,
Cilt: 10 Sayı: 1, 48 - 53, 03.10.2017
Türker Tuncer
,
Engin Avcı
Kaynakça
- [1] Shen, S. Y., Huang, L. H., “A data hiding scheme using pixel value differencing and improving exploiting modification directions”, Computers & Security, Cilt 48, 131-141, 2015.
- [2] Lin, C. C., Liu, X. L., Yuan, S. M., “Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping”, Information Sciences, Cilt 293, 314-326, 2015.
- [3] Lu, T. C., Tseng, C. Y., Deng, K. M., “Reversible data hiding using local edge sensing prediction methods and adaptive thresholds”, Signal Processing, Cilt 104, 152-166, 2014.
- [4] S. U. Maheswari, S. U., Hemanth, D. J., “Frequency domain QR code based image steganography using Fresnelet transform”, AEU - International Journal of Electronics and Communications, Cilt 69, No 2, 539-544, 2015.
- [5] Roy, S., Venkateswaran, P., “A Text based Steganography Technique with Indian Root”, Procedia Technology, Cilt 10,167-171, 2013.
- [6] Dasgupta, K., Mondal, J. K., Dutta P., “Optimized Video Steganography Using Genetic Algorithm (GA)”, Procedia Technology, Cilt 10,131-137, 2013.
- [7] Mali, S. N., Patil, P. M., Jalnekar, R. M., “Robust and secured image-adaptive data hiding”, Digital Signal Processing, Cilt 22, No 2, 314-323, 2012.
- [8] Yan, D., Wang, R., Yu, X., Zhu J., “Steganalysis for MP3Stego using differential statistics of quantization step”, Digital Signal Processing, Cilt 23, No 4, 1181-1185, 2013.
- [9] Tang, M., Hu, J., Song W., “A high capacity image steganography using multi-layer embedding”, Optik - International Journal for Light and Electron Optics, Cilt 125, No 15, 3972-3976, 2014.
- [10] Wu, M. Y., Ho, Y. K., Lee J., H., “An iterative method of palette-based image steganography”, Pattern Recognition Letters, Cilt 25, No 3, 301-309, 2004.
- [11] Şahin Mesut A., Mesut A.,Saklı M.T., “Görüntü Steganografide Gizlilik Paylaşım Şemalarının Kullanılması ve Güvenliğe Etkileri”, III Ağ ve Bilgi Güvenliği Sempozyumu, Ankara-Türkiye, 2010.
- [12] Chen, W. Y., “Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques”, Applied Mathematics and Computation, Cilt 196, No 1, 40-54, 2008.
- [13] Ioannidou, A., Halkidis, S. T., Stephanides, G., “A novel technique for image steganography based on a high payload method and edge detection”, Expert Systems with Applications, Cilt 39, No 14, 11517-11524, 2012.
- [14] Elshoura, S. M., Megherbi, D. B., “A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments”, Signal Processing: Image Communication, Cilt 28, No 5, 531-552, 2013.
- [15] Yang, C. H., “Inverted pattern approach to improve image quality of information hiding by LSB substitution”, Pattern Recognition, Cilt 41, No 8, 2674-2683, 2008.
- [16] Chen, S. K., “A module-based LSB substitution method with lossless secret data compression”, Computer Standards & Interfaces, Cilt 33, No 4, 367-371, 2011.
- [17] Chang, C.C., Hsiao, J.Y., Chen, C.S., “Finding optimal Least-Significant-Bit substitutionin image hiding by dynamic programming strategy”, Pattern Recognition, Cilt 36, 1583–1595, 2003.
- [18] Chan, C. K., Cheng, L. M., “Improved hiding data in images by optimal moderately significant-bit replacement”, IEE Electron. Lett., Cilt 37, No 16, 1017–1018, 2001.
- [19] Yang, B., Chen, S., “A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image”, Neurocomputing, Cilt 120, 365-379, 2013.
- [20] Luo, Y., Wu, C. M., Zhang, Y., “Facial expression feature extraction using hybrid PCA and LBP”, The Journal of China Universities of Posts and Telecommunications, Cilt 20, No 2, 120-124, 2013.
- [21] Nanni, L., Lumini, A., Brahnam, S., “Survey on LBP based texture descriptors for image classification”, Expert Systems with Applications, Cilt 39, No 3, 3634-3641, 2012.
- [22] Kanan, H. R., Nazeri B., “A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm”, Expert Systems with Applications, Cilt 41, No 14, 6123-6130, 2014.