Araştırma Makalesi
BibTex RIS Kaynak Göster

KAOTİK HARİTA TABANLI ÇOK KATMANLI GÖRÜNTÜ STEGANOGRAFİSİ İLE HASSAS VERİLERİN GİZLENMESİ VE KORUNMASI

Yıl 2025, Cilt: 24 Sayı: 48, 477 - 508, 18.12.2025
https://doi.org/10.55071/ticaretfbd.1705157

Öz

Son yıllarda internet ve mobil cihazlar üzerinden veri paylaşımının artmasıyla birlikte bilgi güvenliği sorunları da önemli ölçüde artmıştır. Bu bağlamda, verilerin yetkisiz erişimden korunması amacıyla steganografi ve kriptografi gibi yöntemler üzerine yoğun araştırmalar yapılmaktadır. Bu çalışma, geleneksel En Düşük Bite Ekleme (LSB) steganografi yönteminin güvenlik açıklarını gidermek amacıyla Kaotik Çadır Haritası (CTM) ve SHA-256 hash algoritmasını kullanan yeni bir veri gizleme tekniği sunmaktadır. Önerilen yöntemde, gizli anahtar SHA-256 ile işlenmekte, mesaj uzunluğu bu hash değeri içerisine gizlenmektedir. CTM kullanılarak hem verinin gömüleceği piksel konumları rastgele bir şekilde belirlenmekte hem de gizlenecek veri kaotik dizi ile XOR işlemine tabi tutularak şifrelenmektedir. Yöntemin performansı, standart test görüntüleri üzerinde histogram analizi, entropi, korelasyon, SSIM, PSNR, MSE, NPCR, UACI ve NIST gibi çeşitli güvenlik ve kalite metrikleri kullanılarak değerlendirilmiştir. Deneysel sonuçlar, yöntemin veri gizlenmiş görüntünün görsel kalitesini ve algılanamazlığını üst düzeyde koruduğunu göstermektedir. Ortalama 70.6318 dB PSNR, 0.99997 SSIM ve 0.075 MSE değerleri, görsel bozulmanın minimum seviyede olduğunu kanıtlamaktadır. Benzer şekilde, orijinal ve veri gizlenmiş görüntüler arasındaki düşük diferansiyel değişim oranları olan NPCR değerinin ortalama 0.0054 ve UACI değerinin ortalama 2,2348x10⁻⁵ olmasıda bu durumu desteklemektedir. Yöntemin güvenliği ise, orijinal ve veri gizlenmiş görüntülerin birbirine çok yakın entropi ve korelasyon değerleri sergilemesi ve tüm NIST istatistiksel testlerinden başarıyla geçmesiyle teyit edilmiştir. Bu bulgular, yöntemin steganaliz saldırılarına karşı dirençli olduğunu göstermektedir.

Kaynakça

  • Abd, A., & Hussein, E. (2022). Design secure multi-level communication system based on duffing chaotic map and steganography. Indonesian Journal of Electrical Engineering Computer Science, 25(1), 238-246.
  • Abduljaleel, I. Q., Abduljabbar, Z. A., Al Sibahee, M. A., Ghrabat, M. J. J., Ma, J., & Nyangaresi, V. O. (2022). A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques. Journal of Sensor Actuator Networks, 11(4), 66.
  • Aiswarya, S., & Gomathi, R. (2023). Chaos Based Cryptography and Rectangular Shape Based Steganography Technique Using LSB. Malaysian Journal of Computer Science, 36(4), 368-380.
  • Al-Sulami, Z. A., & Hashim, H. S. (2021, May, 26–27). Review of secure the online multimedia data using chaotic map and steganography techniques. AIP Conference Proceedings, Al-Samawa, Iraq.
  • Alabaichi, A., & Altameemi, A. A. (2022). Steganography encryption secret message in video raster using DNA and chaotic map. Iraqi Journal of Science, 5534-5548.
  • Aparna, H., & Madhumitha, J. (2023). Combined image encryption and steganography technique for enhanced security using multiple chaotic maps. Computers Electrical Engineering, 110, 108824.
  • Arabboev, M., Begmatov, S., Rikhsivoev, M., Nosirov, K., & Saydiakbarov, S. (2024). A comprehensive review of image super-resolution metrics: classical and AI-based approaches. Acta IMEKO, 13(1), 1-8.
  • Bhandari, M., Panday, S., Bhatta, C. P., & Panday, S. P. (2022, February, 23-25). Image steganography approach based ant colony optimization with triangular chaotic map. 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), Gautam Buddha Nagar, India
  • Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752.
  • Dalal, M., & Juneja, M. (2021a). Steganography and Steganalysis (in digital forensics): a Cybersecurity guide. Multimedia Tools Applications, 80(4), 5723-5771.
  • Dalal, M., & Juneja, M. (2021b). A survey on information hiding using video steganography. Artificial Intelligence Review, 54(8), 5831-5895.
  • Dey, D., Jana, D. K., & Bhunia, P. (2025). A Novel Approach to Steganography Security: Embedding Encrypted Text in Color Images Using Langton’s Ant Cellular Automaton and Hybrid Chaotic Map. SN Computer Science, 6(5), 402.
  • Durafe, A., & Patidar, V. (2024). Image steganography using fractal cover and combined chaos-DNA based encryption. Annals of Data Science, 11(3), 855-885.
  • El-Khamy, S. E., Korany, N. O., & Mohamed, A. G. (2020). A new fuzzy-DNA image encryption and steganography technique. IEEE Access, 8, 148935-148951.
  • Elshoush, H. T., & Mahmoud, M. M. (2023). Ameliorating LSB using piecewise linear chaotic map and one-time pad for superlative capacity, imperceptibility and secure audio steganography. IEEE Access, 11, 33354-33380.
  • Ghosh, B. R., Mandal, J. K., & Banerjee, S. (2025). A high capacity multi-level LSB image steganographic technique using integer wavelet transform and tent map. International Journal of Computers Applications, 1-33.
  • Güvenoğlu, E. (2024). An image encryption algorithm based on multi-layered chaotic maps and its security analysis. Connection Science, 36(1), 2312108.
  • Güvenoğlu, E., & Razbonyalı, C. (2019). The creation of maze in order to hide data, and the proposal of method based on AES data encryption algorithm. El-Cezeri, 6(3), 668-680.
  • Güvenoğlu, E., & Tüysüz, M. A. A. (2015, May, 16-19). An improvement for Knutt/Durstenfeld algorithm based image encryption. 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey.
  • Hameed, S. M., Ali, Z. H., AL-Khafaji, G. K., & Ahmed, S. (2021). Chaos-based Color Image Steganography Method Using 3 D Cat Map. Iraqi Journal of Science, 3220-3227.
  • He, D., Cai, Z., Zhou, D., & Chen, Z. (2024). Inter-channel correlation modeling and improved skewed histogram shifting for reversible data hiding in color images. Mathematics, 12(9), 1283.
  • Hematpour, N., Ahadpour, S., Sourkhani, I. G., & Sani, R. H. (2022). A new steganographic algorithm based on coupled chaotic maps and a new chaotic S-box. Multimedia Tools Applications, 81(27), 39753-39784.
  • Huo, L., Chen, R., Wei, J., & Huang, L. (2024). A high-capacity and high-security image steganography network based on chaotic mapping and generative adversarial networks. Applied Sciences, 14(3), 1225.
  • Karawia, A. (2021). Medical image steganographic algorithm via modified LSB method and chaotic map. IET Image Processing, 15(11), 2580-2590.
  • Karimov, T. I., Druzhina, O. S., Andreev, V. S., Tutueva, A. V., & Kopets, E. E. (2021, January, 26-29). Bifurcation spectral diagrams: A tool for nonlinear dynamics investigation. IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, Moscow, Russia.
  • Khaleel, A. H., & Abduljaleel, I. Q. (2021). Secure image hiding in speech signal by steganography-mining and encryption. Indonesian Journal of Electrical Engineering Computer Science, 21(3), 1692-1703.
  • Khalil, N., Sarhan, A., & Alshewimy, M. A. (2024). A secure image steganography based on LSB technique and 2D chaotic maps. Computers Electrical Engineering, 119, 109566.
  • Kustov, V., & Krasnov, A. (2021, July, 26-28). Masking Hidden Messages under Noise in Steganography Problems. 44th International Conference on Telecommunications and Signal Processing (TSP), Brno, Czech Republic.
  • Liu, J., Wang, Y., Han, Q., & Gao, J. (2022). A sensitive image encryption algorithm based on a higher-dimensional chaotic map and steganography. International Journal of Bifurcation Chaos, 32(01), 2250004.
  • Mansoor, S., & Parah, S. A. (2023). HAIE: a hybrid adaptive image encryption algorithm using Chaos and DNA computing. Multimedia Tools Applications, 82(19), 28769-28796.
  • Mowafy, W. S., Zayyan, M. H., & El-Henawy, I. M. (2024). On Cryptanalysis Techniques in Chaos-based Cryptography. Mansoura Journal for Computer Information Sciences, 19(1), 43-62.
  • Mudeng, V., Kim, M., & Choe, S.-w. (2022). Prospects of structural similarity index for medical image analysis. Applied Sciences, 12(8), 3754.
  • Nagarajegowda, S., & Krishnan, K. (2023). An image steganography using improved hyper-chaotic Henon map and fractal tromino. International Journal of Electrical Computer Engineering, 13(6), 6836-6846.
  • Nasr, M. A., El-Shafai, W., El-Rabaie, E.-S. M., El-Fishawy, A. S., El-Hoseny, H. M., Abd El-Samie, F. E., & Abdel-Salam, N. (2024). A robust audio steganography technique based on image encryption using different chaotic maps. Scientific Reports, 14(1), 22054.
  • Odeh, A., Taleb, A. A., Alhajahjeh, T., Navarro, F., & Ayesh, A. (2025). Lightweight secure image encryption: a tent map chaos theory approach. Multimedia Tools Applications, 1-20.
  • Ping, P., Fan, J., Mao, Y., Xu, F., & Gao, J. (2018). A chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access, 6, 67581-67593.
  • Ramzan, M., & Khan, M. F. (2023). A Robust Steganographic Algorithm based on Linear Fractional Transformation and Chaotic Maps. International Journal of Advanced Computer Science Applications, 14(3).
  • Rostam, H. E., Motameni, H., & Enayatifar, R. (2022). Privacy-preserving in the Internet of Things based on steganography and chaotic functions. Optik, 258, 168864.
  • Salim, A., Abdulbasit Mohammed, K., Maath Jasem, F., & Makki Sagheer, A. (2024). Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing Digital Systems, 16(1), 851-859.
  • Sandhu, M., Ahmed, M., Hussain, M., & Khan, I. (2024). Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography. International Arab Journal of Information Technology, 21(6).
  • Sharafi, J., Khedmati, Y., & Shabani, M. (2021). Image steganography based on a new hybrid chaos map and discrete transforms. Optik, 226, 165492.
  • Singh, D., Kaur, S., Kaur, M., Singh, S., Kaur, M., & Lee, H.-N. (2024). A systematic literature review on chaotic maps-based image security techniques. Computer Science Review, 54, 100659.
  • Sriram, G., Ali, A. M. A., Natiq, H., Ahmadi, A., Rajagopal, K., & Jafari, S. (2024). Dynamics of a novel chaotic map. Journal of Computational Applied Mathematics, 436, 115453.
  • Vivek, J., & Gadgay, B. (2021). Video steganography using chaos encryption algorithm with high efficiency video coding for data hiding. International Journal of Intelligent Engineering Systems, 14(5), 15-24.
  • Wu, W., Dong, Y., & Wang, G. (2024). Image Robust Watermarking Method Based on DWT‐SVD Transform and Chaotic Map. Complexity, 2024(1), 6618382.
  • Xie, H.-w., Gao, Y.-j., Liu, X.-l., Zhang, J., & Zhang, H. (2022). A novel exploiting modification direction scheme and its application in quantum color image steganography. Quantum Information Processing, 21(7), 249.
  • Yakut, S. (2024). An Efficient Steganography Method Based on Chaotic Functions and XOR Operation for Data Hiding. Bilgisayar Bilimleri ve Teknolojileri Dergisi, 5(2), 58-65.
  • Yamni, M., Daoui, A., & Abd El-Latif, A. A. (2024). Efficient color image steganography based on new adapted chaotic dynamical system with discrete orthogonal moment transforms. Mathematics computers in simulation.
  • Zhang, L., Song, X., El-Latif, A. A. A., Zhao, Y., & Abd-El-Atty, B. (2024). Reversibly selective encryption for medical images based on coupled chaotic maps and steganography. Complex Intelligent Systems, 10(2), 2187-2213.

HIDING AND PROTECTING SENSITIVE DATA WITH CHAOTIC MAP-BASED MULTILAYER IMAGE STEGANOGRAPHY

Yıl 2025, Cilt: 24 Sayı: 48, 477 - 508, 18.12.2025
https://doi.org/10.55071/ticaretfbd.1705157

Öz

In recent years, with the increase in data sharing over the internet and mobile devices, information security problems have also increased significantly. In this context, intensive research is being conducted on methods such as steganography and cryptography to protect data from unauthorized access. This study proposes a new data hiding technique using the Chaotic Tent Map (CTM) and the SHA-256 hash algorithm to address the security vulnerabilities of the traditional Least Bit Addition (LSB) steganography method. In the proposed method, the secret key is processed with SHA-256, and the message length is hidden within this hash value. Using CTM, the pixel locations where the data will be embedded are randomly determined, and the hidden data is encrypted by subjecting it to the XOR operation with a chaotic array. The performance of the method is evaluated using various security and quality metrics, such as histogram analysis, entropy, correlation, SSIM, PSNR, MSE, NPCR, UACI, and NIST, on standard test images. Experimental results demonstrate that the method maintains a high level of visual quality and imperceptibility of the hidden image. Average PSNR of 70.6318 dB, SSIM of 0.99997, and MSE of 0.075 demonstrate minimal visual degradation. Similarly, the low differential change rates between the original and data-hidden images, with an average NPCR value of 0.0054 and an average UACI value of 2,2348x10⁻⁵, support this finding. The security of the method is confirmed by the very similar entropy and correlation values of the original and data-hidden images, and by successfully passing all NIST statistical tests. These findings demonstrate the method's resistance to steganalysis attacks.

Kaynakça

  • Abd, A., & Hussein, E. (2022). Design secure multi-level communication system based on duffing chaotic map and steganography. Indonesian Journal of Electrical Engineering Computer Science, 25(1), 238-246.
  • Abduljaleel, I. Q., Abduljabbar, Z. A., Al Sibahee, M. A., Ghrabat, M. J. J., Ma, J., & Nyangaresi, V. O. (2022). A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques. Journal of Sensor Actuator Networks, 11(4), 66.
  • Aiswarya, S., & Gomathi, R. (2023). Chaos Based Cryptography and Rectangular Shape Based Steganography Technique Using LSB. Malaysian Journal of Computer Science, 36(4), 368-380.
  • Al-Sulami, Z. A., & Hashim, H. S. (2021, May, 26–27). Review of secure the online multimedia data using chaotic map and steganography techniques. AIP Conference Proceedings, Al-Samawa, Iraq.
  • Alabaichi, A., & Altameemi, A. A. (2022). Steganography encryption secret message in video raster using DNA and chaotic map. Iraqi Journal of Science, 5534-5548.
  • Aparna, H., & Madhumitha, J. (2023). Combined image encryption and steganography technique for enhanced security using multiple chaotic maps. Computers Electrical Engineering, 110, 108824.
  • Arabboev, M., Begmatov, S., Rikhsivoev, M., Nosirov, K., & Saydiakbarov, S. (2024). A comprehensive review of image super-resolution metrics: classical and AI-based approaches. Acta IMEKO, 13(1), 1-8.
  • Bhandari, M., Panday, S., Bhatta, C. P., & Panday, S. P. (2022, February, 23-25). Image steganography approach based ant colony optimization with triangular chaotic map. 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), Gautam Buddha Nagar, India
  • Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752.
  • Dalal, M., & Juneja, M. (2021a). Steganography and Steganalysis (in digital forensics): a Cybersecurity guide. Multimedia Tools Applications, 80(4), 5723-5771.
  • Dalal, M., & Juneja, M. (2021b). A survey on information hiding using video steganography. Artificial Intelligence Review, 54(8), 5831-5895.
  • Dey, D., Jana, D. K., & Bhunia, P. (2025). A Novel Approach to Steganography Security: Embedding Encrypted Text in Color Images Using Langton’s Ant Cellular Automaton and Hybrid Chaotic Map. SN Computer Science, 6(5), 402.
  • Durafe, A., & Patidar, V. (2024). Image steganography using fractal cover and combined chaos-DNA based encryption. Annals of Data Science, 11(3), 855-885.
  • El-Khamy, S. E., Korany, N. O., & Mohamed, A. G. (2020). A new fuzzy-DNA image encryption and steganography technique. IEEE Access, 8, 148935-148951.
  • Elshoush, H. T., & Mahmoud, M. M. (2023). Ameliorating LSB using piecewise linear chaotic map and one-time pad for superlative capacity, imperceptibility and secure audio steganography. IEEE Access, 11, 33354-33380.
  • Ghosh, B. R., Mandal, J. K., & Banerjee, S. (2025). A high capacity multi-level LSB image steganographic technique using integer wavelet transform and tent map. International Journal of Computers Applications, 1-33.
  • Güvenoğlu, E. (2024). An image encryption algorithm based on multi-layered chaotic maps and its security analysis. Connection Science, 36(1), 2312108.
  • Güvenoğlu, E., & Razbonyalı, C. (2019). The creation of maze in order to hide data, and the proposal of method based on AES data encryption algorithm. El-Cezeri, 6(3), 668-680.
  • Güvenoğlu, E., & Tüysüz, M. A. A. (2015, May, 16-19). An improvement for Knutt/Durstenfeld algorithm based image encryption. 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey.
  • Hameed, S. M., Ali, Z. H., AL-Khafaji, G. K., & Ahmed, S. (2021). Chaos-based Color Image Steganography Method Using 3 D Cat Map. Iraqi Journal of Science, 3220-3227.
  • He, D., Cai, Z., Zhou, D., & Chen, Z. (2024). Inter-channel correlation modeling and improved skewed histogram shifting for reversible data hiding in color images. Mathematics, 12(9), 1283.
  • Hematpour, N., Ahadpour, S., Sourkhani, I. G., & Sani, R. H. (2022). A new steganographic algorithm based on coupled chaotic maps and a new chaotic S-box. Multimedia Tools Applications, 81(27), 39753-39784.
  • Huo, L., Chen, R., Wei, J., & Huang, L. (2024). A high-capacity and high-security image steganography network based on chaotic mapping and generative adversarial networks. Applied Sciences, 14(3), 1225.
  • Karawia, A. (2021). Medical image steganographic algorithm via modified LSB method and chaotic map. IET Image Processing, 15(11), 2580-2590.
  • Karimov, T. I., Druzhina, O. S., Andreev, V. S., Tutueva, A. V., & Kopets, E. E. (2021, January, 26-29). Bifurcation spectral diagrams: A tool for nonlinear dynamics investigation. IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, Moscow, Russia.
  • Khaleel, A. H., & Abduljaleel, I. Q. (2021). Secure image hiding in speech signal by steganography-mining and encryption. Indonesian Journal of Electrical Engineering Computer Science, 21(3), 1692-1703.
  • Khalil, N., Sarhan, A., & Alshewimy, M. A. (2024). A secure image steganography based on LSB technique and 2D chaotic maps. Computers Electrical Engineering, 119, 109566.
  • Kustov, V., & Krasnov, A. (2021, July, 26-28). Masking Hidden Messages under Noise in Steganography Problems. 44th International Conference on Telecommunications and Signal Processing (TSP), Brno, Czech Republic.
  • Liu, J., Wang, Y., Han, Q., & Gao, J. (2022). A sensitive image encryption algorithm based on a higher-dimensional chaotic map and steganography. International Journal of Bifurcation Chaos, 32(01), 2250004.
  • Mansoor, S., & Parah, S. A. (2023). HAIE: a hybrid adaptive image encryption algorithm using Chaos and DNA computing. Multimedia Tools Applications, 82(19), 28769-28796.
  • Mowafy, W. S., Zayyan, M. H., & El-Henawy, I. M. (2024). On Cryptanalysis Techniques in Chaos-based Cryptography. Mansoura Journal for Computer Information Sciences, 19(1), 43-62.
  • Mudeng, V., Kim, M., & Choe, S.-w. (2022). Prospects of structural similarity index for medical image analysis. Applied Sciences, 12(8), 3754.
  • Nagarajegowda, S., & Krishnan, K. (2023). An image steganography using improved hyper-chaotic Henon map and fractal tromino. International Journal of Electrical Computer Engineering, 13(6), 6836-6846.
  • Nasr, M. A., El-Shafai, W., El-Rabaie, E.-S. M., El-Fishawy, A. S., El-Hoseny, H. M., Abd El-Samie, F. E., & Abdel-Salam, N. (2024). A robust audio steganography technique based on image encryption using different chaotic maps. Scientific Reports, 14(1), 22054.
  • Odeh, A., Taleb, A. A., Alhajahjeh, T., Navarro, F., & Ayesh, A. (2025). Lightweight secure image encryption: a tent map chaos theory approach. Multimedia Tools Applications, 1-20.
  • Ping, P., Fan, J., Mao, Y., Xu, F., & Gao, J. (2018). A chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access, 6, 67581-67593.
  • Ramzan, M., & Khan, M. F. (2023). A Robust Steganographic Algorithm based on Linear Fractional Transformation and Chaotic Maps. International Journal of Advanced Computer Science Applications, 14(3).
  • Rostam, H. E., Motameni, H., & Enayatifar, R. (2022). Privacy-preserving in the Internet of Things based on steganography and chaotic functions. Optik, 258, 168864.
  • Salim, A., Abdulbasit Mohammed, K., Maath Jasem, F., & Makki Sagheer, A. (2024). Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing Digital Systems, 16(1), 851-859.
  • Sandhu, M., Ahmed, M., Hussain, M., & Khan, I. (2024). Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography. International Arab Journal of Information Technology, 21(6).
  • Sharafi, J., Khedmati, Y., & Shabani, M. (2021). Image steganography based on a new hybrid chaos map and discrete transforms. Optik, 226, 165492.
  • Singh, D., Kaur, S., Kaur, M., Singh, S., Kaur, M., & Lee, H.-N. (2024). A systematic literature review on chaotic maps-based image security techniques. Computer Science Review, 54, 100659.
  • Sriram, G., Ali, A. M. A., Natiq, H., Ahmadi, A., Rajagopal, K., & Jafari, S. (2024). Dynamics of a novel chaotic map. Journal of Computational Applied Mathematics, 436, 115453.
  • Vivek, J., & Gadgay, B. (2021). Video steganography using chaos encryption algorithm with high efficiency video coding for data hiding. International Journal of Intelligent Engineering Systems, 14(5), 15-24.
  • Wu, W., Dong, Y., & Wang, G. (2024). Image Robust Watermarking Method Based on DWT‐SVD Transform and Chaotic Map. Complexity, 2024(1), 6618382.
  • Xie, H.-w., Gao, Y.-j., Liu, X.-l., Zhang, J., & Zhang, H. (2022). A novel exploiting modification direction scheme and its application in quantum color image steganography. Quantum Information Processing, 21(7), 249.
  • Yakut, S. (2024). An Efficient Steganography Method Based on Chaotic Functions and XOR Operation for Data Hiding. Bilgisayar Bilimleri ve Teknolojileri Dergisi, 5(2), 58-65.
  • Yamni, M., Daoui, A., & Abd El-Latif, A. A. (2024). Efficient color image steganography based on new adapted chaotic dynamical system with discrete orthogonal moment transforms. Mathematics computers in simulation.
  • Zhang, L., Song, X., El-Latif, A. A. A., Zhao, Y., & Abd-El-Atty, B. (2024). Reversibly selective encryption for medical images based on coupled chaotic maps and steganography. Complex Intelligent Systems, 10(2), 2187-2213.
Toplam 49 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Bilgi Güvenliği ve Kriptoloji, Veri ve Bilgi Gizliliği
Bölüm Araştırma Makalesi
Yazarlar

Sevgül Tokatlıoğlu Bu kişi benim 0000-0002-2999-3101

Erdal Güvenoğlu 0000-0003-1333-5953

Gönderilme Tarihi 11 Haziran 2025
Kabul Tarihi 2 Eylül 2025
Erken Görünüm Tarihi 9 Aralık 2025
Yayımlanma Tarihi 18 Aralık 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 24 Sayı: 48

Kaynak Göster

APA Tokatlıoğlu, S., & Güvenoğlu, E. (2025). KAOTİK HARİTA TABANLI ÇOK KATMANLI GÖRÜNTÜ STEGANOGRAFİSİ İLE HASSAS VERİLERİN GİZLENMESİ VE KORUNMASI. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi, 24(48), 477-508. https://doi.org/10.55071/ticaretfbd.1705157
AMA 1.Tokatlıoğlu S, Güvenoğlu E. KAOTİK HARİTA TABANLI ÇOK KATMANLI GÖRÜNTÜ STEGANOGRAFİSİ İLE HASSAS VERİLERİN GİZLENMESİ VE KORUNMASI. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi. 2025;24(48):477-508. doi:10.55071/ticaretfbd.1705157
Chicago Tokatlıoğlu, Sevgül, ve Erdal Güvenoğlu. 2025. “KAOTİK HARİTA TABANLI ÇOK KATMANLI GÖRÜNTÜ STEGANOGRAFİSİ İLE HASSAS VERİLERİN GİZLENMESİ VE KORUNMASI”. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi 24 (48): 477-508. https://doi.org/10.55071/ticaretfbd.1705157.
EndNote Tokatlıoğlu S, Güvenoğlu E (01 Aralık 2025) KAOTİK HARİTA TABANLI ÇOK KATMANLI GÖRÜNTÜ STEGANOGRAFİSİ İLE HASSAS VERİLERİN GİZLENMESİ VE KORUNMASI. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi 24 48 477–508.
IEEE [1]S. Tokatlıoğlu ve E. Güvenoğlu, “KAOTİK HARİTA TABANLI ÇOK KATMANLI GÖRÜNTÜ STEGANOGRAFİSİ İLE HASSAS VERİLERİN GİZLENMESİ VE KORUNMASI”, İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi, c. 24, sy 48, ss. 477–508, Ara. 2025, doi: 10.55071/ticaretfbd.1705157.
ISNAD Tokatlıoğlu, Sevgül - Güvenoğlu, Erdal. “KAOTİK HARİTA TABANLI ÇOK KATMANLI GÖRÜNTÜ STEGANOGRAFİSİ İLE HASSAS VERİLERİN GİZLENMESİ VE KORUNMASI”. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi 24/48 (01 Aralık 2025): 477-508. https://doi.org/10.55071/ticaretfbd.1705157.
JAMA 1.Tokatlıoğlu S, Güvenoğlu E. KAOTİK HARİTA TABANLI ÇOK KATMANLI GÖRÜNTÜ STEGANOGRAFİSİ İLE HASSAS VERİLERİN GİZLENMESİ VE KORUNMASI. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi. 2025;24:477–508.
MLA Tokatlıoğlu, Sevgül, ve Erdal Güvenoğlu. “KAOTİK HARİTA TABANLI ÇOK KATMANLI GÖRÜNTÜ STEGANOGRAFİSİ İLE HASSAS VERİLERİN GİZLENMESİ VE KORUNMASI”. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi, c. 24, sy 48, Aralık 2025, ss. 477-08, doi:10.55071/ticaretfbd.1705157.
Vancouver 1.Tokatlıoğlu S, Güvenoğlu E. KAOTİK HARİTA TABANLI ÇOK KATMANLI GÖRÜNTÜ STEGANOGRAFİSİ İLE HASSAS VERİLERİN GİZLENMESİ VE KORUNMASI. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi [Internet]. 01 Aralık 2025;24(48):477-508. Erişim adresi: https://izlik.org/JA49KC38YW