Research Article
BibTex RIS Cite

Yeni Kaotik Video Steganografi Metodu

Year 2021, Volume: 4 Issue: 1, 25 - 40, 30.03.2021
https://doi.org/10.46373/hafebid.858834

Abstract

Günümüzde, teknoloji ve internetin gelişerek yaygınlaşmasıyla, güvenli veri transferi için farklı yöntemler ve teknikler uygulanmaya başlanmıştır. Gelişen bu yöntemlerden biri de Steganografi’dir. Steganografi, iletilecek bilginin, istenmeyen kişiler tarafından fark edilmesini önlemek için farklı araçlara gizlenmesi sanatıdır. Taşıyıcı araçlarda gözle görülür değişiklik yapılmadan mesajın gizlenmesi hedeflenir. Bu çalışmada, önerilen kaotik yöntem ile video üzerinde veri gizlenmesi amaçlanmıştır. Videoda, veri gizlenecek çerçeveler ve pikseller belirli bir düzen olmadan kaotik bir yöntemle seçilerek, RGB değerlerinin en az anlamlı bitinin değiştirilmesi ile veri bir piksele 1 byte gizli bilgi olacak şekilde gizlemesi gerçekleştirilmiştir. Oluşturulan taşıyıcı videonun ve videonun ilk halinin görsel değerleri karşılaştırılarak gizlemenin başarısı PSNR, SNR, Entropi, SSIM, MSE yöntemleri ile ölçülmüştür.

Supporting Institution

istanbul ticaret üniversitesi

References

  • [1] Abdulla AA., (2015), Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD dissertation, Dept. of Applied Computing, Buckingham Univ., Buckingham, UK (pp. 15-26).
  • [2] Lin G-S., Chan Y-T., Lie W-N., (2010), A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Transactions on Multimedia (pp. 347–359).
  • [3] Ker AD., Bohme R .,(2008), Revisiting weighted stego-image steganalysis. Proc. SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Content (pp. 300–313).
  • [4] Ker AD., (2005), Improved detection of LSB steganography in grayscale image. International Workshop on information hiding. Springer (pp. 87–118).
  • [5] Luo W, Huang F., Huang J., (2010), Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensic and Security (pp.202–218).
  • [6] Lin Y-T., Wang C-M., Chen W-S., Lin F-P., Lin W., (2017), A novel data hiding algorithm for high dynamic range image.IEEE Transaction on Multimedia (pp.196–212).
  • [7] Alwahbani S. M. H., Elshoush H.T., (2018), Chaos-Based Audio Steganography and Cryptography Using LSB Method and One-Time Pad (pp. 15–30).
  • [8] Bhattacharyya D., Dutta J., Das P., Bandyopadhyay R., Bandyopadhyay SK., Kim T-H., (2009), Discrete fourier transformation based image authentication technique. 8th IEEE International Conference on Cognitive Informatic (pp. 195–220).
  • [9] Dey S., Abraham A., Sanyal S., (2007), An LSB Data Hiding Technique Using Prime Number. Third International Symposium on Information Assurance and Security, IAS 2007, IEEE (pp. 101–108).
  • [10] Ker AD., (2005), A general framework for structural steganaly of LSB replacement. International Workshop on information hiding (pp. 285–301).
  • [11] Chen P-Y., Lin H-J., (2006), A DWT base approach for image steganography. International Journal of Applied Science and Engineering (pp. 280–290).
  • [12] Dey S., Abraham A., Sanyal S., (2007), An LSB Data Hiding Technique Using Natural Number Decomposition. Third International Conference on Intelligent Information Hiding and Multimedia Signal Process, IIHMSP 2007, IEEE (pp. 177–214).
  • [13] Chaudhary P.,(2020), Novel Image Encryption Method Base on LSB Technique and AES Algorithm (pp. 15-28).
  • [14] Chan C-S.,(2009), On using LSB matching function for data hiding in pixels. Fundamenta Informaticae (pp. 55–59).
  • [15] Fridrich J., Goljan M., (2004), On estimation of secret message length in LSB steganography in spatial domain. Proc. SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Content (pp. 15–36).
  • [16] Selvaraj P., Varatharajan R., (2018), Whirlpool Algorithm with Hash Function Based Watermarking Algorithm for the Secured Transmission of Digital Medical Images (pp. 13-17).
  • [17] May, R.,(1976), Simple mathematical models with very complicated dynamics. Nature 26 (pp. 459–467).
  • [18] WikiPedia, Logistic Map, https://en.wikipedia.org/wiki/Logistic_map son erişim (24.11.2020)
  • [19] Yayla, G. A., MATLAB, Kodlab Yayın Dağıtım (2019).
  • [20] Kasapbaşı, MC., Elmasry, W., (2018), New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check (pp. 8-9).
  • [21] https://tr.wikipedia.org/wiki/Sinyal_Gürültü_Oranı(08/01/2021)
  • [22] Güvenoğlu, E., Razbonyalı C., (2019), The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm (pp.20-23).
  • [23] Dalal, M., Juneja M.(2019) A robust and imperceptible steganography technique for SD and HD videos (p.15-19)
  • [24] Deshmukh P. R., Rahangdale B., (2014), Data Hiding using Video Steganography, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) (pp.31-37).
  • [25] Kar N., Aman M. A. A. A., Mandal K. and Bhattacharya B., (2017), "Chaos-based video steganography," 2017 8th International Conference on Information Technology (pp. 482-487).
  • [26] Gambhir, G., Mandal, J.K., (2020), Multicore implementation and performance analysis of a chaos based LSB steganography technique. Microsyst Technol https://doi.org/10.1007/s00542-020-04762-4 (pp. 6-9).
  • [27] Tanveer J. Siddiqui., Ashish Khare., (2020), Chaos-Based Video Steganography Method in Discrete Cosine Transform Domain, International Journal of Image and Graphics, doi: 10.1142/S0219467821500157.
  • [28] WikiPedia, Logistic Map, http://www.halic.edu.tr, (11/12/2020)
  • [29] Manisha1 S., Sharmila2 T. S., (2019), A two-level secure data hiding algorithm for video Steganography (pp. 539-541)
Year 2021, Volume: 4 Issue: 1, 25 - 40, 30.03.2021
https://doi.org/10.46373/hafebid.858834

Abstract

References

  • [1] Abdulla AA., (2015), Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD dissertation, Dept. of Applied Computing, Buckingham Univ., Buckingham, UK (pp. 15-26).
  • [2] Lin G-S., Chan Y-T., Lie W-N., (2010), A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Transactions on Multimedia (pp. 347–359).
  • [3] Ker AD., Bohme R .,(2008), Revisiting weighted stego-image steganalysis. Proc. SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Content (pp. 300–313).
  • [4] Ker AD., (2005), Improved detection of LSB steganography in grayscale image. International Workshop on information hiding. Springer (pp. 87–118).
  • [5] Luo W, Huang F., Huang J., (2010), Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensic and Security (pp.202–218).
  • [6] Lin Y-T., Wang C-M., Chen W-S., Lin F-P., Lin W., (2017), A novel data hiding algorithm for high dynamic range image.IEEE Transaction on Multimedia (pp.196–212).
  • [7] Alwahbani S. M. H., Elshoush H.T., (2018), Chaos-Based Audio Steganography and Cryptography Using LSB Method and One-Time Pad (pp. 15–30).
  • [8] Bhattacharyya D., Dutta J., Das P., Bandyopadhyay R., Bandyopadhyay SK., Kim T-H., (2009), Discrete fourier transformation based image authentication technique. 8th IEEE International Conference on Cognitive Informatic (pp. 195–220).
  • [9] Dey S., Abraham A., Sanyal S., (2007), An LSB Data Hiding Technique Using Prime Number. Third International Symposium on Information Assurance and Security, IAS 2007, IEEE (pp. 101–108).
  • [10] Ker AD., (2005), A general framework for structural steganaly of LSB replacement. International Workshop on information hiding (pp. 285–301).
  • [11] Chen P-Y., Lin H-J., (2006), A DWT base approach for image steganography. International Journal of Applied Science and Engineering (pp. 280–290).
  • [12] Dey S., Abraham A., Sanyal S., (2007), An LSB Data Hiding Technique Using Natural Number Decomposition. Third International Conference on Intelligent Information Hiding and Multimedia Signal Process, IIHMSP 2007, IEEE (pp. 177–214).
  • [13] Chaudhary P.,(2020), Novel Image Encryption Method Base on LSB Technique and AES Algorithm (pp. 15-28).
  • [14] Chan C-S.,(2009), On using LSB matching function for data hiding in pixels. Fundamenta Informaticae (pp. 55–59).
  • [15] Fridrich J., Goljan M., (2004), On estimation of secret message length in LSB steganography in spatial domain. Proc. SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Content (pp. 15–36).
  • [16] Selvaraj P., Varatharajan R., (2018), Whirlpool Algorithm with Hash Function Based Watermarking Algorithm for the Secured Transmission of Digital Medical Images (pp. 13-17).
  • [17] May, R.,(1976), Simple mathematical models with very complicated dynamics. Nature 26 (pp. 459–467).
  • [18] WikiPedia, Logistic Map, https://en.wikipedia.org/wiki/Logistic_map son erişim (24.11.2020)
  • [19] Yayla, G. A., MATLAB, Kodlab Yayın Dağıtım (2019).
  • [20] Kasapbaşı, MC., Elmasry, W., (2018), New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check (pp. 8-9).
  • [21] https://tr.wikipedia.org/wiki/Sinyal_Gürültü_Oranı(08/01/2021)
  • [22] Güvenoğlu, E., Razbonyalı C., (2019), The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm (pp.20-23).
  • [23] Dalal, M., Juneja M.(2019) A robust and imperceptible steganography technique for SD and HD videos (p.15-19)
  • [24] Deshmukh P. R., Rahangdale B., (2014), Data Hiding using Video Steganography, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) (pp.31-37).
  • [25] Kar N., Aman M. A. A. A., Mandal K. and Bhattacharya B., (2017), "Chaos-based video steganography," 2017 8th International Conference on Information Technology (pp. 482-487).
  • [26] Gambhir, G., Mandal, J.K., (2020), Multicore implementation and performance analysis of a chaos based LSB steganography technique. Microsyst Technol https://doi.org/10.1007/s00542-020-04762-4 (pp. 6-9).
  • [27] Tanveer J. Siddiqui., Ashish Khare., (2020), Chaos-Based Video Steganography Method in Discrete Cosine Transform Domain, International Journal of Image and Graphics, doi: 10.1142/S0219467821500157.
  • [28] WikiPedia, Logistic Map, http://www.halic.edu.tr, (11/12/2020)
  • [29] Manisha1 S., Sharmila2 T. S., (2019), A two-level secure data hiding algorithm for video Steganography (pp. 539-541)
There are 29 citations in total.

Details

Primary Language Turkish
Journal Section Articles
Authors

Damla Akyüz

Mustafa Cem Kasapbaşı 0000-0001-6444-6659

Publication Date March 30, 2021
Published in Issue Year 2021 Volume: 4 Issue: 1

Cite

APA Akyüz, D., & Kasapbaşı, M. C. (2021). Yeni Kaotik Video Steganografi Metodu. Haliç Üniversitesi Fen Bilimleri Dergisi, 4(1), 25-40. https://doi.org/10.46373/hafebid.858834

T. C. Haliç Üniversitesi Fen Bilimleri Dergisi