Research Article
BibTex RIS Cite
Year 2021, Volume: 16 Issue: 1, 47 - 64, 15.03.2021

Abstract

References

  • [1] Yıldırım M. Kriptolojiye Giriş Ders Notları, Uygulamalı Matematik Enstitüsü, 2004.
  • [2] Vural M, Gençoğlu MT. Embedded Audio Coding Using Laplace Transform For Turkish Letters. Journal of the Technical University - Sofia Plovdiv branch, Bulgaria “Fundamental Sciences and Applications”,2018; 24:109-116.
  • [3] Gençoğlu MT. Importance of Cryptography in Information Security. IOSR Journal of Computer Engineering, 2019; 21(1): 65-68.
  • [4] Murray AH, Burchfiled RW. The Oxford English Dictionary: Being a Corrected Re-issue. Clarendon Press, Oxford, 1933.
  • [5] Weiss M. Principles of Steganography, Math 187: Introduction to Cryptography Professor Kevin O’Bryant, 2004.
  • [6] Kadry S, Nasr S. New Generating Technique for Image Steganography. Lecture Notes on Software Engineering, 2013; 1(2):190-193.
  • [7] Gençoğlu MT, Baleanu D. Nonlinear Systems and Complexity book series. In: Power Series Transform In Cryptology and ASCII, Mathematical Methods In Engineering. Springer, pp 67-74, 2018.
  • [8] Memon N, Wong P. Protecting digital media content. Communications of the ACM 41(7): 34–43, 1998.
  • [9] Wang H, Wang S. Cyber Warfare: Steganography vs. Steganalysis, Communications of the ACM, 2004; 47(10): 6-82. https://doi.org/10.1145/1022594.1022597
  • [10] Gençoğlu MT. Programming Encryption Algorithms with steganography. International Conference on Engineering Technology and Innovation, Sarajevo, 2017; 22-26 march, 58.
  • [11] Anderson RJ, Petitcolas FAP. On the Limits of Steganography. IEEE Journal of Selected Areas in Communications, 1998; 16(4):474-481.
  • [12] Benett K. Linguistic steganography- survey, analysis and robustness concerns for hiding information in text. Tech Report, Purdue University, 2004.
  • [13] Shahreza MS, Shahreza, MHS. Text steganography in SMS. International Journal of Network Security & Its Applications, 2007; 5(1): 2260-2265.
  • [14] Gençoğlu MT. Combining Cryptography with Steganography. ITM Web of Conferences, 2017; https://doi.org/10.1051/itmconf 01010
  • [15] Bhattacharyya S, Banerjee I, Sanyal G. A Novel Approach of Secure Text-Based Steganography Model using Word Mapping Method (WMM). International Journal of Computer and Information Engineering, 2010; 4(2): 96-103.
  • [16] Gençoğlu MT. Embedded image coding using Laplace Transform for Turkish letters. Multimedia Tools and Applications, 2019; 78(13): 17521–1753.
  • [17] Sellars D. An Introduction to Steganography, 1999. http://www.cs.uct.ac.za/ courses/CS400W/NIS04/papers99/dsellars/index.html. Date of access: 01 January 2020.
  • [18] Petitcolas FAP, Anderson RJ, Kuhn MG. Information Hiding- A Survey. Process of IEEE, 1999; 87(7): 1062-1078.
  • [19] Huang X, Kawashima R, Segawa N, Abe Y. The Real-Time Steganography Based on Audio-to-Audio Data BitStream. Technical report of IEICE, ISEC, 2006; 106:15-22.
  • [20] Jayaram P, Ranganatha HR, Anupama HS. Information hiding using audio steganography – a survey. The International Journal of Multimedia & Its Applications, 2011; 3(3):86-96. https://doi.org/ 10.5121/ijma.2011.3308
  • [21] Cvejic N, Seppben T. Increasing the capacity of LSB-based audio steganography. Media Team Oulu Information Processing Laboratory University of Oulu FIN- 90014 Finland, 2002.
  • [22] Qi YC, Ye L, Liu C. Wavelet domain audio steganalysis for multiplicative embedding model. Proceedings of the International Conference on Wavelet Analysis and Pattern Recognition, 2009; 429-432. https://doi.org/10.1109/ICWAPR.2009.5207432
  • [23] Shahreza SS, Shalmani MTM. High capacity error-free wavelet domain speech steganography. Acoustics, Speech and Signal Processing IEEE International Conference, 2008; 223-227. https://doi.org/10.1109/ICASSP.2008.4517963
  • [24] Choudry KN, Akash W. A Survey Paper on Video Steganography. International Journal of Computer Science and Information Technologies, 2015; 6 (3):2335-2338.

Enhancing The Data Security by using Audio Steganography with Taylor Series Cryptosystem

Year 2021, Volume: 16 Issue: 1, 47 - 64, 15.03.2021

Abstract

Especially in recent years, the security of information and computer systems appears to be a very important issue. Because the heavily used communication network has made life easier as well as accompany serious security problems. To solve these problems, cryptography and steganography have been widely used. To present a more secure model for audios, a simple and secure stego-crypto method is presented. In this work, the hidden data is encrypted by the proposed Taylor series based encryption method and the encrypted data are hidden audio signals by applying the least significant bit (LSB) method. A real-world application is implemented in the proposed model. According to the results, the used encryption model is more efficient than AES. The results and findings demonstrated that this model can be used in a communication security system.

References

  • [1] Yıldırım M. Kriptolojiye Giriş Ders Notları, Uygulamalı Matematik Enstitüsü, 2004.
  • [2] Vural M, Gençoğlu MT. Embedded Audio Coding Using Laplace Transform For Turkish Letters. Journal of the Technical University - Sofia Plovdiv branch, Bulgaria “Fundamental Sciences and Applications”,2018; 24:109-116.
  • [3] Gençoğlu MT. Importance of Cryptography in Information Security. IOSR Journal of Computer Engineering, 2019; 21(1): 65-68.
  • [4] Murray AH, Burchfiled RW. The Oxford English Dictionary: Being a Corrected Re-issue. Clarendon Press, Oxford, 1933.
  • [5] Weiss M. Principles of Steganography, Math 187: Introduction to Cryptography Professor Kevin O’Bryant, 2004.
  • [6] Kadry S, Nasr S. New Generating Technique for Image Steganography. Lecture Notes on Software Engineering, 2013; 1(2):190-193.
  • [7] Gençoğlu MT, Baleanu D. Nonlinear Systems and Complexity book series. In: Power Series Transform In Cryptology and ASCII, Mathematical Methods In Engineering. Springer, pp 67-74, 2018.
  • [8] Memon N, Wong P. Protecting digital media content. Communications of the ACM 41(7): 34–43, 1998.
  • [9] Wang H, Wang S. Cyber Warfare: Steganography vs. Steganalysis, Communications of the ACM, 2004; 47(10): 6-82. https://doi.org/10.1145/1022594.1022597
  • [10] Gençoğlu MT. Programming Encryption Algorithms with steganography. International Conference on Engineering Technology and Innovation, Sarajevo, 2017; 22-26 march, 58.
  • [11] Anderson RJ, Petitcolas FAP. On the Limits of Steganography. IEEE Journal of Selected Areas in Communications, 1998; 16(4):474-481.
  • [12] Benett K. Linguistic steganography- survey, analysis and robustness concerns for hiding information in text. Tech Report, Purdue University, 2004.
  • [13] Shahreza MS, Shahreza, MHS. Text steganography in SMS. International Journal of Network Security & Its Applications, 2007; 5(1): 2260-2265.
  • [14] Gençoğlu MT. Combining Cryptography with Steganography. ITM Web of Conferences, 2017; https://doi.org/10.1051/itmconf 01010
  • [15] Bhattacharyya S, Banerjee I, Sanyal G. A Novel Approach of Secure Text-Based Steganography Model using Word Mapping Method (WMM). International Journal of Computer and Information Engineering, 2010; 4(2): 96-103.
  • [16] Gençoğlu MT. Embedded image coding using Laplace Transform for Turkish letters. Multimedia Tools and Applications, 2019; 78(13): 17521–1753.
  • [17] Sellars D. An Introduction to Steganography, 1999. http://www.cs.uct.ac.za/ courses/CS400W/NIS04/papers99/dsellars/index.html. Date of access: 01 January 2020.
  • [18] Petitcolas FAP, Anderson RJ, Kuhn MG. Information Hiding- A Survey. Process of IEEE, 1999; 87(7): 1062-1078.
  • [19] Huang X, Kawashima R, Segawa N, Abe Y. The Real-Time Steganography Based on Audio-to-Audio Data BitStream. Technical report of IEICE, ISEC, 2006; 106:15-22.
  • [20] Jayaram P, Ranganatha HR, Anupama HS. Information hiding using audio steganography – a survey. The International Journal of Multimedia & Its Applications, 2011; 3(3):86-96. https://doi.org/ 10.5121/ijma.2011.3308
  • [21] Cvejic N, Seppben T. Increasing the capacity of LSB-based audio steganography. Media Team Oulu Information Processing Laboratory University of Oulu FIN- 90014 Finland, 2002.
  • [22] Qi YC, Ye L, Liu C. Wavelet domain audio steganalysis for multiplicative embedding model. Proceedings of the International Conference on Wavelet Analysis and Pattern Recognition, 2009; 429-432. https://doi.org/10.1109/ICWAPR.2009.5207432
  • [23] Shahreza SS, Shalmani MTM. High capacity error-free wavelet domain speech steganography. Acoustics, Speech and Signal Processing IEEE International Conference, 2008; 223-227. https://doi.org/10.1109/ICASSP.2008.4517963
  • [24] Choudry KN, Akash W. A Survey Paper on Video Steganography. International Journal of Computer Science and Information Technologies, 2015; 6 (3):2335-2338.
There are 24 citations in total.

Details

Primary Language English
Journal Section TJST
Authors

Muharrem Tuncay Gençoğlu 0000-0002-8784-9634

Publication Date March 15, 2021
Submission Date December 10, 2020
Published in Issue Year 2021 Volume: 16 Issue: 1

Cite

APA Gençoğlu, M. T. (2021). Enhancing The Data Security by using Audio Steganography with Taylor Series Cryptosystem. Turkish Journal of Science and Technology, 16(1), 47-64.
AMA Gençoğlu MT. Enhancing The Data Security by using Audio Steganography with Taylor Series Cryptosystem. TJST. March 2021;16(1):47-64.
Chicago Gençoğlu, Muharrem Tuncay. “Enhancing The Data Security by Using Audio Steganography With Taylor Series Cryptosystem”. Turkish Journal of Science and Technology 16, no. 1 (March 2021): 47-64.
EndNote Gençoğlu MT (March 1, 2021) Enhancing The Data Security by using Audio Steganography with Taylor Series Cryptosystem. Turkish Journal of Science and Technology 16 1 47–64.
IEEE M. T. Gençoğlu, “Enhancing The Data Security by using Audio Steganography with Taylor Series Cryptosystem”, TJST, vol. 16, no. 1, pp. 47–64, 2021.
ISNAD Gençoğlu, Muharrem Tuncay. “Enhancing The Data Security by Using Audio Steganography With Taylor Series Cryptosystem”. Turkish Journal of Science and Technology 16/1 (March 2021), 47-64.
JAMA Gençoğlu MT. Enhancing The Data Security by using Audio Steganography with Taylor Series Cryptosystem. TJST. 2021;16:47–64.
MLA Gençoğlu, Muharrem Tuncay. “Enhancing The Data Security by Using Audio Steganography With Taylor Series Cryptosystem”. Turkish Journal of Science and Technology, vol. 16, no. 1, 2021, pp. 47-64.
Vancouver Gençoğlu MT. Enhancing The Data Security by using Audio Steganography with Taylor Series Cryptosystem. TJST. 2021;16(1):47-64.