Dalgacık Dönüşümü Tabanlı Görsel Kriptoloji

Günlük hayatta kişi, kurum ve kuruluşlar tarafından kullanımı hızla artan bankacılık işlemleri, e-postagönderimi ve alımı, sanal alışveriş gibi işlemler bilgi güvenliğinin önemini de giderek arttırmıştır. Bilgigüvenliğini sağlamak için bir çok yöntem vardır. Bu çalışmada, bu yöntemlerden biri olan görselkriptografi kullanılmıştır. Bilgi aktarımı sırasında, gönderilecek olan veriler dalgacık dönüşümüne dayalıbelirli bir algoritmaya bağlı olarak şifreli paylara ayırılmıştır. Daha sonra ayrılan paylar anlamlıgörüntülere gömülerek, hem gönderilen verilerin güvenliği sağlanmaktadır, hem de şifrelenmiş paylaraayrılan verinin dikkat çekmesi önlenmektedir.

Visual Cryptology Based on Wavelet Transform

Transmissions such as bank transactions, e-mail sending and retrieval, virtual shopping, etc. has become more and more common by people, institutions and organizations in daily life. This has also increased the importance of information security. There are many ways to ensure information security. In this study, one of these methods, visual cryptography, is used. During the data transfer, the data to be transmitted is divided into encrypted shares depending on a certain algorithm based on wavelet transfom. Then, the allocated shares are buried into meaningful images. Doing so, both the security of the transmitted data is ensured and the attention to the data which is divided into the encrypted shares is prevented.

___

  • Ergen B., Baykara M., 2011. Dalgacık Ve Dalgacık Paket Ayrıştırması İle İmgelerden Gürültü Temizlemesi Analizi. e-Journal of New World Sciences Academy, 6, 2, 518-526.
  • Lekshmi S. J., Anil A. R., 2015. Secure Visual Secret Sharing Based On Discrete Wavelet Transform. ICTACT Journal On Image And Video Processing, 6, 1, 1072-1075.
  • Leung B. W., Ng F. Y., Wong D. S., 2009. On The Security Of A Visual Cryptography Scheme For Color Images. ELSEVIER Pattern Recognition, 42, 929-940.
  • Liu F., Wu C.K., Lin X.J., 2008. Colour Visual Cryptography Schemes. IET Inf. Secur., 2, 4, 151-165.
  • Liu G., Zhang Z., Dai Y., 2010. Improved LSB-matching Steganography for Preserving Second-order Statistics. Journal Of Multimedia,5, 5, 458-463.
  • Naor M., Shamir A., 1994. Visual Cryptography. The Proceedings Of The Conference on Advances in Cryptology EUROCRYPT'94, 950, 1-12.
  • Patil S., Tajane K., Sirdeshpande J., 2013. Analysing Secure Image Secret Sharing Schemes Based On Steganography. Internatıonal Journal Of Computer Engineering & Technology (IJCET), 4, 2, 172-178.
  • Saichandana B., Srinivas K., Kumar R. K., 2010. Visual Cryptography Scheme For Color Images. International Journal of Computer Engineering and Technology (IJCET), 1, 1, 207-212.
  • Shyu S. J., 2009. Image Encryption By Multiple Random Grids. ELSEVIER Pattern Recognition, 42, 1582-1596.
  • Qiao W., Yin H., Liang H., 2009. A Kind of Visual Cryptography Scheme For Color Images Based On Halftone Technique. 2009 International Conference on Measuring Technology and Mechatronics Automation, 294, 393-395.
  • Verma J., Khemchandani V., 2012. A Visual Cryptographic Technique To Secure Image Shares. International Journal Of Engineering Research And Applications (IJERA), 2, 1, 1121-1125.
  • Wu X., Sun W., 2014. Extended Capabilities For XOR- Based Visual Cryptography. IEEE Transactions On Information Forensics And Security, 9, 10, 1592-1605.
  • ab.org.tr/ab06/bildiri/100.pdf, (10.06.2017)