Kriptografi ve stenografi yöntemlerini birlikte kullanarak yüksek güvenlikli veri gizleme

İletişimin gizliliğinde ve güvenli mesaj iletiminde kullanılan iki önemli teknik Kriptografi ve Steganografidir. Bu iki yöntemin birlikte kullanılması veri güvenliğini artırmaktadır. Kriptografide gizli bir mesaj şifrelenir, Steganografide ise mesaj, görüntü veya ses dosyaları içine yerleştirilir. Bu çalışmada Kriptografi ve Stenografi birleştirilerek hibrit bir model sunulmakta ve bu model için ise bir ara yüz tasarımı gerçekleştirilmektedir. Kriptografide, kullanıcının belirleyeceği anahtar kelime ile şifrelenecek metin bir matris oluşturularak şifrelenmiştir. Şifreli metnin resim içine gizlenmesi aşamasında güvenlik katmanı olarak ikinci şifre girilmesi sağlanmıştır. Şifrelenecek metin gerçek renkli RGB görüntü içine sadece “Kırmızı” ve “Yeşil” kanallarının en az değerlikli 2 biti değiştirilerek gizlenmiştir. Toplamda 4 bit değiştirilerek resme saklanabilecek şifreli metin boyutunda artış sağlanmıştır. Çalışmada kullanılan taşıyıcı resimler 24 bit/pixsel renk seviyeli olarak belirlenmiştir. Bu çalışmada stego görüntülerin kaliteleri Tepe Sinyal-Gürültü Oranı (Peak Signal-to-Noise Ratio-PSNR) ve Yapısal Benzerlik Endeksi (SSIM) ölçüm kriterlerine göre değerlendirilmiştir.

High-capacity data hiding scheme together using cryptography and steganography

Cryptography and steganography are the two significant techniques used in security of communication and in safe message transfer. These two methods are applied together to improve data reliability. In cryptography, a secret message is encrypted, and in Steganography the message is placed into image, or voice files. In this study, a hybrid model is proposed by combining, cryptography and steganography and an interface is designed for proposed model. In cryptography, the text to be encrypted with a keyword determined by user is encoded by creating a matrix. While hiding an encrypted text into the picture, a second password is required to increase security. The text to be encrypted in true color RGB image are hidden by changing the least significant 2 bits of "red" and "green" channels. Size of the encrypted secret message has been increased by changing 4 bits in totally. The carrier pictures utilized in this study have been determined as 24 bit/pixel color scale. In this study, quality of the stego images has been evaluated according to the quality measurement criteria of Peak Signal-to-Noise Ratio (PSNR-dB) and Structural Similarity Index (SSIM).

___

  • D. Seth, L. Ramanathan, A. Pandey, Security Combining Enhancement: Steganography, International Journal of Computer Applications Vo. 9 No 11, November 2010. and
  • S. Narayana, G. Prasad, Two New Approaches For Secured Image Steganography Using Cryptographic Techniques And Type Conversions, Signal & Image Processing : An International Journal (SIPIJ) Vol.1, No.2, December 2010.
  • R. Nivedhitha, T. Meyyappan, M. Phil., Image Security Using Steganography And Cryptographic Techniques, International Journal of Engineering Trends and Technology- Vol. 3 No 3, 2012.
  • C. K. Chan and L. M. Chen, Hiding data in images by simple LSB substitution, Pattern Recognition., Vol. 37, No 3, pp. 469–474, 2004.
  • L. Der-Chyuan, L. Jiang-Lung, Steganographic Method for Secure Communications, Computers & Security Vol. 21, No 5, pp 449-460, 2002.
  • W.N. Lie, L.C. Chang, Data hiding in images with adaptive numbers of least significant bits based on the human visual system, Proceedings of the 1999 International Conference on Image Processing, Vol. 1, pp. 286-290, December 1999.
  • Y.K. Lee, L. H. Chen, High capacity steganographic model, IEEE Proceedings-Vision, Image and Signal Processing, Vol. 147, No 3, pp. 288-294 June 2000.
  • C. H. Yang, C. Y. Weng, S. J. Wang, H. M. Sun, Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems, IEEE Information Transactions On Forensics And Security, Vol. 3, No. 3, September 2008.
  • H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, Image steganographic scheme based on pixel-value differencing and LSB replacement methods, Proc. Inst. Elect. Eng., Vis. Image Signal Process. Vol. 152, No 5, pp. 611–615, 2005.
  • D. K. Sarmah, N. Bajpai, Proposed System for data hiding using Cryptography and Steganography, International Journal of Computer Science and Security, Vol 4 No 5, 2010.
  • S. Usha, G. A. Sathish Kumal, K. Boopathybagan., A Secure Triple Level Encryption Method Using Cryptography and Steganography, 2011 International Conference on Computer Science and Network Technology, IEEE December 24-26, 2011
  • S. Phad Vitthal, S. Bhosale Rajkumar, R. Panhalkar Archana, A Novel Security Scheme for Secret Data using Cryptography and Steganography, I. J. Computer Network and Information Security, pp. 36- 42, 2012.
  • J. Nath, A. Nath, Advanced Steganography Algorithm (IJACSA) Computer Science and Applications, Vol. 2, No.3, March 2011. secret of Advanced Journal
  • H. Yang, X. Sun, G. Sun., A High-Capacity Image Data Substitution, Radio Engıneerıng, Vol. 18, No 4, December 2009. Using Adaptive LSB
  • F. Lussona, K. Baileya, M. Leeneya, K. Curran., A novel approach to digital watermarking, exploiting color spaces, Signal Processing, Volume 93, No 5, pp. 1268–1294, May 2013.
  • C. Yen-Yu, C. Ying-Wen, Y. Wen-Chien, Design a deblocking filter with three separate modes in DCT- based coding, Journal of Visual Communication and Image Representation, Volume 19, No 4, pp. 231-244, May 2008.
  • J.K. Mandal, D. Das, Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain, International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, pp. 83-93, July 2012.
  • G-S. Lin, Y-T. Chang, W-N. Lie, A Framework of Enhancing Image Steganography With Picture Quality Optimization Simulated Multimedia, Vol. 12, No. 5, pp. 345–57, 2010. Algorithm, on IEEE Trans
  • G. Swain, S. K. Lenka, LSB Array Based Image Steganography Technique By Exploring The Four Least Significant Bits, Global Trends in Information Systems and Software Applications Communications in Computer and Information Science, In: P. V. Krishna, M. R. Babu, E. Ariwa, Editors, Springer Berlin Heidelberg, Vol. 270, pp 479- 488, 2012.
  • M. A. Wafaa, S. R. M. Abdul, K. P. Al-Sakib, Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach, Computers and Electrical Engineering, Vol. 40, No. 4, pp. 1390–1404, May 2014.