STEGANOGRAFİ TABANLI YENİ BİR KLASÖR KİLİTLEME YAKLAŞIMI VE YAZILIMI GELİŞTİRİLMESİ
Bu makalede, steganografi tabanlı yeni bir kişisel güvenlik yaklaşımı sunulmuş ve pratik olarak kullanımı için ise bir klasör kilitleme yazılımı (STKK) geliştirilmiştir. Sunulan yaklaşım kullanıcılara, bilgisayardaki tüm dosyaların güvenliği için esnek ve güvenilir çözümler sunmaktadır. Steganografik çözümlerin yanı sıra AES, DES ve 3DES gibi bilinen kriptografik yaklaşımların da geliştirilen yazılıma eklenmesi ile güvenlik arttırılmıştır. Deneysel sonuçlar, geliştirilen çözümün steganalize karşı dayanıklı olduğunu ve tüm dosya tiplerini desteklediği için kişisel güvenliğin artırılmasına katkı sağlayacağını göstermektedir.
DEVELOPMENT OF A NEW FOLDER LOCK APPRAOCH AND SOFTWARE BASED ON STEGANOGRAPHY
This paper introduces a new personal security approach based on steganography. In order to achieve the task, a folder-lock software (STKK) was developed. The proposed approach provides more flexible solutions to the users to secure all files in the computer. In addition to steganographic solutions, cryptographic approaches such as AES, DES and 3DES are also added to the developed software. The experimental results have shown that the developed solution is robust against steganalysis and might provide better personel security by supporting all file types.
___
- Sağıroğlu, Ş. ve Alkan, M., "Her Yönüyle Elektronik İmza (e-İmza)", Grafiker, Ankara, 2005.
- Johnson, N.F. ve Jajodia, S., "Exploring steganography: Seeing the unseen", Computer, Cilt 31, No 2, 26-34, 1998.
- Adli, A. ve Nakao, Z., "Three steganography algorithms for MIDI files", Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, China, 2401-2404, 18-21 Ağustos 2005.
- Akleylek, S. ve Nuriyev, U., "Steganography and new implementation of steganography", Signal Processing and Communications Applications Conference, Kayseri, TURKEY, 64-67, 16-18 Mayıs 2005.
- Bender, W., Gruhl, D., Morimoto, N. ve Lu, A., "Techniques for data hiding", IBM Syst. J., Cilt 35, No 3-4, 313-336, 1996.
- Brisbane, G., Safavi-Naini, R. and Ogunbona, P., "High-capacity steganography using a shared colour palette", IEE Proc.-Vis. Image Signal Process., Cilt 152, No 6, 787-792, 2005.
- Gopalan, K., "Audio steganograph using bit modification" , International Conference on Multimedia and Expo, Baltimore, Maryland, 629-632, 6-9 Temmuz 2003.
- Lee, Y.K. ve Chen, L.H., "High capacity image steganographic model", Vision, Image and Signal Processing, IEE Proceedings-, Cilt 147, No 3, 288-294, 2000.
- Niimi, M., Noda, H., Kawaguchi, E. ve Eason, R.O., "High capacity and secure digital steganography to palette-based images", International Conference on Image Processing, Rochester, New York, USA, II-917- II-920, 22-25 Eylül 2002.
- Noda, H., Spaulding, J., Shirazi, M.N. ve Kawaguchi, E., "Application of bit-plane decomposition steganography to JPEG2000 encoded images" IEEE Signal Processing Letters, Cilt 9, No 12, 410-413, 2002.
- Sağıroğlu, Ş. ve Tunckanat, M., "A Secure Internet Communication Tool", Turkish Journal of Telecommunications, Cilt 1, No 1, 40-46, 2002.
- Yan, D., Wang, R., Yu, X. ve Zhu, J., "Steganography for MP3 audio by exploiting the rule of window switching" Computers & Security, Cilt 31, No 5, 704-716, 2012.
- Sui, X.G. ve Luo, H., "A new steganography method based on hypertext" Asia-Pacific Radio Science Conference, Qingdao, China, 181-184, 24-27 Ağustos 2004.
- Swanson, M.D., Zhu, B. ve Tewfik, A.H., "Robust Data Hiding For Images", Digital Signal Processing Workshop, Loen Norway, 37-40, 1-4 Eylül 1996.
- Tseng, H.W. ve Chang, C.C., "Steganography using JPEG-compressed images" International Conference on Computer and Information Technology, Wuhan, China, 12-17, 14-16 Eylül 2004.
- Habib, S., Parveen, A. ve Sarwar, S., "Secure Communication of Secret Data Using Steganography", International Journal of Computer Science and Mobile Computing, Cilt 2, No 5, 249-254, 2013.
- Chou, J., Ramchandran, K. ve Ortega, A., "High capacity audio data hiding for noisy channels", International Conference on Information Technology: Coding and Computing, LasVegas, NV, 108-112, 2-4 Nisan 2001.
- Cvejic, N. ve Seppanen, T., "Increasing the capacity of LSB-based audio steganography", IEEE Workshop on Multimedia Signal Processing, St. Thomas, Virgin Islands, USA, 336-338, 9-11 Aralık 2002.
- Rekik, S., Guerchi, D., Selouani, S. ve Hamam, H., "Speech steganography using wavelet and Fourier transforms" EURASIP Journal on Audio, Speech and Music Processing, Cilt 2012, No 1, 1-14, 2012.
- Taruna ve Jain, R., "Message Guided Adaptive Random Audio Steganography Using LSB Modification", International Journal of Computer Applications, Cilt 86, No 7, 6-9, 2014.
- Ozer, H., Sankur, B., Memon, N. ve Avcıbaş, İ., "Detection Of Audio Covert Channels Using Statistical Footprints Of Hidden Messages.", Digital Signal Processing, Cilt 16, No 4, 389- 401, 2006.
- Ru, X., Zhuang, Y. ve Wu, F., "Audio Steganalysis Based On 'Negative Resonance Phenomenon' Caused By Steganographic Tools.", Journal of Zhejiang University Science A, Cilt 7, No 4, 577-583, 2006.
- Avcıbaş, İ., "Audio Steganalysis With Content Independent Distortion Measures", IEEE Signal Processing Letters, Cilt 13, No 2, 92-95, 2006.
- Yavanoglu, U., Ozcakmak, B. ve Milletsever, O., "A New Intelligent Steganalysis Method for Waveform Audio Files", International Conference on Machine Learning and Applications, Boca Raton, FL, 233-239, 12-15 Aralık 2012.
- Arslan, Y. ve Yalman, Y., "Visual Steganalysis of LSB-encoded Audio Data Based on Frequency Domain Characteristics", International Conference on Security of Information and Networks, Aksaray, Turkey, 359-362, 26-28 Kasım 2013.
- Amin, M.M., Salleh, M., Ibrahim, S., Katmin, M.R. ve Shamsuddin, M.Z.I., "Information hiding using steganography", 4th National Conference on Telecommunication Technology, Shah Alam, MALAYSIA, 21-25, 14-15 Ocak 2003.
- Adhiya, K. P. ve Patil, S. A., "Hiding Text in Audio Using LSB Based Steganography", Information & Knowledge Management, Cilt 2, No 3, 8-14, 2012.
- Meghanathan, N. ve Nayak, L., " Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media", International Journal of Network Security & Its Application (IJNSA), Cilt 2, No 1, 43-55, 2010.
- Kessler, G.C., "An Overview of Steganography for the Computer Forensics Examiner", Forensic Science Communications , Cilt 6, No 3, 1-29, 2004.
- İnternet: WAVE PCM soundfile format, https://ccrma.stanford.edu/courses/422/projects/ WaveFormat/, 2014.
- İnternet: Steganos, https://www.steganos.com/us/products/datasecurity/safe/features/, 2014.
- İnternet: Steganos, https://www.steganos.com/us/products/datasecurity/privacy-suite/features/, 2014.
- İnternet: Quickcrypto, http://quickcrypto.com/index.htm, 2014.
- İnternet: Quickcrypto Steganography Software, http://quickcrypto.com/steganographysoftware.html, 2014.
- İnternet: Winability, http://www.winability.com/folderguard/, 2014.
- İnternet: Gilisoft, http://www.gilisoft.com/product-file-lock-pro. htm, 2014.
- İnternet: OpenPuff, http://embeddedsw.net/OpenPuff_Steganography _Home.html, 2014.
- İnternet: Mp3stego, http://www.petitcolas.net/steganography/mp3steg o/, 2014.
- İnternet: Steghide, http://steghide.sourceforge.net/, 2014.
- İnternet: Invisiblesecrets Steganography Software, http://www.invisiblesecrets.com/steganographysoftware.html, 2014.
- Djebbar, F., Ayad, B., Meraim, K.A. ve Hamam, H., "Comparative study of digital audio steganography techniques", EURASIP Journal on Audio, Speech, and Music Processing, Cilt 2012, No 1, 1-16, 2012.
- Khan, S., Said, U., Ahmad, E., Ali, F. ve Ali, M., "The Effect of Various Number of Least Significant Bits substitution in Audio using Discrete Cosine Transform", IJCSI International Journal of Computer Science, Cilt 10, No 4, 298-302, 2013.
- Karthigaikumar, P., Kirubavathy, K.J. ve Baskaran, K., " FPGA based audio watermarking-Covert communication ", Microelectronics Journal, Cilt 42, No 5, 778- 784, 2011.
- Hussain, I., " A novel approach of audio watermarking based on S -box transformation ", Mathematical and Computer Modelling, Cilt 57, No 3-4, 963-969, 2013.