Research Article
BibTex RIS Cite

Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB

Year 2017, Volume: 10 Issue: 1, 48 - 53, 03.10.2017

Abstract

Bir Steganografik metodun değerlendirme kriterlerinden
biri de dayanıklılıktır. Bu çalışmada, iletim hattı boyunca örtü verinin
uğrayabileceği saldırılara karşı gizlenmiş veriyi korumak hedeflenmiştir.
Resmin parlaklık değişimlerine karşı gizlenmiş mesajı korumak için yerel ikili
örüntü (LBP) operatörünün kullanılması önerilmiştir. Daha önceden damgalama
tekniklerinde kullanılan bu metodun, daha farklı bir yaklaşımla steganografide
kullanılması önerilmiştir. Resme LBP operatörü uygulandıktan sonra LBP haritasının
üzerinde, LSB metodu kullanılarak veri gizlenecektir. Önerilen algoritmanın
saldırılara karşı dayanıklılığı, kapasitesi ve taşıyıcıdaki değişim
ölçülecektir.

References

  • [1] Shen, S. Y., Huang, L. H., “A data hiding scheme using pixel value differencing and improving exploiting modification directions”, Computers & Security, Cilt 48, 131-141, 2015.
  • [2] Lin, C. C., Liu, X. L., Yuan, S. M., “Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping”, Information Sciences, Cilt 293, 314-326, 2015.
  • [3] Lu, T. C., Tseng, C. Y., Deng, K. M., “Reversible data hiding using local edge sensing prediction methods and adaptive thresholds”, Signal Processing, Cilt 104, 152-166, 2014.
  • [4] S. U. Maheswari, S. U., Hemanth, D. J., “Frequency domain QR code based image steganography using Fresnelet transform”, AEU - International Journal of Electronics and Communications, Cilt 69, No 2, 539-544, 2015.
  • [5] Roy, S., Venkateswaran, P., “A Text based Steganography Technique with Indian Root”, Procedia Technology, Cilt 10,167-171, 2013.
  • [6] Dasgupta, K., Mondal, J. K., Dutta P., “Optimized Video Steganography Using Genetic Algorithm (GA)”, Procedia Technology, Cilt 10,131-137, 2013.
  • [7] Mali, S. N., Patil, P. M., Jalnekar, R. M., “Robust and secured image-adaptive data hiding”, Digital Signal Processing, Cilt 22, No 2, 314-323, 2012.
  • [8] Yan, D., Wang, R., Yu, X., Zhu J., “Steganalysis for MP3Stego using differential statistics of quantization step”, Digital Signal Processing, Cilt 23, No 4, 1181-1185, 2013.
  • [9] Tang, M., Hu, J., Song W., “A high capacity image steganography using multi-layer embedding”, Optik - International Journal for Light and Electron Optics, Cilt 125, No 15, 3972-3976, 2014.
  • [10] Wu, M. Y., Ho, Y. K., Lee J., H., “An iterative method of palette-based image steganography”, Pattern Recognition Letters, Cilt 25, No 3, 301-309, 2004.
  • [11] Şahin Mesut A., Mesut A.,Saklı M.T., “Görüntü Steganografide Gizlilik Paylaşım Şemalarının Kullanılması ve Güvenliğe Etkileri”, III Ağ ve Bilgi Güvenliği Sempozyumu, Ankara-Türkiye, 2010.
  • [12] Chen, W. Y., “Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques”, Applied Mathematics and Computation, Cilt 196, No 1, 40-54, 2008.
  • [13] Ioannidou, A., Halkidis, S. T., Stephanides, G., “A novel technique for image steganography based on a high payload method and edge detection”, Expert Systems with Applications, Cilt 39, No 14, 11517-11524, 2012.
  • [14] Elshoura, S. M., Megherbi, D. B., “A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments”, Signal Processing: Image Communication, Cilt 28, No 5, 531-552, 2013.
  • [15] Yang, C. H., “Inverted pattern approach to improve image quality of information hiding by LSB substitution”, Pattern Recognition, Cilt 41, No 8, 2674-2683, 2008.
  • [16] Chen, S. K., “A module-based LSB substitution method with lossless secret data compression”, Computer Standards & Interfaces, Cilt 33, No 4, 367-371, 2011.
  • [17] Chang, C.C., Hsiao, J.Y., Chen, C.S., “Finding optimal Least-Significant-Bit substitutionin image hiding by dynamic programming strategy”, Pattern Recognition, Cilt 36, 1583–1595, 2003.
  • [18] Chan, C. K., Cheng, L. M., “Improved hiding data in images by optimal moderately significant-bit replacement”, IEE Electron. Lett., Cilt 37, No 16, 1017–1018, 2001.
  • [19] Yang, B., Chen, S., “A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image”, Neurocomputing, Cilt 120, 365-379, 2013.
  • [20] Luo, Y., Wu, C. M., Zhang, Y., “Facial expression feature extraction using hybrid PCA and LBP”, The Journal of China Universities of Posts and Telecommunications, Cilt 20, No 2, 120-124, 2013.
  • [21] Nanni, L., Lumini, A., Brahnam, S., “Survey on LBP based texture descriptors for image classification”, Expert Systems with Applications, Cilt 39, No 3, 3634-3641, 2012.
  • [22] Kanan, H. R., Nazeri B., “A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm”, Expert Systems with Applications, Cilt 41, No 14, 6123-6130, 2014.
Year 2017, Volume: 10 Issue: 1, 48 - 53, 03.10.2017

Abstract

References

  • [1] Shen, S. Y., Huang, L. H., “A data hiding scheme using pixel value differencing and improving exploiting modification directions”, Computers & Security, Cilt 48, 131-141, 2015.
  • [2] Lin, C. C., Liu, X. L., Yuan, S. M., “Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping”, Information Sciences, Cilt 293, 314-326, 2015.
  • [3] Lu, T. C., Tseng, C. Y., Deng, K. M., “Reversible data hiding using local edge sensing prediction methods and adaptive thresholds”, Signal Processing, Cilt 104, 152-166, 2014.
  • [4] S. U. Maheswari, S. U., Hemanth, D. J., “Frequency domain QR code based image steganography using Fresnelet transform”, AEU - International Journal of Electronics and Communications, Cilt 69, No 2, 539-544, 2015.
  • [5] Roy, S., Venkateswaran, P., “A Text based Steganography Technique with Indian Root”, Procedia Technology, Cilt 10,167-171, 2013.
  • [6] Dasgupta, K., Mondal, J. K., Dutta P., “Optimized Video Steganography Using Genetic Algorithm (GA)”, Procedia Technology, Cilt 10,131-137, 2013.
  • [7] Mali, S. N., Patil, P. M., Jalnekar, R. M., “Robust and secured image-adaptive data hiding”, Digital Signal Processing, Cilt 22, No 2, 314-323, 2012.
  • [8] Yan, D., Wang, R., Yu, X., Zhu J., “Steganalysis for MP3Stego using differential statistics of quantization step”, Digital Signal Processing, Cilt 23, No 4, 1181-1185, 2013.
  • [9] Tang, M., Hu, J., Song W., “A high capacity image steganography using multi-layer embedding”, Optik - International Journal for Light and Electron Optics, Cilt 125, No 15, 3972-3976, 2014.
  • [10] Wu, M. Y., Ho, Y. K., Lee J., H., “An iterative method of palette-based image steganography”, Pattern Recognition Letters, Cilt 25, No 3, 301-309, 2004.
  • [11] Şahin Mesut A., Mesut A.,Saklı M.T., “Görüntü Steganografide Gizlilik Paylaşım Şemalarının Kullanılması ve Güvenliğe Etkileri”, III Ağ ve Bilgi Güvenliği Sempozyumu, Ankara-Türkiye, 2010.
  • [12] Chen, W. Y., “Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques”, Applied Mathematics and Computation, Cilt 196, No 1, 40-54, 2008.
  • [13] Ioannidou, A., Halkidis, S. T., Stephanides, G., “A novel technique for image steganography based on a high payload method and edge detection”, Expert Systems with Applications, Cilt 39, No 14, 11517-11524, 2012.
  • [14] Elshoura, S. M., Megherbi, D. B., “A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments”, Signal Processing: Image Communication, Cilt 28, No 5, 531-552, 2013.
  • [15] Yang, C. H., “Inverted pattern approach to improve image quality of information hiding by LSB substitution”, Pattern Recognition, Cilt 41, No 8, 2674-2683, 2008.
  • [16] Chen, S. K., “A module-based LSB substitution method with lossless secret data compression”, Computer Standards & Interfaces, Cilt 33, No 4, 367-371, 2011.
  • [17] Chang, C.C., Hsiao, J.Y., Chen, C.S., “Finding optimal Least-Significant-Bit substitutionin image hiding by dynamic programming strategy”, Pattern Recognition, Cilt 36, 1583–1595, 2003.
  • [18] Chan, C. K., Cheng, L. M., “Improved hiding data in images by optimal moderately significant-bit replacement”, IEE Electron. Lett., Cilt 37, No 16, 1017–1018, 2001.
  • [19] Yang, B., Chen, S., “A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image”, Neurocomputing, Cilt 120, 365-379, 2013.
  • [20] Luo, Y., Wu, C. M., Zhang, Y., “Facial expression feature extraction using hybrid PCA and LBP”, The Journal of China Universities of Posts and Telecommunications, Cilt 20, No 2, 120-124, 2013.
  • [21] Nanni, L., Lumini, A., Brahnam, S., “Survey on LBP based texture descriptors for image classification”, Expert Systems with Applications, Cilt 39, No 3, 3634-3641, 2012.
  • [22] Kanan, H. R., Nazeri B., “A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm”, Expert Systems with Applications, Cilt 41, No 14, 6123-6130, 2014.
There are 22 citations in total.

Details

Journal Section Makaleler(Araştırma)
Authors

Türker Tuncer

Engin Avcı

Publication Date October 3, 2017
Published in Issue Year 2017 Volume: 10 Issue: 1

Cite

APA Tuncer, T., & Avcı, E. (2017). Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, 10(1), 48-53.
AMA Tuncer T, Avcı E. Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB. TBV-BBMD. October 2017;10(1):48-53.
Chicago Tuncer, Türker, and Engin Avcı. “Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi 10, no. 1 (October 2017): 48-53.
EndNote Tuncer T, Avcı E (October 1, 2017) Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 10 1 48–53.
IEEE T. Tuncer and E. Avcı, “Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB”, TBV-BBMD, vol. 10, no. 1, pp. 48–53, 2017.
ISNAD Tuncer, Türker - Avcı, Engin. “Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 10/1 (October 2017), 48-53.
JAMA Tuncer T, Avcı E. Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB. TBV-BBMD. 2017;10:48–53.
MLA Tuncer, Türker and Engin Avcı. “Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, vol. 10, no. 1, 2017, pp. 48-53.
Vancouver Tuncer T, Avcı E. Yerel İkili Örüntü Tabanli Veri Gizleme Algoritmasi: LBP-LSB. TBV-BBMD. 2017;10(1):48-53.

Article Acceptance

Use user registration/login to upload articles online.

The acceptance process of the articles sent to the journal consists of the following stages:

1. Each submitted article is sent to at least two referees at the first stage.

2. Referee appointments are made by the journal editors. There are approximately 200 referees in the referee pool of the journal and these referees are classified according to their areas of interest. Each referee is sent an article on the subject he is interested in. The selection of the arbitrator is done in a way that does not cause any conflict of interest.

3. In the articles sent to the referees, the names of the authors are closed.

4. Referees are explained how to evaluate an article and are asked to fill in the evaluation form shown below.

5. The articles in which two referees give positive opinion are subjected to similarity review by the editors. The similarity in the articles is expected to be less than 25%.

6. A paper that has passed all stages is reviewed by the editor in terms of language and presentation, and necessary corrections and improvements are made. If necessary, the authors are notified of the situation.

0

.   This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.