Yıl: 2019 Cilt: 6 Sayı: 3 Sayfa Aralığı: 668 - 680 Metin Dili: İngilizce DOI: DOI: 10.31202/ecjse.571030 İndeks Tarihi: 19-12-2020

The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm

Öz:
The field of science, which enables the transmission of private data in multimedia environments such as display, audio and video, is called steganography. The widespread use of the internet in our daily lives has brought about the problem of transmitting confidential information. Hence, the need for steganography science has also increased. In this study, a labyrinth is produced in the size of the environment in which the data can hide with the help of a private key. Color images with 24-bit depth were used as data hiding environment in different measures and different formats. For the production of maze, the Depth First Search algorithm, which ensures both the creation of the maze and the finding of solution path together with this, was utilized. It is made the information hide inside the pixels on the image, corresponding to the coordinates of the solution path obtained from the maze. The Lowest Bit Insertion method was used to hide information. In order to make the proposed method more robust, the data, which will be hidden before the data hiding process was encrypted with the AES encryption algorithm. This makes it difficult for third parties to obtain confidential data. The proposed method was tested with detailed security analysis and it was observed that data hiding / data extraction processes were successful.
Anahtar Kelime:

Veri Gizlemek Amacıyla Labirent Oluşturma ve AES Veri Şifreleme Algoritması Tabanlı Bir Yöntem Önerisi

Öz:
Görüntü, ses ve video gibi multimedya ortamlarında gizli verilerin iletilmesini sağlayan bilim dalına steganografi adı verilmektedir. Günlük hayatımızda internetin yaygın olarak kullanılması, kişiye özel bilgilerin iletilmesi problemini de beraberinde getirmiştir. Dolayısı ile steganografi bilimine olan ihtiyaç da artmıştır. Bu çalışmada kişiye özel bir anahtar yardımı ile veri gizlenecek ortam büyüklüğünde bir labirent üretilmektedir. Veri gizleme ortamı olarak farklı ölçülerde ve farklı formatlarda 24 bit derinliğe sahip renkli resimler kullanılmıştır. Labiret üretimi için hem labirentin oluşturulmasını hem de çözüm yolunun birlikte bulunmasını sağlayan Derin Öncelikli Arama algoritmasından faydalanılmıştır. Labirentten elde edilen çözüm yolu koordinatlarına denk gelecek şekilde görüntü üzerindeki piksellerin içerisine bilgi gizlenmektedir. Bilgi gizlemek için En Düşük Bite Ekleme yöntemi kullanılmıştır. Çalışmada önerilen yöntemin daha güçlü kılınması için, veri gizleme işleminden önce gizlenecek veriler Gelişmiş Şifreleme Standardı şifreleme algoritması ile şifrelenmiştir. Böylelikle gizli verilerin üçüncü şahıslar tarafından elde edilmesi güç hale gelmektedir. Öne sürülen yöntem detaylı güvenlik analizleriyle test edilmiş ve veri gizleme/veri çıkarma işlemlerinin başarılı olduğu gözlenmiştir.
Anahtar Kelime:

Belge Türü: Makale Makale Türü: Araştırma Makalesi Erişim Türü: Erişime Açık
  • Hui-Lung L., Chia-Feng L., Ling-Hwei C., "A perfect maze based steganographic method", Journal of Systems and Software, 2010,83(12), 2528-2535.
  • Bradley H., Craigie W.A., Onions Ct., Ahm J., "The Oxford English Dictionary: Being a Corrected Re-issue", Clarendon Press, Oxford, (1970).
  • Johnson N.F., Jajodia S., "Exploring Steganography: Seeing the Unseen", IEEE Computers, 1998,31(2), 26-34.
  • Mohd B.J., Abed S., Al-Hayajneh T., Alouneh S. "FPGA hardware of the LSB steganography method", 2012 International Conference on Computer, Information and Telecommunication Systems (CITS), Amman, 1-4, (2012).
  • Sharma S., Gupta A., Trivedi M.C., Yadav V.K. "Analysis of Different Text Steganography Techniques: A Survey", 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, 130-133, (2016).
  • Anderson R.J., "Information Hiding: First International Workshop", Springer-Verlag, Cambridge, U.K., (1996).
  • Petitcolas F.A.P., Anderson R.J., M.G, K., "Information hiding-a survey", Proceedings of the IEEE, 1999,87(7), 1062 - 1078.
  • Abboud G., Marean J., Yampolskiy R.V. "Steganography and Visual Cryptography in Computer Forensics", Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), Oakland, CA, 25-32, (2010).
  • Polap D. "Designing mazes for 2D games by artificial ant colony algorithm", Proceedings of the International Symposium for Young Scientists in Technology, Engineering and Mathematics. SYSTEM 2015, Catania, Italy, 63-70, (2015).
  • [10] Lee H.L., Lee C.F., Chen L.H., "A perfect maze based steganographic method", Journal of Systems and Software, 2010,83(12), 2528-2535.
  • [11] Sukumar T., Santha K.R., "Maze Based Data Hiding Using Back Tracker Algorithm", International Journal of Engineering Research and Applications (IJERA), 2012,2(4), 499-504.
  • [12] Kozlova A., Brown J.A., Reading E. "Examination of representational expression in maze generation algorithms", IEEE Conference on Computational Intelligence and Games (CIG), Tainan, Taiwan, 532-533, (2015).
  • [13] Sun, Y., Wang, J., Duan, X. "Research on path planning algorithm of indoor mobile robot", International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shengyang, China, 1108-1111, (2013).
  • [14] Dumane A.R., Narole N.G., Wanjari P. "Design of advanced encryption standard on soft-core processor", World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), Coimbatore, India, 1-5, (2016).
  • [15] Pendli V., Pathuri M., Yandrathi S., Razaque A. "Improvising performance of Advanced Encryption Standard algorithm", Second International Conference on Mobile and Secure Services (MobiSecServ), Gainesville, FL, USA, 1-5, (2016).
  • [16] Garcia D.F. "Performance Evaluation of Advanced Encryption Standard Algorithm", Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), Sliema, Malta, 247-252, (2015).
  • [17] Güvenoğlu, E., "Resim Şifreleme Amacıyla Dinamik S Kutusu Tasarımı İçin Bir Yöntem", El-Cezerî Fen ve Mühendislik Dergisi, 2016,3(2), 179-191.
  • [18] Guvenoglu, E., "Maze Based Image Encryption Algorithm", International Research Journal of Engineering and Technology (IRJET) 2015,2(8), 1578-1585.
  • [19] Naveenkumar S.K., Panduranga H.T., Kiran. "Triple image encryption based on integer transform and chaotic map", International Conference on Optical Imaging Sensor and Security (ICOSS), Coimbatore, India, 1-6, (2013).
  • [20] Shannon C.E., "A Mathematical Theory of Communication", The Bell System Technical Journal, 1948,27, 379–423,623–656.
  • [21] Munir R. "Security analysis of selective image encryption algorithm based on chaos and CBC-like mode", 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), Bali, Indonesia, 142-146, (2012).
  • [22] Wang Z., Bovik A.C., Sheikh H.R., Simoncelli E.P., "Image quality assessment: from error visibility to structural similarity", IEEE Transactions on Image Processing, 2004,13(4), 600612. 680
APA Guvenoglu E, Razbonyalı C (2019). The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. , 668 - 680. DOI: 10.31202/ecjse.571030
Chicago Guvenoglu Erdal,Razbonyalı Can The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. (2019): 668 - 680. DOI: 10.31202/ecjse.571030
MLA Guvenoglu Erdal,Razbonyalı Can The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. , 2019, ss.668 - 680. DOI: 10.31202/ecjse.571030
AMA Guvenoglu E,Razbonyalı C The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. . 2019; 668 - 680. DOI: 10.31202/ecjse.571030
Vancouver Guvenoglu E,Razbonyalı C The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. . 2019; 668 - 680. DOI: 10.31202/ecjse.571030
IEEE Guvenoglu E,Razbonyalı C "The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm." , ss.668 - 680, 2019. DOI: 10.31202/ecjse.571030
ISNAD Guvenoglu, Erdal - Razbonyalı, Can. "The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm". (2019), 668-680. https://doi.org/DOI: 10.31202/ecjse.571030
APA Guvenoglu E, Razbonyalı C (2019). The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. El-Cezerî Journal of Science and Engineering, 6(3), 668 - 680. DOI: 10.31202/ecjse.571030
Chicago Guvenoglu Erdal,Razbonyalı Can The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. El-Cezerî Journal of Science and Engineering 6, no.3 (2019): 668 - 680. DOI: 10.31202/ecjse.571030
MLA Guvenoglu Erdal,Razbonyalı Can The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. El-Cezerî Journal of Science and Engineering, vol.6, no.3, 2019, ss.668 - 680. DOI: 10.31202/ecjse.571030
AMA Guvenoglu E,Razbonyalı C The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. El-Cezerî Journal of Science and Engineering. 2019; 6(3): 668 - 680. DOI: 10.31202/ecjse.571030
Vancouver Guvenoglu E,Razbonyalı C The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. El-Cezerî Journal of Science and Engineering. 2019; 6(3): 668 - 680. DOI: 10.31202/ecjse.571030
IEEE Guvenoglu E,Razbonyalı C "The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm." El-Cezerî Journal of Science and Engineering, 6, ss.668 - 680, 2019. DOI: 10.31202/ecjse.571030
ISNAD Guvenoglu, Erdal - Razbonyalı, Can. "The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm". El-Cezerî Journal of Science and Engineering 6/3 (2019), 668-680. https://doi.org/DOI: 10.31202/ecjse.571030