Research Article
BibTex RIS Cite

Video Formatına Veri Gizleme Amacıyla Gömülmüş Bir Steganografi Uygulamasının Geliştirilmesi

Year 2011, Volume: 14 Issue: 2, 1 - 10, 05.08.2011

Abstract

Gelişen teknoloji ile birlikte veri güvenliğinde yeni problemlerle karşılaşılmakta ve veri güvenliğini artırmak amacıyla, bu problemleri çözmeye yönelik girişimler yapılmaktadır.Yapılan araştırmalarda, veri güvenliğine yönelik problemler, matematiksel veya mantıksal önermelere dayanan veri şifreleme algoritmaları ile çözülmekte veya bir verinin farklı verilerin içerine mantıksal önermelere göre yerleştirilmesine dayanan steganografi algoritmaları geliştirilerek çözülmeye çalışılmaktadır. Bu çalışmalar sayesinde önemli veriler güvenlik altına alınabilmektedir. Steganografi tekniğine göre geliştirilen çoğu uygulamalar metin, ses ve resim üzerinde yoğunlaştığı görülmektedir. Bu çalışmada, gizlenmek istenen veri ilk olarak metin editöründen ASCII karakter formatında girilen ve gizlenmek istenen veri, ikili formata dönüştürülmektedir. İkinci aşamada, AVI formatındaki örtü videosunun kapasitesi oranında her frame’deki ilgili piksellerinin en önemsiz biti (LSB) kullanılarak, ikili formatındaki verinin ilgili bitiyle yerinin değiştirilmesi esasına dayanan bir steganografi uygulaması geliştirilmiştir

References

  • Bender W, Gruhl D, Morimoto N, Lu.A “ Techniques for data hiding”. IBM Systems Journal, 35(3-4):313- 36,1996.
  • Petitcolas F.A.P., Anderson R.J., Kuhn M.G., “Information Hiding–A Survey”, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 87(7):1062-1078, July 1999.
  • Westfeld A., Pfitzmann A., “Attacks on Steganographic Systems”, Information Hiding. Third International Workshop, IH'99, Dresden, Germany, September/October, 1999, Proceedings, LNCS 1768, Springer-Verlag Berlin Heidelberg, 2000.
  • J.Fridrich, and M.Goljan, “Practical steganalysis: state-of-the-art,” Proceeding of SPIE Photonics West, Electronic Imaging 2002, San Jose, California, vol.4675, pp.1-13, January 2002.
  • Kakumanu P, Makrogiannis S, Bourbakis N. “A survey of skin-color modeling and detection methods”. Pattern Recognition: pp: 1106–22, 2007.
  • Ozdemir C, Ozcerit A.T. “A new steganography algorithm based on color histograms for data embedding into raw video streams”, Computers & Security Vol(28), 670-682, 2009.
  • Artz, D.; , "Digital steganography: hiding data within data," Internet Computing, IEEE , vol.5, no.3, pp.75- 80, May/Jun 2001
  • Noda, H.; Furuta, T.; Niimi, M.; Kawaguchi, E.; , "Application of BPCS steganography to wavelet compressed video," Image Processing, 2004. ICIP '04. 2004 International Conference on , vol.4, no., pp. 2147- 2150 Vol. 4, 24-27 Oct. 2004
  • Hanafy, A.A.; Salama, G.I.; Mohasseb, Y.Z.; "A secure covert communication model based on video steganography," Conference, 2008. MILCOM 2008. IEEE , vol., no., pp.1-6, 16-19 Nov. 2008
  • Mozo, A.J.; Obien, M.E.; Rigor, C.J.; Rayel, D.F.; Chua, K.; Tangonan, G.; , "Video steganography using Flash Video (FLV)," Instrumentation and Measurement Technology Conference, 2009. I2MTC '09. IEEE , vol., no., pp.822-827, 5-7 May 2009
  • Eltahir, M.E.; Kiah, L.M.; Zaidan, B.B.; Zaidan, A.A.; , "High Rate Video Streaming Steganography," Information Management and Engineering, 2009. ICIME '09. International Conference on , vol., no., pp.550-553, 3-5 April 2009
  • Changyong Xu; Xijian Ping; Tao Zhang; , "Steganography in Compressed Video Stream," Innovative Computing, Information and Control, 2006. ICICIC '06. First International Conference on , vol.1, no., pp.269-272, Aug. 30 2006-Sept. 1 2006
  • Oğuz C. “Görüntü İşaretleri İçin Yeni Bir Sayısal Damgalama Yöntemi” Doktora Tezi, İstanbul Üniversitesi, pp 15-16, 2006

Developing of a Steganography Application for Data Hiding Embedded in Video Format

Year 2011, Volume: 14 Issue: 2, 1 - 10, 05.08.2011

Abstract

A variety of new problems are encountered as the result of developing technology for data security. In order to ensure security of data, new improvements are made to solve these problems. According to the researchers in the literature, data security problems are solved by mathematical or logical propositions, based on the data encryption algorithms or by improving stenographical algorithms, which functions as placing the data into different data according to logical propositions. Many important data can be retrieved by the studies on data security processes. Most applications developed according to Steganography technique have been concentrated on the text, sound and image. In this study, firstly, ASCII formatted and data to be hided is entered from text editor and then converted to binary format. In the second step, a stenography application is developed that depends on the changing the placement of the least significant bit (LSB) in each frame’ in proportion of the cover video capacity in AVI format while converting the data to hide which is put in ASCII character format in text editor. 

References

  • Bender W, Gruhl D, Morimoto N, Lu.A “ Techniques for data hiding”. IBM Systems Journal, 35(3-4):313- 36,1996.
  • Petitcolas F.A.P., Anderson R.J., Kuhn M.G., “Information Hiding–A Survey”, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 87(7):1062-1078, July 1999.
  • Westfeld A., Pfitzmann A., “Attacks on Steganographic Systems”, Information Hiding. Third International Workshop, IH'99, Dresden, Germany, September/October, 1999, Proceedings, LNCS 1768, Springer-Verlag Berlin Heidelberg, 2000.
  • J.Fridrich, and M.Goljan, “Practical steganalysis: state-of-the-art,” Proceeding of SPIE Photonics West, Electronic Imaging 2002, San Jose, California, vol.4675, pp.1-13, January 2002.
  • Kakumanu P, Makrogiannis S, Bourbakis N. “A survey of skin-color modeling and detection methods”. Pattern Recognition: pp: 1106–22, 2007.
  • Ozdemir C, Ozcerit A.T. “A new steganography algorithm based on color histograms for data embedding into raw video streams”, Computers & Security Vol(28), 670-682, 2009.
  • Artz, D.; , "Digital steganography: hiding data within data," Internet Computing, IEEE , vol.5, no.3, pp.75- 80, May/Jun 2001
  • Noda, H.; Furuta, T.; Niimi, M.; Kawaguchi, E.; , "Application of BPCS steganography to wavelet compressed video," Image Processing, 2004. ICIP '04. 2004 International Conference on , vol.4, no., pp. 2147- 2150 Vol. 4, 24-27 Oct. 2004
  • Hanafy, A.A.; Salama, G.I.; Mohasseb, Y.Z.; "A secure covert communication model based on video steganography," Conference, 2008. MILCOM 2008. IEEE , vol., no., pp.1-6, 16-19 Nov. 2008
  • Mozo, A.J.; Obien, M.E.; Rigor, C.J.; Rayel, D.F.; Chua, K.; Tangonan, G.; , "Video steganography using Flash Video (FLV)," Instrumentation and Measurement Technology Conference, 2009. I2MTC '09. IEEE , vol., no., pp.822-827, 5-7 May 2009
  • Eltahir, M.E.; Kiah, L.M.; Zaidan, B.B.; Zaidan, A.A.; , "High Rate Video Streaming Steganography," Information Management and Engineering, 2009. ICIME '09. International Conference on , vol., no., pp.550-553, 3-5 April 2009
  • Changyong Xu; Xijian Ping; Tao Zhang; , "Steganography in Compressed Video Stream," Innovative Computing, Information and Control, 2006. ICICIC '06. First International Conference on , vol.1, no., pp.269-272, Aug. 30 2006-Sept. 1 2006
  • Oğuz C. “Görüntü İşaretleri İçin Yeni Bir Sayısal Damgalama Yöntemi” Doktora Tezi, İstanbul Üniversitesi, pp 15-16, 2006
There are 13 citations in total.

Details

Primary Language Turkish
Subjects Material Production Technologies
Journal Section Research Articles
Authors

Hasan Badem

Mahit Güneş

Publication Date August 5, 2011
Submission Date June 21, 2011
Published in Issue Year 2011Volume: 14 Issue: 2

Cite

APA Badem, H., & Güneş, M. (2011). Video Formatına Veri Gizleme Amacıyla Gömülmüş Bir Steganografi Uygulamasının Geliştirilmesi. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 14(2), 1-10.