PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Optimal steganographic method based on image encryption

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Optymalna metoda steganograficzna oparta na szyfrowaniu obrazu
Języki publikacji
EN
Abstrakty
EN
The paper investigates an image encryption method for the implementation of steganographic information protection. This paper aims to increase the volume of a secret message with fixed sized image. The proposed system represents an image in the form of a binary code. Each pixel code consists of 24 bits, which encode blue, green and red colors. The resulting image code is encrypted using a key set of encrypt codes generated by a pseudo-random number generator. The generation is based on cellular automata with active cells. As a result, the best bits in the color bytes of each pixel have been identified. The method provides a high degree of encryption due to the fact that, in addition to encrypting the selected bits of the pixel codes, the codes are changed due to the introduction of the bits of the secret message. The bits of the secret message have a random order since the secret message is determined by its internal content. Each new message is different from other messages and is additionally encrypted. This makes it possible to use several encrypt keys in conceal a message in an image.
PL
W artykule omówiono metodę szyfrowania obrazu w celu realizacji steganograficznej ochrony informacji. Ten artykuł ma na celu zwiększenie objętości tajnej wiadomości z obrazem o stałym rozmiarze. Proponowany system przedstawia obraz w postaci kodu binarnego. Każdy kod piksela składa się z 24 bitów, które kodują kolory niebieski, zielony i czerwony. Wynikowy kod obrazu jest szyfrowany przy użyciu zestawu kluczy szyfrujących kodów generowanych przez generator liczb pseudolosowych. Generacja oparta jest na automatach komórkowych z aktywnymi komórkami. W rezultacie zidentyfikowano najlepsze bity w bajtach koloru każdego piksela. Metoda zapewnia wysoki stopień szyfrowania dzięki temu, że oprócz szyfrowania wybranych bitów kodów pikselowych, kody ulegają zmianie w wyniku wprowadzenia bitów tajnej wiadomości.
Rocznik
Strony
10--14
Opis fizyczny
Bibliogr. 29 poz., rys.
Twórcy
  • Tafila Technical University, Tafila 66110, Jordan
  • Tafila Technical University, Tafila 66110, Jordan
Bibliografia
  • [1] Liu, Y., Wang, J., Fan, J. H. & Gong, L. H. Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences. Multimed. Tools Appl. 75, 4363– 4382 (2016).
  • [2] Nadzeya SHUTKO, Pavel URBANOVICH, Pawel ZUKOWSKA, "method of syntactic text steganography based on modification of the document-container aprosh",Przegląd Elektrotechniczny ,V(94),num(06),2018 14 PRZEGLĄD ELEKTROTECHNICZNY, ISSN 0033-2097, R. 97 NR 6/2021
  • [3] Ewa ŚWIERCZ, "Image encryption algorithms based on wavelet decomposition and encryption of compressed data in wavelet domain", Przegląd Elektrotechniczny ,V(94),num(02),2018.
  • [4] Manish Kumar, Rachid Ait Maalem Lahcen, R. N. Mohapatra, Chandan Alwala, and Surya Vamsi Krishna Kurella. Review of Image Encryption Techniques. - Journal of Computer Engineering.- Volume 22, Issue 1, Ser. I (Jan - Feb 2020), PP 31-37
  • [5] Lazaros Moysis, Aleksandra Tutueva, Christos Volos and Denis Butusov. A Chaos Based Pseudo-Random Bit Generator Using Multiple Digits Comparison.- CHAOS Theory and Applications. (2020). – V.2, N2, P. 58-68
  • [6] Juan M. Vilardy, Jorge E. Calderon, Cesar O. Torres, Lorenzo. Mattos, “Digital Images Phase Encryption using Fractional Fourier Transform”, CERMA conference, Pages: 15– 18, 2006.
  • [7] H Yoshimura, R Iwai,” New encryption method of 2D image by use of the fractional Fourier transform”, IEEE Conference on Signal Processing, Pages: 2182 – 2184, 2008
  • [8] Nadya SHUTKO,"The use of aprosh and kerning in text steganography",Przegląd-Elektrotechniczn, V(92), num(10), 2016.
  • [9] Xianye, Xiangfeng, Xiulun, Yurong, Yongkai Yin, Xiang Peng, Wenqi, Guoyan, Hongyi, “Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme”, Volume 102, Pages 106–111, March 2018.
  • [10] Xing-Yuan, Sheng-Xian, Ying-Qian, “Novel image encryption algorithm based on cycle shift and chaotic system”, Optics and Lasers in Engineering Volume 68, Pages 126–134, 2015.
  • [11] Chong Fu, Zhou-Feng Chen, Wei Zhao, Hui-yan Jiang, “A New Fast Color Image Encryption Scheme Using Chen Chaotic System”, 18th IEEE conference, Pages: 121–126, 2017.
  • [12] Wenting Yuan, Xueiln Yang, Wei Guo, Weisheng Hu, “A double domain image encryption using hyperchaos”, 19th ICTON conference, Pages: 1–4, 2017.
  • [13] Huang, X.; Ye, G. An efficient self-adaptive model for chaotic image encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 4094–4104.
  • [14] Liu, H.; Wang, X. Color image encryption using spatial bitlevel permutation and high-dimension chaotic system. Opt. Commun. 2011, 284, 3895–3903.
  • [15] Mao, Y.; Chen, G.; Lian, S. A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurcation Chaos 2004, 14, 3613–3624.
  • [16] Wu, Y. Image encryption using the two-dimensional logistic chaotic map. J.Electron. Imag. 2012, 21, 013014.
  • [17] Chen, G.; Mao, Y.; Chui, C.K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 2004, 21, 749–761.
  • [18] Lian, S.; Sun, J.; Wang, Z. A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 2005, 26, 117–129.
  • [19] Ping, P.; Xu, F.; Mao, Y.; Wang, Z. Designing permutation substitution image encryption networks with Henon map. Neurocomputing 2018, 283, 53–63.
  • [20] Liu, H.; Wang, X.; Kadir, A. Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 2012, 12, 1457–1466.
  • [21] K.R.Radhika, M.K.Nalini, “ Biometric Image Encryption using DNA sequences and Chaotic Systems”, ICRAECT conference, Pages: 164–168, 2017.
  • [22] Govinda.K, Prasanna.S, “A Generic Image Cryptography Based on Rubik’s Cube”, ICSNS conference, Pages: 1–4, 2015.
  • [23] Shahryar Toughi, Mohammad H. Fathi, Yoones A. Sekhavat, “ An image encryption scheme based on elliptic curve pseudorandom and Advanced Encryption System”, Volume 141, December 2017, Pages 217–227.
  • [24] Chai, X.; Zheng, X.; Gan, Z.; Han, D.; Chen, Y. An image encryption algorithm based on chaotic system and compressive sensing. Signal Process. 2018, 148, 124–144
  • [25] S H Kamali, R Shakerian, M Hedayati, M Rahmani, “A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption”, ICEIE Conference, Year: 2010, Volume:1 Pages: 141–145.
  • [26] Stepan Bilan. Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generators: Emerging Research and Opportunities.- (2017).- IGI Global, USA.- P. 301.
  • [27] Bilan S., Bilan M., Motornyuk R., Bilan A., Bilan S. (2018) Designing of the Pseudorandom Number Generators on the Basis of Two-Dimensional Cellular Automata. In: Ntalianis K., Croitoru A. (eds) Applied Physics, System Science and Computers. APSAC 2017. Lecture Notes in Electrical Engineering, vol 428. Springer
  • [28] Stepan Bilan, Mykola Bilan, Sergii Bilan. Research of the method of pseudo-random number generation based on asynchronous cellular automata with several active cells.- MATEC Web of Conferences, - Vol. 125,- 02018 (2017), - P. 1- 6.
  • [29] Stepan Bilan, Mykola Bilan, Sergii Bilan. Research of the Influence of the local Transition Function on the Formation of a New Active Cell in the PRNG Based on ACA.- WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS. - Volume 14, 2017. – pp. 167-173.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-59628104-5ee2-4b13-bb5d-390818c7266f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.