Steganografi Tabanlı Yeni Bir Klasör Kilitleme Yaklaşımı ve Yazılımı Geliştirilmesi

Mehmet Ali ATICI, ŞEREF SAĞIROĞLU
1.513 520

Öz


Bu makalede steganografi tabanlı yeni bir kişisel güvenlik yaklaşımı sunulmuş ve pratik olarak kullanımı için ise bir klasör kilitleme yazılımı (STKK) geliştirilmiştir. Sunulan yaklaşım kullanıcılara, bilgisayardaki tüm dosyaların güvenliği için esnek çözümler sunar. Steganografik çözümlerin yanı sıra kriptografik yaklaşımlar da geliştirilen yazılıma eklenmiştir. AES, DES ve 3DES gibi bilinen kriptografik algoritmalar da yüksek seviyede bilgi güvenliğini sağlamak için yazılıma dahil edilmiştir. Deneysel sonuçlar geliştirilen çözümün steganalize karşı dayanıklı olduğunu ve tüm dosya tiplerini desteklediği için kişisel güvenliğin yüksek seviyede sağlanmasına katkı sağlayacağını göstermektedir.


Tam metin:

PDF


DOI: http://dx.doi.org/10.17341/gummfd.76406

Referanslar


Adli, A. ve Nakao, Z., “Three steganography algorithms for MIDI files”, Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, China, 2401-2404, 18-21 Ağustos 2005.

Akleylek, S. ve Nuriyev, U., “Steganography and new implementation of steganography”, Signal Processing and Communications Applications Conference, Kayseri, TURKEY, 64-67, 16-18 Mayıs 2005.

Amin, M.M., Salleh, M., Ibrahim, S., Katmin, M.R. ve Shamsuddin, M.Z.I., “Information hiding using steganography”, 4th National Conference on Telecommunication Technology, Shah Alam, MALAYSIA, 21-25, 14-15 Ocak 2003.

Bender, W., Gruhl, D., Morimoto, N. ve Lu, A., “Techniques for data hiding”, IBM Syst. J., Cilt 35, No 3&4, 313-336, 1996.

Brisbane, G., Safavi-Naini, R. ve Ogunbona, P., “High-capacity steganography using a shared colour palette”, IEE Proc.-Vis. Image Signal Process., Cilt 152, No 6, 787-792, 2005.

Sağıroğlu, Ş. ve Alkan, M., “Her Yönüyle Elektronik İmza (e-İmza)”,Grafiker, Ankara, 2005.

Chou, J., Ramchandran, K. ve Ortega, A., “High capacity audio data hiding for noisy channels”, International Conference on Information Technology: Coding and Computing, Las Vegas, NV, 108-112, 2-4 Nisan 2001.

Cvejic, N. ve Seppanen, T., “Increasing the capacity of LSB-based audio steganography”, IEEE Workshop on Multimedia Signal Processing, St. Thomas, Virgin Islands, USA, 336-338, 9-11 Aralık 2002.

Gopalan, K., “Audio steganograph using bit modification” , International Conference on Multimedia and Expo, Baltimore, Maryland, 629-632, 6-9 Temmuz 2003.

İnternet: http://embeddedsw.net/OpenPuff_Steganography_Home.html, Son Erişim Tarihi: 03.12.2014.

Johnson, N.F. ve Jajodia, S., “Exploring steganography: Seeing the unseen”, Computer, Cilt 31, No 2, 26-34, 1998.

İnternet: http://www.petitcolas.net/steganography/mp3stego/, Son Erişim Tarihi: 03.12.2014.

Lee, Y.K. ve Chen, L.H., “High capacity image steganographic model”, Vision, Image and Signal Processing, IEE Proceedings-, Cilt 147, No 3, 288-294, 2000.

Niimi, M., Noda, H., Kawaguchi, E. ve Eason, R.O., “High capacity and secure digital steganography to palette-based images”, International Conference on Image Processing, Rochester, New York, USA, II-917-II-920, 22-25 Eylül 2002.

Noda, H., Spaulding, J., Shirazi, M.N. ve Kawaguchi, E., “Application of bit-plane decomposition steganography to JPEG2000 encoded images” IEEE Signal Processing Letters, Cilt 9, No 12, 410-413, 2002.

Sağıroğlu, Ş. ve Tunckanat, M., “A Secure Internet Communication Tool”, Turkish Journal of Telecommunications, Cilt 1, No 1, 40-46, 2002.

Yan, D., Wang, R., Yu, X. ve Zhu, J., “Steganography for MP3 audio by exploiting the rule of window switching” Computers & Security, Cilt 31, No 5, 704-716, 2012.

Sui, X.G. ve Luo, H., “A new steganography method based on hypertext” Asia-Pacific Radio Science Conference, Qingdao, China, 181-184, 24-27 Ağustos 2004.

Swanson, M.D., Zhu, B. ve Tewfik, A.H., “Robust Data Hiding For Images”, Digital Signal Processing Workshop, Loen Norway, 37-40, 1-4 Eylül 1996.

Tseng, H.W. ve Chang, C.C., “Steganography using JPEG-compressed images” International Conference on Computer and Information Technology, Wuhan, China, 12-17, 14-16 Eylül 2004.

Kessler, G.C., “An Overview of Steganography for the Computer Forensics Examiner”, Forensic Science Communications , Cilt 6, No 3, 1-29, 2004.

İnternet: WAVE PCM soundfile format, https://ccrma.stanford.edu/courses/422/projects/WaveFormat/, Son Erişim Tarihi: 03.12.2014.

İnternet: http://quickcrypto.com/index.htm, Son Erişim Tarihi: 03.12.2014.

Rekik, S., Guerchi, D., Selouani, S. ve Hamam, H., “Speech steganography using wavelet and Fourier transforms” EURASIP Journal on Audio, Speech and Music Processing, Cilt 2012, No 1, 1-14, 2012.

İnternet: https://www.steganos.com/us/products/data-security/privacy-suite/features/, Son Erişim Tarihi: 03.12.2014.

Habib, S., Parveen, A. ve Sarwar, S., “Secure Communication of Secret Data Using Steganography”, International Journal of Computer Science and Mobile Computing, Cilt 2, No 5, 249-254, 2013.

Yavanoglu, U., Ozcakmak, B. ve Milletsever, O., “A New Intelligent Steganalysis Method for Waveform Audio Files”, International Conference on Machine Learning and Applications, Boca Raton, FL, 233-239, 12-15 Aralık 2012.

Adhiya, K. P. ve Patil, S. A., “Hiding Text in Audio Using LSB Based Steganography”, Information & Knowledge Management, Cilt 2, No 3, 8-14, 2012.

Meghanathan, N. ve Nayak, L., “ Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media”, International Journal of Network Security & Its Application (IJNSA), Cilt 2, No 1, 43-55, 2010.

Taruna ve Jain, R., “Message Guided Adaptive Random Audio Steganography Using LSB Modification”, International Journal of Computer Applications, Cilt 86, No 7, 6-9, 2014.

Arslan, Y. ve Yalman, Y., “Visual Steganalysis of LSB-encoded Audio Data Based on Frequency Domain Characteristics”, International Conference on Security of Information and Networks, Aksaray, Turkey, 359-362, 26-28 Kasım 2013.

Ozer, H., Sankur, B., Memon, N. ve Avcıbaş, İ., “Detection Of Audio Covert Channels Using Statistical Footprints Of Hidden Messages.”, Digital Signal Processing, Cilt 16, No 4, 389-401, 2006.

Ru, X., Zhuang, Y. Ve Wu, F., “Audio Steganalysis Based On ‘Negative Resonance Phenomenon’ Caused By Steganographic Tools.”, Journal of Zhejiang University Science A, Cilt 7, No 4, 577-583, 2006.

İnternet: http://steghide.sourceforge.net/, Son Erişim Tarihi: 03.12.2014.

Avcıbaş, İ., “Audio Steganalysis With Content Independent Distortion Measures”, IEEE Signal Processing Letters, Cilt 13, No 2, 92-95, 2006.

İnternet: http://www.invisiblesecrets.com/steganography-software.html, Son Erişim Tarihi: 03.12.2014.

İnternet: https://www.steganos.com/us/products/data-security/safe/features/, Son Erişim Tarihi: 03.12.2014.

İnternet: http://quickcrypto.com/steganography-software.html, Son Erişim Tarihi: 03.12.2014.

İnternet: http://www.gilisoft.com/product-file-lock-pro.htm, Son Erişim Tarihi: 03.12.2014.

İnternet: http://www.winability.com/folderguard/, Son Erişim Tarihi: 03.12.2014.

Hussain, I., " A novel approach of audio watermarking based on S -box transformation", Mathematical and Computer Modelling, Cilt 57, No 3-4, 963-969, 2013.

Djebbar, F., Ayad, B., Meraim, K.A. ve Hamam, H., "Comparative study of digital audio steganography techniques", EURASIP Journal on Audio, Speech, and Music Processing, Cilt 2012, No 1, 1-16, 2012.

Khan, S., Said, U., Ahmad, E., Ali, F. ve Ali, M., " The Effect of Various Number of Least Significant Bits substitution in Audio using Discrete Cosine Transform", IJCSI International Journal of Computer Science, Cilt 10, No 4, 298-302, 2013.

Karthigaikumar, P., Kirubavathy, K.J. ve Baskaran, K., " FPGA based audio watermarking—Covert communication", Microelectronics Journal, Cilt 42, No 5, 778-784, 2011.




Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.