روشی جدید برای نهان نگاری در تصاویر رنگی با استفاده از تبدیل ستون ترکیبی در تصویرHSV

نویسندگان

1 دانشگاه صنعتی شاهرود

2 zahra.amiri2006@gmail.com

چکیده

نهان‌نگاری به‌صورت گسترده در سامانه‌های امنیت اطلاعات مورد استفاده قرار می‌گیرد. در نهان‌نگاری، هدف پنهان کردن اطلاعات به‌گونه‌ای است که تنها شخص فرستنده و گیرنده از وجود ارتباط و اطلاعات مطلع باشند. نهان‌نگاری در رسانه‌های مختلفی مانند تصویر، صدا و متن صورت می‌گیرد. فرآیند پنهان‌سازی اطلاعات درون تصویر در دو حوزه مکان و تبدیل می‌تواند انجام گیرد. در روش‌های حوزه تبدیل، ابتدا تصویر اصلی توسط تبدیلی مانند تبدیل فرکانسی به فضای دیگری منتقل می‌گردد، سپس اطلاعات در ضرایب این تبدیل جاسازی می‌شوند. در این مقاله، یک روش مبتنی بر حوزه تبدیل برای پنهان کردن متن در تصویر رنگی مدل HSV ارائه شده است. بعد از تبدیل تصویر به مدل HSV، تصویر به قطعه‌هایی تقسیم شده و تبدیل ستون ترکیبی در هر قطعه اجرا می‌شود. سپس پیام مورد نظر در قطعات تبدیل‌یافته ذخیره می‌شود. نتایج ارزیابی‌ها و مقایسه‌های انجام‌شده، ظرفیت بالای ذخیره‌سازی روش پیشنهادی و افزایش امنیت در این روش را نشان می‌دهد.

کلیدواژه‌ها


M. M. AlyanNezhadi and Z. Amiri, “A Novel Method for image hiding text by changing the spaces in text,” presented in the first International Conference on Electrical Engineering and Computer Science, Tehran, Iran, 1394(in Persian).
A. Rana, N. Sharma, and A. Kaur, “Image steganography method based on kohonen neural network,” International Journal of Engineering Research and Applications, Papers, vol. 2, pp. 2234-2236, 2012.
A. Agarwal, “Security enhancement scheme for image steganography using S-DES technique,” International journal of advanced research in computer science and software engineering, vol. 2, 2012.
M. K. Ramaiya, N. Hemrajani, and A. K. Saxena, “Improvisation of Security Aspect in Steganography Applying DES,” In 2013 International Conference on Communication Systems and Network Technologies (CSNT), pp. 431-436, 2013.
A. Nag, S. Ghosh, S. Biswas, D. Sarkar, and P. P. Sarkar, “An image steganography technique using X-box mapping,” In 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), pp. 709-713, 2012.
H. Ge, M. Huang, and Q. Wang, “Steganography and steganalysis based on digital image,” In 2011 4th International Congress on Image and Signal Processing (CISP), pp. 252-255, 2011.
D. H. Kekre, A. B. Patankar, and D. Koshti, “Performance comparison of simple orthogonal transforms and wavelet transforms for image steganography,” International Journal of Computer Applications (0975–8887), vol. 44, 2012.
A. A. Reddy and B. N. Chatterji, “A new wavelet based logo-watermarking scheme,” Pattern Recognition Letters, vol. 26, pp. 1019-1027, 2005.
P. Meerwald and A. Uhl, “Survey of wavelet-domain watermarking algorithms,” In Photonics West 2001-Electronic Imaging, pp. 505-516, 2001.
H. Ahmadi and S. Vali, “A novel Steganography method based on differential pixel value,” Presented in 7’th international conference on information technology and science, urmia, Iran, 1394(in Persian).
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, pp. 727-752, 2010.
M. Esmaili, “An improved steganography algorithm based on SVD to reduce the problem of false-positive detection,” presented in first national conference on Metaheuristic algorithms and applications in science and engineering, Iran, 1393(in Persian).
H. SaboohiAbyez and M. Hosseini, “A complete solution for high-capacity steganography in discrete wavelet domain,” presented in first national conference on computer and electrical engineering in the north of Iran, Bandaranzali, Iran, 1393(in Persian).
M. ZabihiNezhad, H. Naji, and M. Kamandar, “increasing the capacity of steganography in color images using the HSV color space,” presented in first national conference on advances in computer and electrical engineering, Khayam, Iran, 1393(in Persian).
W. M. Abduallah, A. M. S. Rahma, and A.-S. K. Pathan, “Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach,” Computers & Electrical Engineering, vol. 40, pp. 1390-1404, 2014.
B. Boehm, “StegExpose-A Tool for Detecting LSB Steganography,” arXiv preprint arXiv:1410.6656, 2014.
J. Kodovský, J. Fridrich, and V. Holub, “Ensemble Classifiers for Steganalysis of Digital Media,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 432-444, 2012.
A. Q. Khan, A. Akhtar, and M. Z. Ahmad, “Autonomous Farm Vehicles: Prototype of Power Reaper,” arXiv preprint arXiv:1501.02379, 2015.
W. Stallings, “Cryptography and Network Security,” Principles and Practice, Pearson Education, 2002.
A. Hore and D. Ziou, “Image quality metrics: PSNR vs. SSIM,” In Pattern Recognition (ICPR), 2010 20th International Conference on, pp. 2366-2369, 2010.
Q. Liu, [Online]. Available: http://www.shsu.edu/~qxl005/New/Downloads/#image_database, 1 april 2016.
J. Fridrich, M. Goljan, and R. Du, “Reliable detection of LSB steganography in color and grayscale images,” In Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp. 27-30, 2001.
S. Dumitrescu, X. Wu, and Z. Wang, “Detection of LSB steganography via sample pair analysis,” Signal Processing, IEEE Transactions on, vol. 51, pp. 1995-2007, 2003.
A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems,” In Information Hiding, pp. 61-76, 1999.
T. Zhang and X. Ping, “Reliable detection of LSB steganography based on the difference image histogram,” In 2003 IEEE International Conference on Acoustics, Speech and Signal Processing, 2003. Proceedings. (ICASSP'03), vol. 3, pp. III-545-8, 2003.
[26] H. Vojtěch and J. Fridrich, “Digital image steganography using universal distortion,” Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, pp. 59-68, 2013.
T. Pevny, P. Bas, and J. Fridrich, “Steganalysis by Subtractive Pixel Adjacency Matrix,” IEEE Trans. on Info. Forensics and Security, vol. 5, no. 2, pp. 215-224, 2010.