Research Article
BibTex RIS Cite

Tek Kullanımlık Şerit Şifreleme Yöntemi için Geliştirilmiş Anahtar Üretimi ve Değişimi ile Yüksek Güvenli Hibrit Görüntü Steganografisi

Year 2023, Volume: 23 Issue: 1, 101 - 114, 01.03.2023
https://doi.org/10.35414/akufemubid.1128075

Abstract

Steganografi, tarih boyunca bilgileri gizlemek için kullanılan bir çalışma konusudur. Kriptoloji biliminde gizlenecek bilgiler şifrelenir. Her iki çalışma konusu da bilgi güvenliği ve korunmasında yaygın olarak kullanılmaktadır. Çalışmamızda steganografinin uygulama alanlarından biri olan dijital görüntü steganografisi geliştirilmiş ve seçilen görüntülerde metin gizlemek için uygulanmıştır. Bunu yaparken öncelikle elde edilen görüntülerin ayrık haar dalgacık dönüşümü kullanılarak verileri gizleyecek düşük bantlar elde edilir. Gizlenecek metin tek kullanımlık şerit algoritması ile şifrelenir. Şifreleme için kullanılan anahtar, Yüksek Güvenlikli Bilgi Değişim Algoritmasına (HSIEA) dayalı bir iletim katmanı kullanılarak alıcıya iletilir. Şifreleme için kullanılan anahtar, Yüksek Güvenlikli Bilgi Değişim Algoritmasına dayalı bir iletim katmanı kullanılarak alıcıya iletilir. Algoritmalar hem verici hem de alıcı tarafından sağlanan rastgele oluşturulmuş bir anahtar havuzu kullanır. Her mesaj için rastgele bir anahtar başlangıç noktası oluşturularak havuzdan rastgele bir anahtar seçilir. Havuz boyutu ve rastgelelik, tek seferlik bir tuş takımı için bir gereklilik olan tuş tekrarı olmamasını garanti etmede kritik faktörlerdir. Şifreli metin ve anahtar başlangıç noktası göstergesi, en az anlamlı bit yöntemi kullanılarak resimlerin alt bantlarında gizlenmiştir. Ön-stego görüntülere optimal piksel ayarlama işlemi uygulanmış, bu da sonuçlarda iyileşme sağlamıştır. Bu çalışmada elde edilen sonuçlar, optimum öncesi piksel ayarlama işlemi sonuçları ve akran çalışmaları yoluyla elde edilen sonuçlarla karşılaştırılmıştır. Test sonuçları, önerilen yöntemin, tepe sinyal-gürültü oranı, yapısal benzerlik indeksi metriği, ortalama mutlak hata, ortalama sonuç hatası ve şifreleme anahtarı güvenliği açısından tüm yöntemlerden daha iyi performans gösterdiğini göstermektedir.

Supporting Institution

yok

Project Number

yok

Thanks

yok

References

  • Al-Ashwal, A.Y., Al-Mawgani, A.H.M. and Al-Arashi, W.H., 2015. An Image Steganography Algorithm for Hiding Data Based on HDWT, LZW and OPAP. Journal of Science & Technology, 20(1), 10-22.
  • Amirtharajan, R., Adharsh, D., Vignesh, V. and Balaguru, R.J.B., 2010. PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography. International Journal of Computer Applications, 7(9), 31-37.
  • Arica, N. and Kurtuldu, Ö., 2009. Image steganography by wavelet matching. Journal of Electroning Imaging, 18(3), 033013-1 - 033013-9.
  • Bendjillali, R.I., Moh, B., Khaled, M. and Abdelmalik, T.A., 2019. Improved Facial Expression Recognition Based on DWT Feature for Deep CNN. Electronics, 8(3), 1-16.
  • Benedict, A.G., 2019. Improved File Security System Using Multiple Image Steganography. International Conference on Data Science and Communication (IconDSC), 01-02 March, 2019, 1-5, Bangalore-India.
  • Boakye-Boateng, K. and Lashkari, A.H., 2019. Securing GOOSE: The Return of One-Time Pads. International Carnahan Conference on Security Technology (ICCST), 01-03 October, 2019, 1-8, Chennai-India.
  • Boakye-Boateng, K., Kuada, E., Antwi-Boasiako, E. and Djaba, E., 2019. Encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads. in IEEE Internet of Things Journal, 6(2), 3925-3933.
  • Darbani, A., AlyanNezhadi, M.M. and Forghani, M., 2019. A New Steganography Method for Embedding Message in JPEG Images. 5th Conference on Knowledge-Based Engineering and Innovation (KBEI), 28 February - 01 March, 2019, 617-621, Tehran-Iran.
  • Deng, J., Tang, M., Wang, Y. and Wang, Z., 2019. LSB Color Image Embedding Steganography Based on Cyclic Chaos. IEEE 5th International Conference on Computer and Communications (ICCC), 06-09 December, 2019, 1798-1802, Chengdu-China.
  • Emad, E., Safey, A., Refaat, A., Osama, Z., Sayed, E. and Mohamed, E., 2017. A secure image steganography algorithm based on least significant bit and integer wavelet transform. in Journal of Systems Engineering and Electronics, 29(3), 639-649.
  • Gebremichael, T., Jennehag, U. and Gidlund, M., 2019. Lightweight IoT Group Key Establishment Scheme from the One Time Pad. 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 04-09 April, 2019, 101-106, Newark-USA.
  • Giridhar, M. and Mandal, S., 2019. Secure and Robust Image Steganography Using a Reference Image as Key. International Journal of Innovative Technology and Exploring Engineering, 8(7), 2828-2839.
  • Hassaballah, M., Hameed, M.A., Awad, A.I. and Muhammad, K., 2021. A Novel Image Steganography Method for Industrial Internet of Things Security. IEEE Transactions on Industrial Informatics, 17(11), 7743-7751.
  • Huang, C.W., Chou, C., Chiu, Y.C. and Chang, C.Y., 2018. Embedded FPGA Design for Optimal Pixel Adjustment Process of Image Steganography. Mathematical Problems in Engineering, 2018, 1-8.
  • Jasril, J., Marzuki, I. and Rahmat, F., 2012. Modification four bits of uncompressed steganography using least significant bit (LSB) method. International Conference on Advanced Computer Science and Information Systems (ICACSIS), 01-02 December, 2012, 287-292, Depok-Indonesia.
  • Kapila, B. and Thind, T., 2021. Review and analysis of data security using image steganography. 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM), 19-21 January, 2021, 227-231, Dubai-United Arab Emirates.
  • Kim, J.T., Kim, S. and Kim,K., 2019. A Study on Improved JPEG Steganography Algorithm to Prevent Steganalysis. International Conference on Information and Communication Technology Convergence (ICTC), 16-18 October, 2019, 960-963, Jeju-Korea.
  • Kumar, D. 2019. Hiding Text in Color Image Using YCbCr Color Model: An Image Steganography approach. International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 27-28 September, 2019, 1-5, Ghaziabad-India.
  • Li, G., Zhang, Z., Zhang, J. and Hu, A., 2021. Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation. IEEE Internet of Things Journal, 8(1), 357-369.
  • Maji, G., Mandal, S., Debnanth, N.C. and Sen, S., 2019. Pixel Value Difference Based Image Steganography with One Time Pad Encryption. IEEE 17th International Conference on Industrial Informatics (INDIN), 22-25 July, 2019, 1358-1363, Helsinki-Finland.
  • Mandal, B., Pradhan, A. and Swain, G., 2019. Adaptive LSB substitution Steganography technique based on PVD. 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 23-25 April, 2019, 459-464, Tirunelveli-India.
  • Manohar, N. and Kumar, P.V., 2020. Data Encryption & Decryption Using Steganography. 4th International Conference on Intelligent Computing and Control Systems (ICICCS), 13-15 May, 2020, 697-702, Madurai-India.
  • Menon, N. and Vaithiyanathan, V., 2018. Triple Layer Data Hiding Mechanism using Cryptography and Steganography. 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 18-19 May, 2018, 407-410, Bangalore-India.
  • Mshir, S. and Varol, A., 2019. A New Model for Creating Layer Planes Using Steganography for Text Hiding. 7th International Symposium on Digital Forensics and Security (ISDFS), 10-12 June, 2019, 1-5, Barcelos-Portugal.
  • Nithya, R., Nehru, C. and Balasubramaniam, T., 2014. Optimal Pixel Adjustment Based Reversible Steganography. International Journal of Innovative Technology and Research, 2(3), 963-966.
  • Omar, B., Loai, T., Moad, M. and Mohammed, B., 2013. A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm. International Journal of Information Security and Privacy, 7, 1-15.
  • Pandey, J., Joshi, K., Jangra, M. and Sain, M., 2019. Pixel Indicator Steganography Technique with Enhanced Capacity for RGB Images. International Conference on Intelligent Computing and Control Systems (ICCS), 15-17 May, 2019, 738-743, Madurai-India.
  • Ravichandran, D., Nimmatoori, R. and Ahamad, M.G., 2016. Mathematical Representations of 1D, 2D and 3D Wavelet Transform for Image Coding. International Journal on Advanced Computer Theory and Engineering, 5(3), 20-27.
  • Saad, A.H.S., Mohamed, M.S. and Hafez, E.H., 2021. Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning. IEEE Access, 9, 16522-16531.
  • Sakk, E. and Wang, S.P., 2021. Code Structures for Quantum Encryption and Decryption. IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), 8-10 January, 2021, 7-11, Zhuhai-China.
  • Setiadi, B.R.I.M., Rachmawanto, E.H. and Sari, C.A., 2017. Secure Image Steganography Algorithm Based on DCT with OTP Encryption. Journal of Applied Intelligent System, 2(1), 1–11.
  • Shukla, R., Prakash, H.O., Bhushan, R.P., Venkataraman, S. and Varadan, G., 2013. Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem. International Conference on Machine Intelligence and Research Advancement, 21-23 December, 2013, 174-178, Katra-India.
  • Sönmez, F., Takaoğlu, F. and Kaynar, O., 2018. Ideal Steganography Scenario: Calculation of Capacities of Carrier Images. OPA Method in Frequency-Based Steganography, ACTA INFOLOGICA, 2(1), 12-21.
  • Takaoğlu, F. and Takaoğlu, M., 2019. Printer Steganography, Yellow Dot Analysis - A Mini Survey. ArtGRID - Journal of Architecture Engineering and Fine Arts, 1, 25-35.
  • Takaoğlu, F. and Takaoğlu, M., 2020a. Today's Validity of Printer Steganography and Yellow Dot Analysis. e-Journal of New Media, 4, 176-184.
  • Takaoğlu, F. and Takaoğlu, M., 2020b. DCT ve DWT Teknikleriyle Görüntü ve Metin Verilerini Gizleme. Istanbul Aydın University Journal, 12, 189-200.
  • Tobin, P., Tobin, L., Blanquer, R.G., McKeever, M. and Blackledge, J., 2017. One-to-cloud one-time pad data encryption: Introducing virtual prototyping with PSpice. 28th Irish Signals and Systems Conference (ISSC), 20-21 June, 2017, 1-6, Killarney-Ireland.
  • Varthakavi, S.S., Mohan, P., Gupta, A. and Anurag, M., 2020. A Steganographic Analysis using Batch Steganography. IEEE International Conference for Innovation in Technology (INOCON), 06-08 November, 2020, 1-5, Bangluru-India.
  • Wahab, O.F.A., Khalaf, A.A.M., Hussein, A.I. and Hamed, H.F.A., 2021. Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques. IEEE Access, 9, 31805-31815.
  • Xie, G., Ren, J., Marshall, S., Zhao, H. and Li, H., 2021. A New Cost Function for Spatial Image Steganography Based on 2D-SSA and WMF. IEEE Access, 9, 30604-30614.

Highly Secured Hybrid Image Steganography with an Improved Key Generation and Exchange for One-Time-Pad Encryption Method

Year 2023, Volume: 23 Issue: 1, 101 - 114, 01.03.2023
https://doi.org/10.35414/akufemubid.1128075

Abstract

Steganography is a subject of study that has been used to hide information throughout history. In cryptology science, the information to be hidden is encrypted. Both study subjects are widely used in information security and protection. In our study, digital image steganography, which is one of the application areas of steganography, was developed and applied to hide text in the selected images. While doing this, the low bands that will hide the data using the discrete Haar wavelet transform of the images obtained first. The text to be hidden is encrypted with the one-time-pad algorithm. The key used for the encryption is transmitted to the receiver using a transmission layer based on a Highly Secured Information Exchange Algorithm. The algorithms use a randomly generated key pool maintained by both the transmitter and the receiver. A key is selected from the pool randomly by generating a random key start point for every message. The pool size and the randomness are critical factors in guaranteeing no key repetition, which is a requirement for a one-time-pad. The ciphertext and the key starting point indicator are hidden in the low bands of the pictures by utilizing the least significant bit method. The optimal pixel adjustment process was applied to the pre-stego-images, this resulted in an improvement in the results. The results obtained in this study are compared against the pre-optimal pixel adjustment process results and the results obtained through peer studies. The test results show that the proposed method outperformed all the methods in terms of peak signal-to-noise ratio, structural similarity index metric, mean absolute error, mean consequential error and the encryption key security.

Project Number

yok

References

  • Al-Ashwal, A.Y., Al-Mawgani, A.H.M. and Al-Arashi, W.H., 2015. An Image Steganography Algorithm for Hiding Data Based on HDWT, LZW and OPAP. Journal of Science & Technology, 20(1), 10-22.
  • Amirtharajan, R., Adharsh, D., Vignesh, V. and Balaguru, R.J.B., 2010. PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography. International Journal of Computer Applications, 7(9), 31-37.
  • Arica, N. and Kurtuldu, Ö., 2009. Image steganography by wavelet matching. Journal of Electroning Imaging, 18(3), 033013-1 - 033013-9.
  • Bendjillali, R.I., Moh, B., Khaled, M. and Abdelmalik, T.A., 2019. Improved Facial Expression Recognition Based on DWT Feature for Deep CNN. Electronics, 8(3), 1-16.
  • Benedict, A.G., 2019. Improved File Security System Using Multiple Image Steganography. International Conference on Data Science and Communication (IconDSC), 01-02 March, 2019, 1-5, Bangalore-India.
  • Boakye-Boateng, K. and Lashkari, A.H., 2019. Securing GOOSE: The Return of One-Time Pads. International Carnahan Conference on Security Technology (ICCST), 01-03 October, 2019, 1-8, Chennai-India.
  • Boakye-Boateng, K., Kuada, E., Antwi-Boasiako, E. and Djaba, E., 2019. Encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads. in IEEE Internet of Things Journal, 6(2), 3925-3933.
  • Darbani, A., AlyanNezhadi, M.M. and Forghani, M., 2019. A New Steganography Method for Embedding Message in JPEG Images. 5th Conference on Knowledge-Based Engineering and Innovation (KBEI), 28 February - 01 March, 2019, 617-621, Tehran-Iran.
  • Deng, J., Tang, M., Wang, Y. and Wang, Z., 2019. LSB Color Image Embedding Steganography Based on Cyclic Chaos. IEEE 5th International Conference on Computer and Communications (ICCC), 06-09 December, 2019, 1798-1802, Chengdu-China.
  • Emad, E., Safey, A., Refaat, A., Osama, Z., Sayed, E. and Mohamed, E., 2017. A secure image steganography algorithm based on least significant bit and integer wavelet transform. in Journal of Systems Engineering and Electronics, 29(3), 639-649.
  • Gebremichael, T., Jennehag, U. and Gidlund, M., 2019. Lightweight IoT Group Key Establishment Scheme from the One Time Pad. 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 04-09 April, 2019, 101-106, Newark-USA.
  • Giridhar, M. and Mandal, S., 2019. Secure and Robust Image Steganography Using a Reference Image as Key. International Journal of Innovative Technology and Exploring Engineering, 8(7), 2828-2839.
  • Hassaballah, M., Hameed, M.A., Awad, A.I. and Muhammad, K., 2021. A Novel Image Steganography Method for Industrial Internet of Things Security. IEEE Transactions on Industrial Informatics, 17(11), 7743-7751.
  • Huang, C.W., Chou, C., Chiu, Y.C. and Chang, C.Y., 2018. Embedded FPGA Design for Optimal Pixel Adjustment Process of Image Steganography. Mathematical Problems in Engineering, 2018, 1-8.
  • Jasril, J., Marzuki, I. and Rahmat, F., 2012. Modification four bits of uncompressed steganography using least significant bit (LSB) method. International Conference on Advanced Computer Science and Information Systems (ICACSIS), 01-02 December, 2012, 287-292, Depok-Indonesia.
  • Kapila, B. and Thind, T., 2021. Review and analysis of data security using image steganography. 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM), 19-21 January, 2021, 227-231, Dubai-United Arab Emirates.
  • Kim, J.T., Kim, S. and Kim,K., 2019. A Study on Improved JPEG Steganography Algorithm to Prevent Steganalysis. International Conference on Information and Communication Technology Convergence (ICTC), 16-18 October, 2019, 960-963, Jeju-Korea.
  • Kumar, D. 2019. Hiding Text in Color Image Using YCbCr Color Model: An Image Steganography approach. International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 27-28 September, 2019, 1-5, Ghaziabad-India.
  • Li, G., Zhang, Z., Zhang, J. and Hu, A., 2021. Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation. IEEE Internet of Things Journal, 8(1), 357-369.
  • Maji, G., Mandal, S., Debnanth, N.C. and Sen, S., 2019. Pixel Value Difference Based Image Steganography with One Time Pad Encryption. IEEE 17th International Conference on Industrial Informatics (INDIN), 22-25 July, 2019, 1358-1363, Helsinki-Finland.
  • Mandal, B., Pradhan, A. and Swain, G., 2019. Adaptive LSB substitution Steganography technique based on PVD. 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 23-25 April, 2019, 459-464, Tirunelveli-India.
  • Manohar, N. and Kumar, P.V., 2020. Data Encryption & Decryption Using Steganography. 4th International Conference on Intelligent Computing and Control Systems (ICICCS), 13-15 May, 2020, 697-702, Madurai-India.
  • Menon, N. and Vaithiyanathan, V., 2018. Triple Layer Data Hiding Mechanism using Cryptography and Steganography. 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 18-19 May, 2018, 407-410, Bangalore-India.
  • Mshir, S. and Varol, A., 2019. A New Model for Creating Layer Planes Using Steganography for Text Hiding. 7th International Symposium on Digital Forensics and Security (ISDFS), 10-12 June, 2019, 1-5, Barcelos-Portugal.
  • Nithya, R., Nehru, C. and Balasubramaniam, T., 2014. Optimal Pixel Adjustment Based Reversible Steganography. International Journal of Innovative Technology and Research, 2(3), 963-966.
  • Omar, B., Loai, T., Moad, M. and Mohammed, B., 2013. A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm. International Journal of Information Security and Privacy, 7, 1-15.
  • Pandey, J., Joshi, K., Jangra, M. and Sain, M., 2019. Pixel Indicator Steganography Technique with Enhanced Capacity for RGB Images. International Conference on Intelligent Computing and Control Systems (ICCS), 15-17 May, 2019, 738-743, Madurai-India.
  • Ravichandran, D., Nimmatoori, R. and Ahamad, M.G., 2016. Mathematical Representations of 1D, 2D and 3D Wavelet Transform for Image Coding. International Journal on Advanced Computer Theory and Engineering, 5(3), 20-27.
  • Saad, A.H.S., Mohamed, M.S. and Hafez, E.H., 2021. Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning. IEEE Access, 9, 16522-16531.
  • Sakk, E. and Wang, S.P., 2021. Code Structures for Quantum Encryption and Decryption. IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), 8-10 January, 2021, 7-11, Zhuhai-China.
  • Setiadi, B.R.I.M., Rachmawanto, E.H. and Sari, C.A., 2017. Secure Image Steganography Algorithm Based on DCT with OTP Encryption. Journal of Applied Intelligent System, 2(1), 1–11.
  • Shukla, R., Prakash, H.O., Bhushan, R.P., Venkataraman, S. and Varadan, G., 2013. Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem. International Conference on Machine Intelligence and Research Advancement, 21-23 December, 2013, 174-178, Katra-India.
  • Sönmez, F., Takaoğlu, F. and Kaynar, O., 2018. Ideal Steganography Scenario: Calculation of Capacities of Carrier Images. OPA Method in Frequency-Based Steganography, ACTA INFOLOGICA, 2(1), 12-21.
  • Takaoğlu, F. and Takaoğlu, M., 2019. Printer Steganography, Yellow Dot Analysis - A Mini Survey. ArtGRID - Journal of Architecture Engineering and Fine Arts, 1, 25-35.
  • Takaoğlu, F. and Takaoğlu, M., 2020a. Today's Validity of Printer Steganography and Yellow Dot Analysis. e-Journal of New Media, 4, 176-184.
  • Takaoğlu, F. and Takaoğlu, M., 2020b. DCT ve DWT Teknikleriyle Görüntü ve Metin Verilerini Gizleme. Istanbul Aydın University Journal, 12, 189-200.
  • Tobin, P., Tobin, L., Blanquer, R.G., McKeever, M. and Blackledge, J., 2017. One-to-cloud one-time pad data encryption: Introducing virtual prototyping with PSpice. 28th Irish Signals and Systems Conference (ISSC), 20-21 June, 2017, 1-6, Killarney-Ireland.
  • Varthakavi, S.S., Mohan, P., Gupta, A. and Anurag, M., 2020. A Steganographic Analysis using Batch Steganography. IEEE International Conference for Innovation in Technology (INOCON), 06-08 November, 2020, 1-5, Bangluru-India.
  • Wahab, O.F.A., Khalaf, A.A.M., Hussein, A.I. and Hamed, H.F.A., 2021. Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques. IEEE Access, 9, 31805-31815.
  • Xie, G., Ren, J., Marshall, S., Zhao, H. and Li, H., 2021. A New Cost Function for Spatial Image Steganography Based on 2D-SSA and WMF. IEEE Access, 9, 30604-30614.
There are 40 citations in total.

Details

Primary Language English
Subjects Software Testing, Verification and Validation
Journal Section Articles
Authors

Mustafa Takaoğlu 0000-0002-1634-2705

Adem Özyavaş 0000-0001-5375-1826

Naim Ajlouni 0000-0002-5116-8933

Faruk Takaoğlu 0000-0003-0828-2017

Project Number yok
Early Pub Date March 1, 2023
Publication Date March 1, 2023
Submission Date June 9, 2022
Published in Issue Year 2023 Volume: 23 Issue: 1

Cite

APA Takaoğlu, M., Özyavaş, A., Ajlouni, N., Takaoğlu, F. (2023). Highly Secured Hybrid Image Steganography with an Improved Key Generation and Exchange for One-Time-Pad Encryption Method. Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi, 23(1), 101-114. https://doi.org/10.35414/akufemubid.1128075
AMA Takaoğlu M, Özyavaş A, Ajlouni N, Takaoğlu F. Highly Secured Hybrid Image Steganography with an Improved Key Generation and Exchange for One-Time-Pad Encryption Method. Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi. March 2023;23(1):101-114. doi:10.35414/akufemubid.1128075
Chicago Takaoğlu, Mustafa, Adem Özyavaş, Naim Ajlouni, and Faruk Takaoğlu. “Highly Secured Hybrid Image Steganography With an Improved Key Generation and Exchange for One-Time-Pad Encryption Method”. Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi 23, no. 1 (March 2023): 101-14. https://doi.org/10.35414/akufemubid.1128075.
EndNote Takaoğlu M, Özyavaş A, Ajlouni N, Takaoğlu F (March 1, 2023) Highly Secured Hybrid Image Steganography with an Improved Key Generation and Exchange for One-Time-Pad Encryption Method. Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi 23 1 101–114.
IEEE M. Takaoğlu, A. Özyavaş, N. Ajlouni, and F. Takaoğlu, “Highly Secured Hybrid Image Steganography with an Improved Key Generation and Exchange for One-Time-Pad Encryption Method”, Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi, vol. 23, no. 1, pp. 101–114, 2023, doi: 10.35414/akufemubid.1128075.
ISNAD Takaoğlu, Mustafa et al. “Highly Secured Hybrid Image Steganography With an Improved Key Generation and Exchange for One-Time-Pad Encryption Method”. Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi 23/1 (March 2023), 101-114. https://doi.org/10.35414/akufemubid.1128075.
JAMA Takaoğlu M, Özyavaş A, Ajlouni N, Takaoğlu F. Highly Secured Hybrid Image Steganography with an Improved Key Generation and Exchange for One-Time-Pad Encryption Method. Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi. 2023;23:101–114.
MLA Takaoğlu, Mustafa et al. “Highly Secured Hybrid Image Steganography With an Improved Key Generation and Exchange for One-Time-Pad Encryption Method”. Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi, vol. 23, no. 1, 2023, pp. 101-14, doi:10.35414/akufemubid.1128075.
Vancouver Takaoğlu M, Özyavaş A, Ajlouni N, Takaoğlu F. Highly Secured Hybrid Image Steganography with an Improved Key Generation and Exchange for One-Time-Pad Encryption Method. Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi. 2023;23(1):101-14.