Advertisement

Embedded image coding using laplace transform for Turkish letters

  • Muharrem Tuncay Gencoglu
Article
  • 20 Downloads

Abstract

In this paper, a different cryptographic method is introduced by using a Power series transform. A new algorithm for cryptography is produced. The extended Laplace transform of the exponential function is used to encode an explicit text. The key is generated by applying the modular arithmetic rules to the coefficients obtained in the transformation. Here, ASCII codes used to hide the mathematically generated keys to strengthen the encryption. Text steganography is used to make it difficult to break the password. The made encryption is reinforced by image steganography. To hide the presence of the cipher text, it is embedded in another open text with a stenography method. Later, this text is buried in an image. For decryption, it is seen that the inverse of the Power series transform can be used for decryption easily. Experimental results are obtained by making a simulation of the proposed method. As a result, it is stated that the proposed method can be used in crypto machines.

Keywords

Cryptography Power series transform Data encryption Embedded image 

Notes

References

  1. 1.
    Aydın M, Gökmen G, Kuryel B, Gündüz G (1990) Diferansiyel Denklemler ve Uygulamaları, Barış Yayınları SS 332–349,Google Scholar
  2. 2.
    Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137CrossRefGoogle Scholar
  3. 3.
    Delfs H, Knebl H (2007) Introduction to cryptography principles and applications, SpringerGoogle Scholar
  4. 4.
    Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84:803–809CrossRefGoogle Scholar
  5. 5.
    Gençoğlu MT (2016) Use of integral transform in cryptology. Sci Eng J Fırat Univ 28(2):217–220Google Scholar
  6. 6.
    Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):26–34CrossRefGoogle Scholar
  7. 7.
    Koç ÇK (2009) Cryptographic Engineering, Springer: 125–128Google Scholar
  8. 8.
    Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73:405–414CrossRefGoogle Scholar
  9. 9.
    Martin KM (2012) Everyday cryptography fundamental principles and applications. Oxford University pressGoogle Scholar
  10. 10.
    Paar C, Pelzl J (2010) Understanding cryptography. SpringerGoogle Scholar
  11. 11.
    Tuncer T (2018) A probabilistic image authentication method based on chaos. Multimed Tools Appl 77:21463.  https://doi.org/10.1007/s11042-017-5569-x CrossRefGoogle Scholar
  12. 12.
    Usha S, Sathish Kumal GA, Boopathybagan KA (2011) Secure triple level encryption method using cryptography and steganography, international conference on computer science and network technology, IEEEGoogle Scholar
  13. 13.
    Wu W-C, Lin Z-W (2016) SVD-based self-embedding image authentication scheme using quick response code features. J Vis Commun Image R 38:18–28CrossRefGoogle Scholar
  14. 14.
    Yalman Y, Ertürk İ (2009) Kişisel Bilgi Güvenliğinin Sağlanmasında Steganografi Bilminin Kullanımı.ÜNAK 2009 Bilgi Çağında Varoluş” Fırsatlar Ve Tehditler” SempozyumuGoogle Scholar
  15. 15.
    Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80:1070–1076CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Vocational School of Technical SciencesFirat UniversitesiElazığTurkey

Personalised recommendations