GenetiN Algoritma ve TeNil Değer Ayrışımı Tabanlı Yeni Bir Kırılgan
Transkript
6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, *HQHWLN$OJRULWPDYH7HNLO'H÷HU$\UÕúÕPÕ7DEDQOÕ <HQL%LU.ÕUÕOJDQ5HVLP'DPJDODPD Veysel Aslantaú, MHYOWDo÷ru g]HW—%X oDOÕúPDGD, Genetik Algoritma (GA) kullanarak 7HNLO 'H÷HU $\UÕúÕPÕ (Singular Value Decomposition - SVD) WDEDQOÕ \HQL ELU NÕUÕOJDQ resim GDPJDODPD WHNQL÷L JHOLúWLULOPLúWLU ÇRNOX |OoHNOHPH IDNW|UOHUL (scaling factors SFs) kullanarak GDPJDQÕQ KHU ELU VDWÕUÕ |OoHNOHQPLúWLU 2ULMLQDO UHVLP GH EORNODUD D\UÕOPÕúWÕU %X EORNODUÕQ WHNLO GH÷HUOHULQH VLQJXODU Yalues - SVs) VÕUDVÕ\OD IDUNOÕ ELU GDPJD VDWÕUÕ J|POHUHN GDPJDODQPÕú UHVLP HOGH HGLOPLúWLU gQHULOHQ metotta, maksimum VD\GDPOÕNLoLQ|OoHNOHPHIDNW|UOHUL*$LOH optimize HGLOPLúWLU 'HQH\VHOVRQXoODU maksimum saydamOÕ÷D XODúÕOGÕ÷ÕQÕ J|VWHUPHNWHGLU 'DPJDODQPÕú UHVPH oHúLWOL VDOGÕUÕODUX\JXODQDUDN da NÕUÕOJDQOÕNWHVSLWL\DSÕOPÕúWÕU SDOGÕUÕ ROPDGDQ GDPJD ROGX÷X JLEL HOGH HGLOLUNHQ VDOGÕUÕ ROPDVÕ GXUXPXQGDLVHJ|POHQGDPJDROGXNoDER]XOPDNWDGÕU Anahtar Kelimeler—*HQHWLN $OJRULWPD .ÕUÕOJDQ 5HVLP 'DPJDODPD7HNLO'H÷HU$\UÕúÕPÕ Abstract—In this paper, a novel fragile image watermarking scheme based on SVD using GA is presented. Watermark of every line is scaled by using multiple SFs. Host image is divided into blocks. Watermarked image is obtained by embedding a different line of watermark to SVs of the every block. In this proposed method, the SFs are optimized using GA to achieve maximum transparency. Experimental results indicate that reached the highest transparency. Fragility detected under various attacks. When an attack does not occur exactly the original embedded watermark is achieved or else the embedded watermark is intensely corrupted. Index Terms—Genetic Algorithm, Fragile Watermarking, Singular Value Decomposition. I. Image *ø5øù AYISAL GDPJDODPD VHV UHVLP YH YLGHR JLEL VD\ÕVDO YHULOHULQ NRUXQPDVÕQGD \D\JÕQ RODUDN NXOODQÕODQ WHNQLNOHUGHQ ELULGLU %X WHNQLNWH DPDo ELU VD\ÕVDO YHULQLQ GDPJD RODUDN EDúND ELU VD\ÕVDO YHULQLQ LoHULVLQH JL]OHQPHVLGLU7HOLIKDNNÕQÕQNRUXQPDVÕYHULGR÷UXOX÷unun LVSDWÕ GRNPDQ DUúLYOHPH GRNPDQD DLW ELOJLOHULQ VDNODQPDVÕ YH GLMLWDO SDUPDN L]L NRUXQPDVÕ JLEL ELUoRN LúOHPOHU LoLQ VD\ÕVDO GDPJDODPD NXOODQÕOPDNWDGÕU >@ 5HVLP GDPJDODPD JHQHO RODUDN J|POPH RUWDPÕQD J|UOHELOLUOL÷HYHNDOÕFÕOÕ÷DJ|UHVÕQÕIODQGÕUÕODELOLU>-4]. *|POPH RUWDPÕQD J|UH GDPJDODPD; resim ve frekans X]D\Õ WHNQLNOHUL RODUDN LNL JXUXED D\UÕODELOLU 5HVLP X]D\Õ WHNQLNOHULQGH GDPJDODPD LúOHPL GR÷UXGDQ RULMLQDO UHVPLQ SLNVHOOHULQH HNOHQHUHN JHUoHNOHúWLULOLUNHQ IUHNDQV X]D\Õ S 9H\VHO$VODQWDú(UFL\HVhQLYHUVLWHVL0KHQGLVOLN)DNOWHVLBilgisayar 0KHQGLVOL÷L.D\VHULTUNL\H(e-mail:[email protected]). 0HYOW'R÷UX0DOL\H%DNDQOÕ÷Õ0LOOL(PODN*HQHO0GUO÷, Bilgi øúOHP 'DLUH %DúNDQOÕ÷Õ, Ankara, TUNL\H (email:[email protected]). Proceedings/Bildiriler Kitabı 10 WHNQLNOHULQGH LVH $\UÕN .RVLQV '|QúP 'LVFUHWH Cosine Transform - '&7 $\UÕN 'DOJDFÕN '|QúP (Discrete Wavelet Transform - ':7YH69'JLELG|QúP WHNQLNOHUL DUDFÕOÕ÷Õ\OD IUHNDQV X]D\Õ NDWVD\ÕODUÕQD GDPJD eklenerek JHUoHNOHúWLULOPHNWHGLU >@ *HQHOOLNOH IUHNDQV X]D\Õ PHWRWODUÕ ELUoRN VDOGÕUÕ\D NDUúÕ UHVLP X]D\Õ PHWRWODUÕQD J|UH GDKD GD\DQÕNOÕ DQFDN ELU G|QúP X\JXODQGÕ÷ÕQGDQ KHVDSODPD PDOL\HWL RODUDN GDKD \NVHNWLU [2,5-7]. *|UOHELOLUOL÷LQH J|UH UHVLP GDPJDODPD; J|UQU YH J|UQPH] VD\GDP RODUDN LNL JXUXED D\UÕODELOLU *|UQU GDPJDODUWHOHYL]\RQ\D\ÕQODUÕQDHNOHQPLúORJRODUJLELLQVDQ J|]\OHUDKDWOÕNODJ|UOHELOPHNWHGLU*|UQPH\HQGDPJDODU LVH LQVDQ J|UPH VLVWHPLQFHDOJÕODQDPD\DFDNúHNLOGH VD\ÕVDO verinin LoHULVLQH HNOHQHQ GDPJDODUGÕU *|UQU GDPJDODUD J|UHGDKDJYHQOLYHGD\DQÕNOÕGÕU [2]. .DOÕFÕOÕ÷D J|UH GDPJDODPD WHNQLNOHUL GD\DQÕNOÕ NÕUÕOJDQ YH \DUÕ-NÕUÕOJDQ ROPDN ]HUH o JXUXSWD VÕQÕIODQGÕUÕODELOLU 'D\DQÕNOÕ GDPJDODPDGD GDPJD oHúLWOL VDOGÕUÕODUGDn ILOWUHOHPH JUOW HNOHPH YE etkilenmemelidir .ÕUÕOJDQ GDPJDODPDGD GDPJDODQPÕú UHVPH EDVLW ELU LúOHP X\JXODQGÕ÷ÕQGD GDPJD NROD\OÕNOD ER]XOPDOÕGÕU %X WU GDPJDODU JHQHOOLNOH YHUL GR÷UXODPD DPDFÕ\OD NXOODQÕOÕU <DUÕ-NÕUÕOJDQ GDPJDODPDGD LVH EHOLUOL VDOGÕUÕODUD PDUX] NDOGÕ÷ÕQGD GDPJD EXQGDQ HWNLOHQPHPHOL, DQFDN LoHULN GH÷LúLNOL÷L JLEL N|W QL\HWOL VDOGÕUÕODUD NDUúÕ GDPJD \RN olabilmelidir [6,8,9@ .ÕUÕOJDQ GDPJDODPD \|QWHPLQGH GDPJDODQPÕúUHVLPGHNLGDPJDLQVDQJ|]\OHIDUNHGLOHPH] *YHQOLN DoÕVÕQGDQ GR÷UXODPD DPDFÕQD X\JXQ RODUDN GD UHVLPOHU \HWNLVL] NLúLOHU WDUDIÕQGDQ GH÷LúWLULOPHPHOLGLU %XQXQ LoLQ NÕUÕOJDQ GDPJDODPD \|QWHPL NXOODQÕODUDN RULMLQDO YHULQLQ ER]XOXS ER]XOPDGÕ÷Õ KDNNÕQGD ELOJL DOÕQDELOPHNWHGLU SVD, X\DUODPDVÕNROD\ROGX÷XQGDQ damgalama dahil bir oRN DODQGD JoO ELU QPHULN DQDOL] WHNQL÷L RODUDN NXOODQÕOPDNWDGÕU /LWHUDWUGH IDUNOÕ \DSD\ ]HNk WHNQLNOHUL NXOODQÕODUDN '&7 G|QúP\OH NÕUÕOJDQ GDPJDODPD teknikleri [10-12], 69' G|QúP\OH de maliyet fonksiyonu GH÷LúWLULOHUHNGD\DQÕNOÕNÕUÕOJDQYH\DUÕ-NÕUÕOJDQ damgalama WHNQL÷L[13] JHOLúWLULOPLúWLU $\UÕFDKHUKDQJLELU \DSD\]HNDWHNQL÷LNXOODQPDGDQ'&7WDEDQOÕ>@YH':769' WDEDQOÕ >@ GD\DQÕNOÕ GDPJDODPD teknikleri de mevcuttur. OSWLPL]DV\RQ DOJRULWPDVÕ NXOODQDUDN JHOLúWLULOHQ ED]ÕNÕUÕOJDQdamgalama metotlarÕ ve bu makalede |QHULOHQ PHWRGXQNDUúÕODúWÕUÕOPDVÕLVH7DEOR,¶Ge YHULOPLúWLU Bu oDOÕúPDGD gri seviye resimler LoLQ *$ NXOODQÕODrak 69' WDEDQOÕ NÕUÕOJDQ GDPJDODPD WHNQL÷L JHOLúWLULOPLúWLU gOoHNOHPH IDNW|Uleri NXOODQÕODUDN VDWÕUODUÕ |OoHNOHQPLú RODQ GDPJDQÕQKHUELUVDWÕUÕQÕQEORNODUDD\UÕOPÕúRULMLQDOUHVPLQ KHU EOR÷XQ WHNLO GH÷HUlerLQH IDUNOÕ ELU GDPJD VDWÕUÕ J|POHFHN úHNLOGH HNOHQPHVL\OH GDPJDODQPÕú UHVLP HOGH HGLOPLúWLU Damga ekleme VÕUDVÕQGD |OoHNOHPH IDNW|Uleri en \NVHN VD\GDPOÕ÷D XODúDFDN úHNLOGH *$ LOH EHOLUOHQPLúWLU 'HQH\VHOVRQXoODU VD\GDPOÕNYHVDOGÕUÕROPDGDQGDPJDQÕQ 20-21 September /Eylül 2013 | Ankara / TURKEY 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE B. Damga dÕNDUPD SVD LOHGDPJDODQPÕúUHVLPGHQGDPJDoÕNDUPDLúOHPLnde DúD÷ÕGDNLDGÕPODUVÕUD\ODX\JXODQPÕúWÕU TABLO I g1(5ø/(1 METOT VE /ø7(5$7h5'(.ø BAZI METOTLARIN .$5ù,/$ù7,5MASI .XOODQÕODQTeknik ve Algoritma g]HOOLN DCT .ÕUÕOJDQ .ORQDO6HoPH$OJRULWPDVÕ.6$ DCT .ÕUÕOJDQ 3DUoDFÕN6U$OJRULWPDVÕ362 DCT .ÕUÕOJDQ GA, PSO, KSA, Diferansiyel *HOLúLP$OJRULWPDVÕ'*$ .ÕUÕOJDQ SVD <DUÕ-NÕUÕOJDQ GA 'D\DQÕNOÕ SVD .ÕUÕOJDQ GA <D\ÕPODPD 1) 'DPJDODQPÕúresim, EORNODUÕQDD\UÕOGÕNWDQVRQUDKHUELU EOR÷D69'X\JXODQÕU Aslantas vd. (2007) Aslantas vd. (2008) ௌ 8¶(m,n)6¶(m,n)9¶(m,n)T ܫሺǡሻ Aslantas vd. (2009) (6) 2) +HUEORNWDQJ|POHQGDPJDoÕNDUÕOÕU Modaghegh vd. (2009) ଶேȀெ ଶேȀெ ܹכ gQHULOHQ0HWRW ᇱ ൌ ራ ራ ݀݅ܽ݃ሺܵሺǡሻ െ ܵሺǡሻ ሻȀ݇ (7) ୀଵ ୀଵ JHUL HOGH HGLOPHVL EDNÕPÕQGDQ JHOLúWLULOHQ WHNQL÷LQ EDúDUÕOÕ ROGX÷XQX VDOGÕUÕ ROGX÷XQGD LVH GDPJDQÕQ ROGXNoD ER]XOGX÷XQXJ|VWHUPHNWHGLU 3) +HU EORNWDQ oÕNDUÕODQ GDPJD VDWÕUODUÕ ELUOHúWLULOHUHN oÕNDUÕODQGDPJDW*) elde edilir. ସమ Τெమ ܹ כൌ ራ ܹכ (8) ୀଵ II. SVD TABANLI DAMGALAMA SVD ile NxN ER\XWODUÕQGDNLELUA matrisi A=USVT olacak úHNLOGHoD\UÕPDWULVLQoDUSÕPÕQDHúLWOHQHELOLU%XUDGDNxN ER\XWODUÕQGDNL U ve VT ortogonal matris, NxN boyutODUÕndaki S LVH N|úHJHQ GLDJRQDO PDWULVWLU .|úHJHQ HOHPDQODUÕ GÕúÕQGDNL HOHPDQODUÕ VÕIÕU RODQ S matrisi, A PDWULVLQLQWHNLOGH÷HUOHULRODUDNDGODQGÕUÕOÕU [5,6]. A. 'DPJD*|PPH Orijinal resim (ILOHGDPJDQÕQWER\XWODUÕQÕQVÕUDVÕ\OD NxN ve Mx2M (N>20ROGX÷XN¶QÕQda |OoHNOHPH IDNW|U ROGX÷X YDUVD\ÕOÕUVD GDPJD J|PPH LúOHPLQGH DúD÷ÕGDNL DGÕPODU X\JXODQPÕúWÕU Burada, Wi GDPJDQÕQ i. VDWÕUÕ I(m,n) ise bORNODUD D\UÕOPÕú RULMLQDO UHVPLQ m. VDWÕU YH n. VWXQ EOR÷XQXLIDGHHWPHNWHGLU III. *(1(7ø.$/*25ø70$NIN TEMEL YAPISI ùHNLO¶GH|]HWOHQHQWHPHO*$>16@UDVWJHOHVD\ÕUHWLFL uygunluk GH÷HUOHQGLUPHVL YH JHQHWLN RSHUDW|UOHU VHOHNVL\RQ oDprazlama ve mutasyon) ELOHúHQinden ROXúPDNWDGÕU %DúODQJÕoWD DOJRULWPD WDVDUÕPFÕVÕ WDUDIÕQGDQ durdurma kriteri, maliyet fonksiyonu ve parametreler EHOLUOHQLU 'XUGXUPD NULWHUL VD÷ODQÕQFD\D NDGDU GD RSWLPL]DV\RQLúOHPLGHYDPHGHU %DúODQJÕo SRSODV\RQX DOJRULWPDQÕQ EDúODQJÕFÕQda UDVWJHOHVD\ÕUHWLFL WDUDIÕQGDQROXúWXUXODQVD\ÕGL]LVLGLU+HU bir dizi, oSWLPL]DV\RQ SUREOHPL LoLQ PXKWHPHO o|]P J|VWHULU 6RQUDNL DúDPDGD her bir dizinin uygunluk GH÷HUlendirmesi, maliyet fonksiyonuna J|UH KHVDSODQÕU %DúOD 1) Orijinal resim M/2xM/2¶OLNEORNODUDE|OQU. ଶேȀெ ଶேȀெ (1) ܫൌ ራ ራ ܫሺǡሻ Rastgele sD\Õretici ୀଵ ୀଵ 2) 2ULMLQDOUHVPLQKHUEOR÷XQD 69'X\JXODQÕU ௌ ܫሺǡሻ εȋǡȌȋǡȌȋǡȌ %DúODQJÕoSRSODV\RQX (2) 8\JXQOXNGH÷HUOHQGLUPHVL 3) %ORNODUÕQS(m,n) PDWULVLQHGDPJDQÕQVDWÕUODUÕJ|POU ଶேȀெ ଶேȀெ ସమ Τெమ כ ܵሺǡሻ ൌ ራ ራ ܵሺǡሻ ݇ כራ ݀݅ܽ݃ሺܹ ሻ ୀଵ ୀଵ Seleksiyon (3) ୀଵ dDSUD]ODPD 4) 'DPJDODQPÕúUHVLPEORNODUÕKHVDSODQÕU ܫሺǡሻ = U(m,n)S*(m,n)V(m,n)T 5) 'DPJDODQPÕú UHVLP EORNODUÕ GDPJDODQPÕúUHVLPIW) elde edilir. (4) Mutasyon ELUOHúWLULOHUHN Durdurma kriteri ଶேȀெ ଶேȀெ ܦ ܫௐ ൌ ራ ራ ܫሺ݉ǡ݊ሻ (5) +D\ÕU Evet ୀଵ ୀଵ Bitir ùHNLO1. *$¶QÕQWHPHODNÕúúHPDVÕ 20-21 September /Eylül 2013 | Ankara / TURKEY 11 Proceedings/Bildiriler Kitabı 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE Uygunluk GH÷HUL PHYFXW o|]POHULQ HQ L\LVLQLQ |OoP LoLQ NXOODQÕODQ ELU GH÷HUGLU 6HOHNVL\RQ RSHUDW|U GR÷DO seleksiyon fonksiyonunu yerine getirir. Bireyleri temsil eden dizilerden X\JXQOXN GH÷HUL GDKD \NVHN ROan sonraki QHVLOOHUHDNWDUÕOÕU dDSUD]ODPD RSHUDW|U LOH UDVWJHOH ELUH\ oLIWOHUL VHoLOLU YH \HQL ELUH\OHU ROXúWXUXOXU (Q WHPHO oDSUD]ODPD LúOHPL HEHYH\QLQ UDVWJHOH VHoLOHQ ELU QRNWDVÕQGDQ NHVLOHUHN GL÷HU HEHYH\QLQ D\QÕ NHVPH QRNWDVÕQGDQ VRQUDNL HOHPDQODUÕ LOH \HU GH÷LúWLUPHVLGLU (EHYH\QOHUH X\JXODQDFDN oDSUD]ODPD LúOHPLQLQ PLNWDUÕ oDSUD]ODPD RUDQÕQD crossover rate - CR) J|UH EHOLUOHQLU 0XWDV\RQ RSHUDW|U UDVWJHOH ROPDN ]HUH PXWDV\RQ RUDQÕQD 0utation rate - 05 J|UH ELUeyi temsil HGHQ VD\Õ GH÷HUOHULQLQ GH÷LúWLULOPHVLQL VD÷ODPDNWDGÕU *HQHWLNRSHUDW|UOHULQDPDFÕPHYFXWo|]POHULGDKDNDOLWHOL X\JXQOXNGH÷HULQHVDKLSo|]POHUHG|QúWUPHNWLU>@ Orijinal resim 2ULMLQDOUHVPLEORNODUDD\ÕUPD k 'DPJDVDWÕUODUÕQÕQJ|POPHVL 5HVLPEORNODUÕQÕELUOHúWLUPH 6DOGÕUÕODUÕQX\JXODQPDVÕ;dĞƐƚŝĕŝŶͿ D a m g a 'DPJDOÕUHVPLEORNODUDD\ÕUPD 'DPJDVDWÕUODUÕQÕQoÕNDUÕOPDVÕ IV. GA VE SVD TABANLI KIRILGAN DAMGALAMA GA, EDúODQJÕoWD UDVWJHOH UHWLOHQ 6F’lere uygulanarak VD\GDPOÕN DoÕVÕQGDQ RSWLPXP GDPJDODPD HOGH HGLOPLúWLU %XoDOÕúPDGDJHOLúWLULOHQ*$WDEDQOÕGDPJDJ|PPHQLQEORN GL\DJUDPÕùHNLO¶GHJ|VWHULOPHNWHGLU *|PPH LúOHPL %|OP II. $¶GD YHULOHQ ELOJLOHUH J|UH \DSÕOPDNWDGÕU 6DOGÕUÕ\D X÷UDPÕú YH\D X÷UDPDPÕú damgalanmÕúUHVLPGHQGDPJDODUGD%|OP II. %¶GHYHULOHQ ELOJLOHUHJ|UHoÕNDUÕOPÕúWÕU %XLúOHPOHUVRQXFXQGDoÕNDUÕODQ ikili (binary) GDPJDQÕQ SLNVHOOHULQGH 6)¶OHULQ HWNLVL\OH GH÷LúLPOHU RODELOHFH÷LQGHQ oÕNDUÕODQ GDPJDQÕQ SLNVHO GH÷HUOHUL¶GHQGDKDNoN olanlara 0, 0.5 ve daha E\N olanlara ise 1 atanarak yeniden ikili GDPJD HOGH HGLOPLúWLU dHúLWOL YHUL GR÷UXODPD LúOHPOHUL LoLQ IDUNOÕ GDPJDODPD X\JXODPDODUÕ NÕUÕOJDQOÕN WHVWL JHUHNWLUHELOLU %X oDOÕúPDGD GDPJDQÕQ NÕUÕOJDQOÕ÷ÕQÕ WHVW HGHELOPHN LoLQ \HQLGHQ |OoHNOHPH <2 G|QGUPH '1 JDXVLDQ JUOW ** ve ortalama filtreleme (O) VDOGÕUÕODUÕ X\JXODQPÕúWÕU 'DPJDODQPÕúUHVLPOHUHEXVDOGÕUÕODUX\JXODQDUDNNÕUÕOJDQOÕN WHVSLWL\DSÕOPÕúWÕU*HOLúWLULOHQPRGHOLQHVQHNOL÷LQGHQGROD\Õ IDUNOÕVDOGÕUÕODUGDX\JXODQDELOLU øNL ER\XWOX NRUHODV\RQ GH÷HUL corrI) sayesinde orijinal UHVLP LOH GDPJDODQPÕú UHVLP DUDVÕQGDNL EHQ]HUOLN VD\GDPOÕN DPDFÕ\OD GHQNOHP ¶GD J|VWHULOHQ ³%LW 'R÷UXOXN 2UDQÕ´ %LW &RUUHFW 5DWH - BCR) sayesinde de RULMLQDO GDPJD LOH oÕNDUÕODQ GDPJD DUDVÕQGDNL IDUNOÕOÕN NÕUÕOJDQOÕN DPDFÕ\OD KHVDSODQPÕúWÕU 'HQNOHPGH; Wt RULMLQDOGDPJD\ÕWt* oÕNDUÕODQGDPJD\Õ MW GDPJDQÕQVDWÕU simgesi ise lojik VD\ÕVÕQÕ NW GDPJDQÕQ VWXQ VD\ÕVÕQÕ, XOR RSHUDW|UQ J|VWHUPHNWHGLU BCR ROGX÷XQGD J|POHQGDPJDWDPDPHQGR÷UXELUúHNLOGHoÕNDUÕODELOPLúWLU [17]. BCR = ቀͳ െ ெ ଵ ೈ ௫ேೈ ெ ௫ேೈ ೈ σ௧ୀଵ ൫ܹ௧ ܹ௧ כ൯ቁ Ǥ ͳͲͲΨ (9) Korelasyon ve BCR NXOODQÕODUDN |QHULOHQ maliyet fonksiyonu denklem (10¶GD J|VWHULOPHNWHGLU %X GHQNOHP sD\GDPOÕN YH NÕUÕOJDQOÕN LoLQ GXUGXUPD NULWHUL VD÷ODQÕQFD\D NDGDU *$ WDUDIÕQGDQ PLQLPL]H HGLOPLúWLU 'XUGXUPD NULWHULQH |UQHN, PDNVLPXP MHQHUDV\RQ VD\ÕVÕ YHULOHELOLU Burada t MHQHUDV\RQVD\ÕVÕQÕfi ise i. jenerasyondaki maliyet IRQNVL\RQXQXQGH÷HULQLLIDGHHWPHNWHGLU ௧ fi = ܴܥܤୀଵ െ ܿݎݎூ ሺܫǡ ܫௐ ሻ Proceedings/Bildiriler Kitabı (10) 12 'DPJDVDWÕUODUÕQÕQELUOHúWLULOPHVL W* IW .RUHODV\RQYH%&5LúOHPL W I 8\JXQOXNGH÷HUOHQGLUPHVL 6HOHNVL\RQoDSUD]ODPDPXWDV\RQ Son jenerasyon +D\ÕU Evet 'DPJDODQPÕúUHVLP ùHNLO. *$WDEDQOÕGDPJDJ|PPHYHoÕNDUPDQÕQEORNúHPDVÕ V. '(1(<6(/6218d/$5 *HOLúWLULOHQ PHWRGX GH÷HUOHQGLUPHN LoLQ damga olarak, ùHNLO 3 D¶GD J|VWHULOHQ [64 boyutundaki orijinal ikili resmin 32[¶OLk bloklar KDOLQGH VÕUD\OD DOW DOWD \HUOHúWLULOmesiyle oOXúWXUXODQ ve ùHNLO 3 E¶GH J|VWHULOHQ 256x8¶Oik ikili UHVLPNXOODQÕOPÕúWÕU Kaynak resim olarak da [ER\XWODUÕQGDNLùHNLO D¶GDJ|VWHULOHQ%DERRQYH ùHNLO D¶GDJ|VWHULOHQ*HPLUHVLPOHULNXOODQÕOPÕúWÕUùHNLO 3 E¶GHNL GDPJD J|POHUHN ROXúWXUXODQ GDPJDODQPÕú resimOHUùHNLO (b) ve ùHNLO E¶GH J|VWHULOPHktedir. Her LNL GDPJDOÕ UHVPH GH KHUKDQJL ELU VDOGÕUÕ uygulamadan oÕNDUÕODQGDPJDODULVH ùHNLO¶GDYHULOPLúWLU*|UVHODQDOL]Oe de J|UOHFH÷L JLEL GDPJDOÕ UHVLPOHUGH YH oÕNDUÕODQ GDPJDODUGD KHUKDQJL ELU ER]XOPD J|]NPHPHNWHGLU Test DúDPDVÕQGD \|QWHPLQ VDOGÕUÕODUD NDUúÕ NÕUÕOJDQOÕ÷ÕQÕ |OoPHN LoLQ <2 ELOLQHHU Æ128Æ256), DN (bilineer: 30), GG ve OF LúOHPOHULX\JXODQPÕúWÕU6DOGÕUÕODUVRQUDVÕQGD%DERRQ YH *HPL GDPJDODQPÕú UHVLPOHULQGHQ oÕNDUÕODQ GDPJDODU ùHNLO ¶GH YHULOPLúWLU %X UHVLPOHUGHQ RULMLQDO GDPJD\D J|UHoÕNDUÕODQGDPJDQÕQWDPDPHQER]XOGX÷XJ|UOPHNWHGLU *$¶QÕQ NRQWURO SDUDPHWUHOHUL MHQHUDV\RQ VD\ÕVÕ 500, seleksi\RQ úHNOL ³UXOHW´ oDSUD]ODPD úHNOL ³LNL QRNWDOÕ´ oDSUD]ODPDRUDQÕ mutasyon úHNOL ³G]HQOL´, mutasyon 20-21 September /Eylül 2013 | Ankara / TURKEY 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, TABLO III 6$%øT SF'LER ø/( 237ø0806)¶/(5ø13(5)250$16 .$5ù,/$ù7,50$6, corrI Baboon BCR 1 100 1 99,6582 GA SF'ler Gemi Sabit SF'ler Baboon Gemi (a) (b) ùHNLO3. (a) Orijinal damga, (b) 2OXúWXUXODQ\HQLGDPJD. (b) VI. (a) (b) ùHNLO 6. 6DOGÕUÕ ROPDGDQ oÕNDUÕODQ GDPJD D 'DPJDODQPÕú Baboon¶GDQ E'DPJDODQPÕúGemi¶Gen. Baboon Gemi (b) DN (c) GG (d) OF (a) YO ùHNLO7. 6DOGÕUÕODUVRQUDVÕGDPJDODQPÕúUHVLPOHUGHQoÕNDUÕODQGDPJD TABLO II )$5./,5(6ø0/(5ø1.25(/$6<21VE %&5'(ö(5/(5ø BCR corrI YO DN GG OF Baboon 1 100 56,1523 54,9316 56,1523 54,8340 Gemi 1 99,6582 56,3477 54,8828 54,9805 55,5664 20-21 September /Eylül 2013 | Ankara / TURKEY 1 42,1875 0,9983 93,7988 40 0,9938 88,1836 1 1 44,3359 20 0,9985 89,3066 40 0,9943 84,7309 RUDQÕ SRSODV\RQ E\NO÷ YH EDúODQJÕo SRSODV\RQ DUDOÕ÷Õ GD >-15;15@ RODUDN VHoLOPLúWLU 500 jenerasyon sonucunda optimi]DV\RQ LúOHPL VRQXoODQPDNWDGÕU *HOLúWLULOHQ *$ WDEDQOÕ \|QWHPLQ korelasyon ve BCR GH÷HUOHUL 7DEOR ,,¶GH YHULOPLúWLU 7DEOR VRQXoODUÕ LQFHOHQGL÷LQGH KHU LNL resimde corrI GH÷HULQLQ oÕNPDVÕ PDNVLPXP VD\GDPOÕ÷ÕQ VD÷ODQGÕ÷ÕQÕ J|VWHUPHNWHGLU BCR GH÷HULQLQ LVH VDOGÕUÕ X\JXODPDGDQ %DERRQ UHVPLQGH oÕNDUDN RULMLQDO YH oÕNDUÕODQ GDPJD DUDVÕQGDNL EHQ]HUOL÷LQ ROGX÷XQX *HPL Uesminde de “99.6582” oÕNDUDN EX EHQ]HUOL÷LQ ROGXNoD \NVHN ROGX÷XQX J|VWHUPHNWHGLU 6DOGÕUÕQÕQ WUQH J|UH BCR GH÷HUL “54-57” DUDVÕQGD GH÷LúHUHNGHoÕNDUÕODQGDPJDQÕQROGXNoDER]XOGX÷XQXYHEX WHNQL÷LQ NÕUÕOJDQ ELU GDPJDODPD ROGX÷XQX J|VWHUPHNWHGLU. GA ile eldHHGLOHQVRQXoODUD\QÕ]DPDQGD ³1, 20, 40” sabit |OoHNOHPH IDNW|UOHUL NXOODQÕODUDN NDUúÕODúWÕUÕOPÕúWÕU 7DEOR II,¶GHNLEXVRQXoODUD g|UH6)GH÷HUL YHULOGL÷LQGH corrI 1 oÕNPDNWD IDNDW BCR ROGXNoD GúN oÕNPDNWDGÕU 6DELW 6) GH÷HULQLDUWÕUÕQFDLVHcorrI GúPHNWHYHBCR GHEDúDUÕ VHYL\HOHULQHXODúDPDPDNWDGÕU*$WDEDQOÕ\|QWHPGHLVHKHP PDNVLPXP VD\GDPOÕN VD÷ODQPDNWD KHP GH VDOGÕUÕ ROPDGDQ RULMLQDO YH oÕNDUÕODQ GDPJD DUDVÕQGDNL EHQ]HUOLN NRUXQPDNWDGÕU (a) (b) ùHNLO4. (a) Orijinal BaboonE'DPJDODQPÕúBaboon. (a) ùHNLO5. (a) Orijinal GemiE'DPJDODQPÕúGemi. 1 20 6218d/$5 %X oDOÕúPDGD, *$ NXOODQÕODUDN 69' WDEDQOÕ yeni bir NÕUÕOJDQ resim damgalama WHNQL÷L VXQXOPXúWXU dRNOX |OoHNOHPH IDNW|Uleri NXOODQÕODUDN |OoHNOHQHQ GDPJD UHVPLQ KHU ELU VDWÕUÕ EORNODUD D\UÕOPÕú RULMLQDO UHVPLQ KHU EOR÷XQ WHNLO GH÷HUlerLQH IDUNOÕ ELU GDPJD VDWÕUÕ J|POHFHN úHNLOGH ekleQPHVL\OH GDPJDODQPÕú UHVLP HOGH HGLOPLúWLU gQHULOHQ PHWRWWD UHVPLQ NDOLWHVLQL GH÷LúWLUPHGHQ RODELOGL÷LQFH \NVHN VD\GDPOÕN LoLQ oRNOX |OoHNOHPH IDNW|UOHUL *$ LOH HOGH HGLOPLúWLU Deneysel testler, GA ile optimize edilen 6)¶OHULQ sabit 6)¶\H J|UH oRN GDKD NDOLWHOL VRQXoODU UHWWL÷LQL J|VWHUPHNWHGLU $\UÕFD orijinal resim ile GDPJDODQPÕú UHVPLQ D\QÕ oÕNPDVÕ GDPJDODQPÕú UHVPLQ HQ \NVHNVD\GDPOÕ÷DXODúWÕ÷ÕQÕEHOLUWPHNWHGLU. .ÕUÕOJDQ GDPJDODPD WHNQL÷L VD\ÕVDO YHULOHULQ ER]XOXS ER]XOPDGÕ÷ÕQÕQWHVWLLoLQNXOODQÕOGÕ÷ÕQGDQ, NÕUÕOJDQOÕ÷ÕWHVSLW HWPHNDPDFÕ\OD YO, DN, GG ve O)VDOGÕUÕODUÕGDPJDODQPÕú UHVPH X\JXODQPÕúWÕU 6DOGÕUÕODU VRQXFXQGD oÕNDUÕODQ GDPJDODU LQFHOHQGL÷LQGH GDPJDQÕQ ROGXNoD ER]XOGX÷X J|UOPHNWHGLU. 13 Proceedings/Bildiriler Kitabı 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE KAYNAKLAR [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] F. Hartung, and M. Kutter ³0XOWLPHGLD ZDWHUPDUNLQJ WHFKQLTXHV´ Proc. IEEE 1999; 87: 1079–107. V. Potdar, S. Han, and E. Chang ³$ survey of digital image watermarking tHFKQLTXHV´3URFHHGLQJVRIWKHUGLQWHUQDWLRQDO,((( conference on industrial informatics (INDIN 2005), Perth Western Australia, 10-12 Aug. 2005. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, ³,QIRUPDWLRQ hiding—$VXUYH\´3URFHHGLQJVRI,(((–78. B. L. Gunjal, and R. R. Manthalkar, ³An overview of transform domain robust digital image watermarking algorithms´, Journal of Emerging Trends in Computing and Information Sciences, vol. 2, no 1, CIS Journal 2010-2011. V. Aslantas, ³An SVD based digital image watermarking using genetic algorithm´, International Conference on Information Sciences, Signal Processing and its App., ISSPA2007, Sharjah, U.A.E., 2007. V. Aslantas, ³An optimal robust digital image watermarking based on SVD using differential evolution algorithm´, Optics Communications 282, 769–777, 2009. D. Arya, ³$ Vurvey of frequency and wavelet domain digital watermarking tHFKQLTXHV´ ,QWHUQDWLRQDO -RXUQDO RI 6FLHntific & Engineering Research, vol. 1, iss. 2, Nov. 2010. E. Hussein, and M. A. %HODO ³'LJLWDO Zatermarking techniques, applications and attacks applied to digital media: A sXUYH\´ International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, vol. 1, no 7, Sep. 2012. M. H. Hassan, and S. A. M. Gilani ³$ Vemi-fragile watermarking scheme for color image aXWKHQWLFDWLRQ´:RUOG$FDGHP\RI6FLHQFH Engineering and Technology 19, 2006. V. Aslantas, S. Ozer, and S. Ozturk, ³$ Qovel clonal selection algorithm based fragile watermarking mHWKRG´/1&6SS369, 2007. V. Aslantas, S. Ozer, and S. Ozturk, ³$ Qovel fragile watermarking based on particle swarm oSWLPL]DWLRQ´ ,((( ,QW &RQI RQ Multimedia and Expo, Hannover, Germany, 269-72, 2008. V. Aslantas, S. Ozer, and S. Ozturk, "Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms" Optics Commun., vol. 282, no 14, 2806-2817, 2009. H. Modaghegh, R. H. Khosravi, and M. R. Akbarzadeh-T, ³$ QHZ adjustable blind wDWHUPDUNLQJ EDVHG RQ *$ DQG 69'´ Innovations'09: 6th International Conference on Innovations in Information Technology, Dec. 2009. 0 % $EXJKDUVD 0 $ 6XOODEL DQG $ 0 7DKHU ³'LJLWDO watermarking enhancement for satellite images using a DCT DOJRULWKP´ WK ,QWHUQDWLRQDO &RQIHUHQFH RQ ,QIRUPDWLRQ 6HFXULW\ Cryptology, Turkey, May. 2012. 0 $JR\L DQG ' 6HUDO ³$Q LPSHUFHSWLEOH ZDWHUPDUNLQJ VFKHPH based on double density dual-tree discrete wavelet transform in FRPELQDWLRQ ZLWK VLQJXODU YDOXH GHFRPSRVLWLRQ´ WK ,QWHUQDWLRQDO Conference on Information Security & Cryptology, Turkey, May. 2012. J. H. +ROODQG ³$GDSWDWLRQ LQ QDWXUDO DQG DUWL¿FLDO V\VWHP DQ introductory analysis with applications to biology, control and DUWL¿FLDOLQWHOOLJHQFH´&DPEULGJH0$0,73UHVV S. C. Chu, H. C. Huang, Y. Shi, S. Y. Wu, and C. S. Shieh, ³*HQHWLF watermarking for zerotree-based aSSOLFDWLRQV´'LJLWDO:DWHUPDUNLQJ and Multimedia Security, Circuits Syst Signal Process, 27: 171–182, 2008. Proceedings/Bildiriler Kitabı 14 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 9H\VHO $VODQWDú (UFL\HV hQLYHUVLWHVL (OHNWURQLN 0KHQGLVOL÷L %|OPQGHQ \ÕOÕQGD PH]XQ ROGX \ÕOÕQGD D\QÕ QLYHUVLWHQLQ (OHNWURQLN 0KHQGLVOL÷L E|OPQGH $UDúWÕUPD *|UHYOLVL RODUDN J|UHYH EDúODGÕ øQJLOWHUH *DOOHU .ardiff hQLYHUVLWHVLQGH =HNL 6LVWHPOHU ]HULQH yaSWÕ÷Õ 'RNWRUDVÕQÕ \ÕOÕQGD WDPDPODGÕ. ¶GD LVH 'RoHQW QYDQÕQÕ DOGÕøOJLDODQODUÕELOJLVD\DUODJ|UPHUHVLPLúOHPHELOJLVD\DUJUDILN\DSD\ VLQLU D÷ODUÕ YH ]HNL RSWLPL]DV\RQ WHNQLNOHULGLU +DOHQ (UFL\HV hQLYHUVLWHVLQGHg÷UHWLPh\HVLRODUDNJ|UHYLQLVUGUPHNWHGLU 0HYOW 'R÷ru (UFL\HV hQLYHUVLWHVL %LOJLVD\DU 0KHQGLVOL÷L %|OPQGHQ \ÕOÕQGD PH]XQ ROGX \ÕOÕQGD D\QÕ QLYHUVLWHQLQ %LOJLVD\DU 0KHQGLVOL÷L$QD%LOLP'DOÕQGD <NVHN/LVDQVÕQÕWDPDPOD\DUDN'RNWRUD H÷Ltimine EDúODGÕ. SGK Bilgi 6LVWHPOHULYH*YHnOL÷L'DLUH%DúNDQOÕ÷ÕQGD 6LVWHP0KHQGLVLRODUDN¶GDEDúODGÕ÷ÕJ|UHYLQL, \ÕOÕQGDQLWLEDUHQ 0DOL\H%DNDQOÕ÷Õ0LOOL(PODN*HQHO0GUO÷QGHVUGUPHNWHGLU $\QÕ ]DPDQGD'RNWRUDH÷LWLPLQHGHGHYDPHWPHNWHGLU 20-21 September /Eylül 2013 | Ankara / TURKEY
Benzer belgeler
Sayisal Görüntülerdeki Yerel Parlaklik Degisimine Bagli Adaptif
NDUúÕODúÕOPDPÕú UHVPLQ NDUPDúÕNOÕ÷Õ\OD RUDQWÕOÕ PLNWDUGD YHUL
J|PPHLúOHPLJHUoHNOHúWLULOPLúWLU$\QÕ]DPDQGDYHULQLQGDKD
oRN J|UQWQQ SDUODNOÕN GH÷HUOHULQLQ KÕ]OD GH÷LúWL÷L NHQDU...
Gerçek Zamanlı Gömülü Yazılımlar için Test - CEUR
DOPDEHNOHPHJLELWHVWRWRPDV\RQXLoLQ|QHPOLIRQNVL\RQODUÕEDUÕQGÕUPDVÕQDUD÷PHQ
JHUoHN]DPDQOÕKDEHUOHúPHNDQDOÕL]OHPH\HVQLIIHURODQDNYHUPHPHNWHGLU7HVWDOD
QÕQGDoldukça |]HOOHúPLúRODQ...
Donanımsal Truva Atı Tespiti EtNinliN Analizi
3UR$VLF WLSL )3*$ HOHPDQÕGÕU dDOÕúPD NDSVDPÕQGD
DUDúWÕUPDFÕODU DQDOL] HGLOHQ )3*$ HOHPDQÕQÕQ -7$*
DUD\]QH \R÷XQODúPÕúODUGÕU %X DUD\] DUDFÕOÕ÷Õ LOH
Özgün Bir Şifreleme Algoritması Kullanan Güvenli E
ùLIUHOHPHLúOHPLQHJHOHQNDUDNWHUOLNGL]LLONRODUDN\HU
GH÷LúWLUPHLúOHPLQHWDELWXWXOXUøONNDUDNWHUYHVRQ
NDUDNWHU\HUGH÷LúWLULU
ú/*ú 1278 5ú6. `(ř(5/(1`ú50(6ú B úLG ú NO TU : 2
1LFHOLNVHO 5LVN 'H÷HUOHQGLUPHVL \DNODúÕPÕ \DQJÕQ JYHQOL÷LQLQ VD÷ODQPDVÕ NDUúÕVÕQGD ULVN ROXúWXUDQ HWPHQOHULQ
QHVQHO REMHNWLI KHVDSODPDODU LVWDWLVWLN YHULOHU |OoPOHU YH KHVDSODPD WHNQLNOHUL...
Arka Plan Kaydına Dayanan Blok Bazlı Hızlı Video Nesne
GXUXPXQD NDUDU YHULOLU $QFDNoRN \DYDú KDUHNHW HGHQ YH\D
GRNXOX \]H\ QHGHQL LOH KDUHNHW HWVH ELOH ÕúÕNOÕOÕN
GH÷HUOHULQGHNLGH÷LúLPLQD]ROPDVÕQHGHQLLOHEHOLUOHQHQHúLN
GH÷HULQ...