Steganography applied in the origin claim of pictures captured by drones based on chaos

In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the system, a new technique that modifies the least signif...

Full description

Autores:
Jiménez Rodríguez, Maricela
Padilla Leyferman, Carlos Eduardo
Estrada Gutiérrez, Juan Carlos
González Novoa, María Guadalupe
Gómez Rodríguez, Horacio
Flores Siordia, Octavio
Tipo de recurso:
Article of journal
Fecha de publicación:
2018
Institución:
Universidad Nacional de Colombia
Repositorio:
Universidad Nacional de Colombia
Idioma:
spa
OAI Identifier:
oai:repositorio.unal.edu.co:unal/67528
Acceso en línea:
https://repositorio.unal.edu.co/handle/unal/67528
http://bdigital.unal.edu.co/68557/
Palabra clave:
62 Ingeniería y operaciones afines / Engineering
Estenografía
caos
seguridad
drones
Steganography
chaos
security
drones.
Rights
openAccess
License
Atribución-NoComercial 4.0 Internacional
Description
Summary:In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the system, a new technique that modifies the least significant bit (LSB) is applied, using a mathematical model to generate the chaotic orbits, one of the parts selects the RGB channel (Red, Green or Blue) where the LSB is changed and the other is implemented to calculate the random position of the sub pixel to be modified in the selected channel. In addition, a comparison between the bit to be hidden and the LSB of the pixel of the image is performed to verify if it is not necessary to modify it, which lessens the alterations in the container image. It is a tool to capture photos remotely with the Ar.Drone 2.0, with the features needed to perform an analysis that uses correlation diagrams and histograms to verify if the integrity of the message is guaranteed or if changes in the stego-image are visible to the naked eye. On the other hand, a test was done on the Baboon image to compare the robustness of the proposed system with other investigations, evaluating the correlation, contrast, energy, homogeneity, MSE, PSNR and quality index. The results generated were compared with the work of other authors concluding our system provides greater security, integrity, high sensitivity to the keys, it is not linked to a single chaotic system and can be applied to hide imperceptibly all kinds of information, in: radiographs, videos, files, official documents, and other types of containers.