Steganography applied in the origin claim of pictures captured by drones based on chaos
In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the system, a new technique that modifies the least signif...
- Autores:
-
Jiménez Rodríguez, Maricela
Padilla Leyferman, Carlos Eduardo
Estrada Gutiérrez, Juan Carlos
González Novoa, María Guadalupe
Gómez Rodríguez, Horacio
Flores Siordia, Octavio
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2018
- Institución:
- Universidad Nacional de Colombia
- Repositorio:
- Universidad Nacional de Colombia
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.unal.edu.co:unal/67528
- Acceso en línea:
- https://repositorio.unal.edu.co/handle/unal/67528
http://bdigital.unal.edu.co/68557/
- Palabra clave:
- 62 Ingeniería y operaciones afines / Engineering
Estenografía
caos
seguridad
drones
Steganography
chaos
security
drones.
- Rights
- openAccess
- License
- Atribución-NoComercial 4.0 Internacional
Summary: | In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the system, a new technique that modifies the least significant bit (LSB) is applied, using a mathematical model to generate the chaotic orbits, one of the parts selects the RGB channel (Red, Green or Blue) where the LSB is changed and the other is implemented to calculate the random position of the sub pixel to be modified in the selected channel. In addition, a comparison between the bit to be hidden and the LSB of the pixel of the image is performed to verify if it is not necessary to modify it, which lessens the alterations in the container image. It is a tool to capture photos remotely with the Ar.Drone 2.0, with the features needed to perform an analysis that uses correlation diagrams and histograms to verify if the integrity of the message is guaranteed or if changes in the stego-image are visible to the naked eye. On the other hand, a test was done on the Baboon image to compare the robustness of the proposed system with other investigations, evaluating the correlation, contrast, energy, homogeneity, MSE, PSNR and quality index. The results generated were compared with the work of other authors concluding our system provides greater security, integrity, high sensitivity to the keys, it is not linked to a single chaotic system and can be applied to hide imperceptibly all kinds of information, in: radiographs, videos, files, official documents, and other types of containers. |
---|