Steganography applied in the origin claim of pictures captured by drones based on chaos
In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the system, a new technique that modifies the least signif...
- Autores:
-
Jiménez Rodríguez, Maricela
Padilla Leyferman, Carlos Eduardo
Estrada Gutiérrez, Juan Carlos
González Novoa, María Guadalupe
Gómez Rodríguez, Horacio
Flores Siordia, Octavio
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2018
- Institución:
- Universidad Nacional de Colombia
- Repositorio:
- Universidad Nacional de Colombia
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.unal.edu.co:unal/67528
- Acceso en línea:
- https://repositorio.unal.edu.co/handle/unal/67528
http://bdigital.unal.edu.co/68557/
- Palabra clave:
- 62 Ingeniería y operaciones afines / Engineering
Estenografía
caos
seguridad
drones
Steganography
chaos
security
drones.
- Rights
- openAccess
- License
- Atribución-NoComercial 4.0 Internacional
id |
UNACIONAL2_40a2ab1fa59ce7210c897212f411fe72 |
---|---|
oai_identifier_str |
oai:repositorio.unal.edu.co:unal/67528 |
network_acronym_str |
UNACIONAL2 |
network_name_str |
Universidad Nacional de Colombia |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Steganography applied in the origin claim of pictures captured by drones based on chaos |
title |
Steganography applied in the origin claim of pictures captured by drones based on chaos |
spellingShingle |
Steganography applied in the origin claim of pictures captured by drones based on chaos 62 Ingeniería y operaciones afines / Engineering Estenografía caos seguridad drones Steganography chaos security drones. |
title_short |
Steganography applied in the origin claim of pictures captured by drones based on chaos |
title_full |
Steganography applied in the origin claim of pictures captured by drones based on chaos |
title_fullStr |
Steganography applied in the origin claim of pictures captured by drones based on chaos |
title_full_unstemmed |
Steganography applied in the origin claim of pictures captured by drones based on chaos |
title_sort |
Steganography applied in the origin claim of pictures captured by drones based on chaos |
dc.creator.fl_str_mv |
Jiménez Rodríguez, Maricela Padilla Leyferman, Carlos Eduardo Estrada Gutiérrez, Juan Carlos González Novoa, María Guadalupe Gómez Rodríguez, Horacio Flores Siordia, Octavio |
dc.contributor.author.spa.fl_str_mv |
Jiménez Rodríguez, Maricela Padilla Leyferman, Carlos Eduardo Estrada Gutiérrez, Juan Carlos González Novoa, María Guadalupe Gómez Rodríguez, Horacio Flores Siordia, Octavio |
dc.subject.ddc.spa.fl_str_mv |
62 Ingeniería y operaciones afines / Engineering |
topic |
62 Ingeniería y operaciones afines / Engineering Estenografía caos seguridad drones Steganography chaos security drones. |
dc.subject.proposal.spa.fl_str_mv |
Estenografía caos seguridad drones Steganography chaos security drones. |
description |
In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the system, a new technique that modifies the least significant bit (LSB) is applied, using a mathematical model to generate the chaotic orbits, one of the parts selects the RGB channel (Red, Green or Blue) where the LSB is changed and the other is implemented to calculate the random position of the sub pixel to be modified in the selected channel. In addition, a comparison between the bit to be hidden and the LSB of the pixel of the image is performed to verify if it is not necessary to modify it, which lessens the alterations in the container image. It is a tool to capture photos remotely with the Ar.Drone 2.0, with the features needed to perform an analysis that uses correlation diagrams and histograms to verify if the integrity of the message is guaranteed or if changes in the stego-image are visible to the naked eye. On the other hand, a test was done on the Baboon image to compare the robustness of the proposed system with other investigations, evaluating the correlation, contrast, energy, homogeneity, MSE, PSNR and quality index. The results generated were compared with the work of other authors concluding our system provides greater security, integrity, high sensitivity to the keys, it is not linked to a single chaotic system and can be applied to hide imperceptibly all kinds of information, in: radiographs, videos, files, official documents, and other types of containers. |
publishDate |
2018 |
dc.date.issued.spa.fl_str_mv |
2018-05-01 |
dc.date.accessioned.spa.fl_str_mv |
2019-07-03T04:28:04Z |
dc.date.available.spa.fl_str_mv |
2019-07-03T04:28:04Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.coarversion.spa.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
publishedVersion |
dc.identifier.issn.spa.fl_str_mv |
ISSN: 2248-8723 |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.unal.edu.co/handle/unal/67528 |
dc.identifier.eprints.spa.fl_str_mv |
http://bdigital.unal.edu.co/68557/ |
identifier_str_mv |
ISSN: 2248-8723 |
url |
https://repositorio.unal.edu.co/handle/unal/67528 http://bdigital.unal.edu.co/68557/ |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.spa.fl_str_mv |
https://revistas.unal.edu.co/index.php/ingeinv/article/view/64509 |
dc.relation.ispartof.spa.fl_str_mv |
Universidad Nacional de Colombia Revistas electrónicas UN Ingeniería e Investigación Ingeniería e Investigación |
dc.relation.references.spa.fl_str_mv |
Jiménez Rodríguez, Maricela and Padilla Leyferman, Carlos Eduardo and Estrada Gutiérrez, Juan Carlos and González Novoa, María Guadalupe and Gómez Rodríguez, Horacio and Flores Siordia, Octavio (2018) Steganography applied in the origin claim of pictures captured by drones based on chaos. Ingeniería e Investigación, 38 (2). pp. 61-69. ISSN 2248-8723 |
dc.rights.spa.fl_str_mv |
Derechos reservados - Universidad Nacional de Colombia |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.license.spa.fl_str_mv |
Atribución-NoComercial 4.0 Internacional |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by-nc/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Atribución-NoComercial 4.0 Internacional Derechos reservados - Universidad Nacional de Colombia http://creativecommons.org/licenses/by-nc/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Universidad Nacional de Colombia - Sede Bogotá - Facultad de Ingeniería |
institution |
Universidad Nacional de Colombia |
bitstream.url.fl_str_mv |
https://repositorio.unal.edu.co/bitstream/unal/67528/1/64509-393976-1-PB.pdf https://repositorio.unal.edu.co/bitstream/unal/67528/2/64509-393976-1-PB.pdf.jpg |
bitstream.checksum.fl_str_mv |
c0798d5bd590987f69d4e4dd8e688db1 ffc413133adc0e9dae6378d4befc325d |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad Nacional de Colombia |
repository.mail.fl_str_mv |
repositorio_nal@unal.edu.co |
_version_ |
1814089879187881984 |
spelling |
Atribución-NoComercial 4.0 InternacionalDerechos reservados - Universidad Nacional de Colombiahttp://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Jiménez Rodríguez, Maricela19ae716c-2e13-4845-bafb-c51a86aa8107300Padilla Leyferman, Carlos Eduardode436df6-929e-42e3-aaf9-f4e011fbc9f9300Estrada Gutiérrez, Juan Carlos39e06e98-f050-44bc-a142-015e42840796300González Novoa, María Guadalupe3ac00c35-7ab2-410c-bbf0-25e6511bec65300Gómez Rodríguez, Horaciocf2342ff-aaf4-476c-8691-2b3c7bd5339a300Flores Siordia, Octavio9c2970ca-cc59-48a6-a7c6-b7a499da25903002019-07-03T04:28:04Z2019-07-03T04:28:04Z2018-05-01ISSN: 2248-8723https://repositorio.unal.edu.co/handle/unal/67528http://bdigital.unal.edu.co/68557/In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the system, a new technique that modifies the least significant bit (LSB) is applied, using a mathematical model to generate the chaotic orbits, one of the parts selects the RGB channel (Red, Green or Blue) where the LSB is changed and the other is implemented to calculate the random position of the sub pixel to be modified in the selected channel. In addition, a comparison between the bit to be hidden and the LSB of the pixel of the image is performed to verify if it is not necessary to modify it, which lessens the alterations in the container image. It is a tool to capture photos remotely with the Ar.Drone 2.0, with the features needed to perform an analysis that uses correlation diagrams and histograms to verify if the integrity of the message is guaranteed or if changes in the stego-image are visible to the naked eye. On the other hand, a test was done on the Baboon image to compare the robustness of the proposed system with other investigations, evaluating the correlation, contrast, energy, homogeneity, MSE, PSNR and quality index. The results generated were compared with the work of other authors concluding our system provides greater security, integrity, high sensitivity to the keys, it is not linked to a single chaotic system and can be applied to hide imperceptibly all kinds of information, in: radiographs, videos, files, official documents, and other types of containers.En este trabajo se implementó esteganografía en las fotografías capturadas por un vehículo aéreo no tripulado (dron), con la finalidad de agregar un identificador que indique desde que dispositivo fueron tomadas, y funcione para la reclamación de origen. En el sistema se aplicó una nueva técnica que modifica el bit menos significativo (LSB) usando un modelo matemático que se utiliza para generar dos órbitas caóticas, una de las cuales se usa para seleccionar el canal RGB (Rojo, Verde o Azul), donde se cambió el LSB y la otra se implementó para calcular de forma aleatoria la posición del subpixel que se modificará en el canal seleccionado; además se realizó una comparación entre el bit que se desea ocultar y el LSB del pixel de la imagen, para verificar si no es necesario modificarlo, lo cual altera menos la imagen original. Se realizaron pruebas del algoritmo en un Ar.drone 2.0, pero se puede aplicar para ocultar de forma imperceptible todo tipo de información, en: radiografías, videos, archivos, documentos oficiales, o cualquier otro tipo de contendor.application/pdfspaUniversidad Nacional de Colombia - Sede Bogotá - Facultad de Ingenieríahttps://revistas.unal.edu.co/index.php/ingeinv/article/view/64509Universidad Nacional de Colombia Revistas electrónicas UN Ingeniería e InvestigaciónIngeniería e InvestigaciónJiménez Rodríguez, Maricela and Padilla Leyferman, Carlos Eduardo and Estrada Gutiérrez, Juan Carlos and González Novoa, María Guadalupe and Gómez Rodríguez, Horacio and Flores Siordia, Octavio (2018) Steganography applied in the origin claim of pictures captured by drones based on chaos. Ingeniería e Investigación, 38 (2). pp. 61-69. ISSN 2248-872362 Ingeniería y operaciones afines / EngineeringEstenografíacaosseguridaddronesSteganographychaossecuritydrones.Steganography applied in the origin claim of pictures captured by drones based on chaosArtículo de revistainfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Texthttp://purl.org/redcol/resource_type/ARTORIGINAL64509-393976-1-PB.pdfapplication/pdf2136394https://repositorio.unal.edu.co/bitstream/unal/67528/1/64509-393976-1-PB.pdfc0798d5bd590987f69d4e4dd8e688db1MD51THUMBNAIL64509-393976-1-PB.pdf.jpg64509-393976-1-PB.pdf.jpgGenerated Thumbnailimage/jpeg8505https://repositorio.unal.edu.co/bitstream/unal/67528/2/64509-393976-1-PB.pdf.jpgffc413133adc0e9dae6378d4befc325dMD52unal/67528oai:repositorio.unal.edu.co:unal/675282024-05-22 23:33:38.396Repositorio Institucional Universidad Nacional de Colombiarepositorio_nal@unal.edu.co |