Research Article
BibTex RIS Cite

Karıştırılmış Görüntülerin Sesini Yenilikçi Nesnelerin İnterneti Sualtı Veri İletimi için Kullanma

Year 2025, Volume: 30 Issue: 1, 113 - 128, 29.04.2025
https://doi.org/10.53433/yyufbed.1623589

Abstract

Su altı IoT iletişimi için hibrit bir yaklaşımın geliştirilmesi, verilerin su altından verimli bir şekilde iletilmesini sağlamak amacıyla kaotik harita algoritmalarının akustik dalga teknolojisiyle entegrasyonunu içerir. Arnold Cat Map algoritması, bir görüntünün piksellerini matematiksel bir dönüşümle yeniden düzenleyerek, görüntüyü rastgele bir desen haline getiren kaotik bir görüntü karıştırma tekniğidir. Bu yaklaşımın özellikle ilginç bir uygulaması, geleneksel olarak görüntü karıştırma için kullanılan steganografi algoritmasının, su altı iletişimi için ses dosyaları üretmek amacıyla kullanılmasıdır. Bu yenilikçi yaklaşımda, algoritma ilk olarak bir görüntüyü karıştırarak onu karmaşık bir ses dosyasına dönüştürür. Akustik dalgalardan oluşan bu ses dosyası, su altındaki ortamda iletilir; burada ses dalgaları, su altındaki mükemmel iletim özellikleri nedeniyle birincil iletişim ortamıdır. Alındığında, ses dalgaları ters dönüşüm işlemiyle tekrar görüntü formuna dönüştürülür. Arnold’un kedi haritası algoritması tersine çevrilerek karıştırılmış görüntü çözümlenir ve orijinal mesaj ortaya çıkar. Bu hibrit strateji, su altı iletişimindeki akustik dalgaların gücünden ve görüntü işleme algoritmalarının şifreleme yeteneklerinden yararlanarak güvenli ve verimli bir iletişim yöntemi sunar. Ayrıca, sinyal zayıflaması ve gürültü interferansı gibi sorunları ele alarak, yüksek güvenlik ve güvenilirlik gerektiren karmaşık su altı IoT sistemleri için umut verici bir çözüm sunar. Görüntü karıştırma ve akustik dalga iletiminin birleşimi, karmaşık deniz IoT uygulamalarını yönetebilecek sofistike bir iletişim sistemi oluşturur ve böylece su altı iletişimini geliştirir.

References

  • Alhaddad, M. J., Alkinani, M. H., Atoum, M. S., & Alarood, A. A. (2020). Evolutionary detection accuracy of secret data in audio steganography for securing 5G-enabled internet of things. Symmetry, 12(12), 2071. https://doi.org/10.3390/sym12122071
  • Altaay, A. A. J., Sahib, S. B., & Zamani, M. (2012, November). An introduction to image steganography techniques. 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 122-126. IEEE. https://doi.org/10.1109/ACSAT.2012.25
  • Amjath, M. I. M., & Senthooran, V. (2020, December). Secure communication using steganography in IoT environment. 2020 2nd International Conference on Advancements in Computing (ICAC), 114-119. IEEE. https://doi.org/10.1109/ICAC51239.2020.9357260
  • Bachrach, M., & Shih, F. Y. (2012). Survey of image steganography and steganalysis.In Multimedia Security: Watermarking, Steganography, and Forensics (pp. 201-214). CRC Press.
  • Bairagi, A. K., Khondoker, R., & Islam, R. (2016). An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures. Information Security Journal: A Global Perspective, 25(4-6), 197-212. https://doi.org/10.1080/19393555.2016.1206640
  • Das, R., & Das, I. (2016, September). Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques. 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 296-301. IEEE. https://doi.org/10.1109/ICRCICN.2016.7813674
  • Djebbar, F. (2021). Securing IoT data using steganography: A practical implementation approach. Electronics, 10(21), 2707. https://doi.org/10.3390/electronics10212707
  • Fabbri, C., Islam, M. J., & Sattar, J. (2018, May). Enhancing underwater imagery using generative adversarial networks. 2018 IEEE International Conference on Robotics and Automation (ICRA), 7159-7165. IEEE. https://doi.org/10.1109/ICRA.2018.8460552
  • Ghoul, S., Sulaiman, R., & Shukur, Z. (2023). A review on security techniques in image steganography. International Journal of Advanced Computer Science and Applications, 14(6). https://dx.doi.org/10.14569/IJACSA.2023.0140640
  • Goel, S., Rana, A., & Kaur, M. (2013). A review of comparison techniques of image steganography. Global Journal of Computer Science and Technology, 13(4), 9-14.
  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187.
  • Hassaballah, M., Hameed, M. A., Awad, A. I., & Muhammad, K. (2021). A novel image steganography method for industrial internet of things security. IEEE Transactions on Industrial Informatics, 17(11), 7743-7751. https://doi.org/10.1109/TII.2021.3053595
  • Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques. International Journal of Advanced Science and Technology, 54, 113-124.
  • Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46-66. https://doi.org/10.1016/j.image.2018.03.012
  • Islam, M. J., Xia, Y., & Sattar, J. (2020). Fast underwater image enhancement for improved visual perception. IEEE Robotics and Automation Letters, 5(2), 3227-3234. https://doi.org/10.1109/LRA.2020.2974710
  • Jia-jia, J., Xian-quan, W., Fa-jie, D., Xiao, F., Han, Y., & Bo, H. (2018). Bio-inspired steganography for secure underwater acoustic communications. IEEE Communications Magazine, 56(10), 156-162. https://doi.org/10.1109/MCOM.2018.1601228
  • Kaur, S., Singh, S., Kaur, M., & Lee, H. N. (2022). A systematic review of computational image steganography approaches. Archives of Computational Methods in Engineering, 29(7), 4775-4797. https://doi.org/10.1007/s11831-022-09749-0
  • Khan, H. A., Abdulla, R., Selvaperumal, S. K., & Bathich, A. (2021). IoT based on secure personal healthcare using RFID technology and steganography. International Journal of Electrical and Computer Engineering, 11(4), 3300. http://doi.org/10.11591/ijece.v11i4.pp3300-3309
  • Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2020). Securing data in Internet of Things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73-80. https://doi.org/10.1109/TSMC.2019.2903785
  • Koptyra, K., & Ogiela, M. R. (2023). Steganography in IoT: Information hiding with joystick and touch sensors. Sensors, 23(6), 3288. https://doi.org/10.3390/s23063288
  • Kumar, A., Rani, R., & Singh, S. (2023). A survey of recent advances in image steganography. Security and Privacy, 6(3), e281. https://doi.org/10.1002/spy2.281
  • Mandal, P. C., Mukherjee, I., Paul, G., & Chatterji, B. N. (2022). Digital image steganography: A literature survey. Information Sciences, 609, 1451-1488. https://doi.org/10.1016/j.ins.2022.07.120
  • Mileva, A. (2018, August). Steganography in the world of IoT. IoT-SECFOR 2018, International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany.
  • Mishra, R., & Bhanodiya, P. (2015, March). A review on steganography and cryptography. 2015 International Conference on Advances in Computer Engineering and Applications, 119-122. IEEE. https://doi.org/10.1109/ICACEA.2015.7164679
  • Mustafa, G., Ashraf, R., Mirza, M. A., Jamil, A., & Muhammad. (2018, June). A review of data security and cryptographic techniques in IoT based devices. Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 1-9. https://doi.org/10.1145/3231053.3231100
  • Pradhan, A., Sahu, A. K., Swain, G., & Sekhar, K. R. (2016, May). Performance evaluation parameters of image steganography techniques. 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), 1-8. IEEE. https://doi.org/10.1109/RAINS.2016.7764399
  • Qin, J., Luo, Y., Xiang, X., Tan, Y., & Huang, H. (2019). Coverless image steganography: a survey. IEEE Access, 7, 171372-171394. https://doi.org/10.1109/ACCESS.2019.2955452
  • Ray, A. M., Sarkar, A., Obaid, A. J., & Pandiaraj, S. (2021). IoT security using steganography. In Multidisciplinary approach to modern digital steganography (pp. 191-210). IGI Global. https://doi.org/10.4018/978-1-7998-7160-6.ch009
  • Setiadi, D. R., Rustad, S., Andono, P. N., & Shidik, G. F. (2023). Digital image steganography survey and investigation (goal, assessment, method, development, and dataset). Signal Processing, 206, 108908. https://doi.org/10.1016/j.sigpro.2022.108908
  • Sharda, S., & Budhiraja, S. (2013). Image steganography: A review. International Journal of Emerging Technology and Advanced Engineering (IJETAE), 3(1), 707-710.
  • Strelkoff, S. (2021). Underwater communications with acoustic steganography: Recovery analysis and modeling. (Doctoral dissertation), Monterey, CA; Naval Postgraduate School.
  • Subhedar, M. S., & Mankar, V. H. (2014). Current status and key issues in image steganography: A survey. Computer Science Review, 13-14, 95-113. https://doi.org/10.1016/j.cosrev.2014.09.001
  • Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image steganography: A review of the recent advances. IEEE Access, 9, 23409-23423. https://doi.org/10.1109/ACCESS.2021.3053998
  • Tao, J., Li, S., Zhang, X., & Wang, Z. (2018). Towards robust image steganography. IEEE Transactions on Circuits and Systems for Video Technology, 29(2), 594-600. https://doi.org/10.1109/TCSVT.2018.2881118
  • Wang, W., & Li, Q. (2022). An image steganography algorithm based on PSO and IWT for underwater acoustic communication. IEEE Access, 10, 107376-107385. https://doi.org/10.1109/ACCESS.2022.3212691
  • Wani, M. A., & Sultan, B. (2023). Deep learning based image steganography: A review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 13(3), e1481. https://doi.org/10.1002/widm.1481
  • Yin, J. H. J., Fen, G. M., Mughal, F., & Iranmanesh, V. (2015, December). Internet of Things: Securing data using image steganography. 2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), 310-314. IEEE. https://doi.org/10.1109/AIMS.2015.56
  • Yu, J., Zhang, X., Xu, Y., & Zhang, J. (2024). Cross: Diffusion model makes controllable, robust and secure image steganography. Advances in Neural Information Processing Systems (NeurIPS) 36.

Using the Sound of Scrambled Images for Innovative IoT Underwater Data Transmission

Year 2025, Volume: 30 Issue: 1, 113 - 128, 29.04.2025
https://doi.org/10.53433/yyufbed.1623589

Abstract

The development of a hybrid approach for underwater IoT communication involves the integration of chaotic map algorithms with acoustic wave technology to ensure efficient transmission of data through the water. The Arnold Cat Map algorithm is a chaotic image scrambling technique that rearranges the pixels of an image through a mathematical transformation, creating a seemingly random pattern. A particularly intriguing application is the use of complex steganography, which is traditionally employed for image scrambling, to generate sound files for underwater communication. In this novel approach, the algorithm first scrambles an image, converting it into a sophisticated sound file. This sound file, which consists of a series of acoustic waves, is transmitted through the water, where sound waves are the primary communication medium due to their superior ability to travel underwater. Upon receipt, the sound waves are transformed back into their image form using an inverse transformation. By reversing the Arnold’s cat map algorithm, the scrambled image is decoded, revealing the original message. This hybrid strategy leverages the power of acoustic waves in underwater communication and the encryption capabilities of image processing algorithms, providing a secure and efficient communication method. It addresses issues such as signal attenuation and noise interference, making it a promising solution for complex underwater IoT systems that require high security and reliability. The combination of image scrambling and acoustic wave transmission creates a sophisticated communication system capable of handling complex maritime IoT applications, thus enhancing the underwater communications.

References

  • Alhaddad, M. J., Alkinani, M. H., Atoum, M. S., & Alarood, A. A. (2020). Evolutionary detection accuracy of secret data in audio steganography for securing 5G-enabled internet of things. Symmetry, 12(12), 2071. https://doi.org/10.3390/sym12122071
  • Altaay, A. A. J., Sahib, S. B., & Zamani, M. (2012, November). An introduction to image steganography techniques. 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 122-126. IEEE. https://doi.org/10.1109/ACSAT.2012.25
  • Amjath, M. I. M., & Senthooran, V. (2020, December). Secure communication using steganography in IoT environment. 2020 2nd International Conference on Advancements in Computing (ICAC), 114-119. IEEE. https://doi.org/10.1109/ICAC51239.2020.9357260
  • Bachrach, M., & Shih, F. Y. (2012). Survey of image steganography and steganalysis.In Multimedia Security: Watermarking, Steganography, and Forensics (pp. 201-214). CRC Press.
  • Bairagi, A. K., Khondoker, R., & Islam, R. (2016). An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures. Information Security Journal: A Global Perspective, 25(4-6), 197-212. https://doi.org/10.1080/19393555.2016.1206640
  • Das, R., & Das, I. (2016, September). Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques. 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 296-301. IEEE. https://doi.org/10.1109/ICRCICN.2016.7813674
  • Djebbar, F. (2021). Securing IoT data using steganography: A practical implementation approach. Electronics, 10(21), 2707. https://doi.org/10.3390/electronics10212707
  • Fabbri, C., Islam, M. J., & Sattar, J. (2018, May). Enhancing underwater imagery using generative adversarial networks. 2018 IEEE International Conference on Robotics and Automation (ICRA), 7159-7165. IEEE. https://doi.org/10.1109/ICRA.2018.8460552
  • Ghoul, S., Sulaiman, R., & Shukur, Z. (2023). A review on security techniques in image steganography. International Journal of Advanced Computer Science and Applications, 14(6). https://dx.doi.org/10.14569/IJACSA.2023.0140640
  • Goel, S., Rana, A., & Kaur, M. (2013). A review of comparison techniques of image steganography. Global Journal of Computer Science and Technology, 13(4), 9-14.
  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187.
  • Hassaballah, M., Hameed, M. A., Awad, A. I., & Muhammad, K. (2021). A novel image steganography method for industrial internet of things security. IEEE Transactions on Industrial Informatics, 17(11), 7743-7751. https://doi.org/10.1109/TII.2021.3053595
  • Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques. International Journal of Advanced Science and Technology, 54, 113-124.
  • Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46-66. https://doi.org/10.1016/j.image.2018.03.012
  • Islam, M. J., Xia, Y., & Sattar, J. (2020). Fast underwater image enhancement for improved visual perception. IEEE Robotics and Automation Letters, 5(2), 3227-3234. https://doi.org/10.1109/LRA.2020.2974710
  • Jia-jia, J., Xian-quan, W., Fa-jie, D., Xiao, F., Han, Y., & Bo, H. (2018). Bio-inspired steganography for secure underwater acoustic communications. IEEE Communications Magazine, 56(10), 156-162. https://doi.org/10.1109/MCOM.2018.1601228
  • Kaur, S., Singh, S., Kaur, M., & Lee, H. N. (2022). A systematic review of computational image steganography approaches. Archives of Computational Methods in Engineering, 29(7), 4775-4797. https://doi.org/10.1007/s11831-022-09749-0
  • Khan, H. A., Abdulla, R., Selvaperumal, S. K., & Bathich, A. (2021). IoT based on secure personal healthcare using RFID technology and steganography. International Journal of Electrical and Computer Engineering, 11(4), 3300. http://doi.org/10.11591/ijece.v11i4.pp3300-3309
  • Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2020). Securing data in Internet of Things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73-80. https://doi.org/10.1109/TSMC.2019.2903785
  • Koptyra, K., & Ogiela, M. R. (2023). Steganography in IoT: Information hiding with joystick and touch sensors. Sensors, 23(6), 3288. https://doi.org/10.3390/s23063288
  • Kumar, A., Rani, R., & Singh, S. (2023). A survey of recent advances in image steganography. Security and Privacy, 6(3), e281. https://doi.org/10.1002/spy2.281
  • Mandal, P. C., Mukherjee, I., Paul, G., & Chatterji, B. N. (2022). Digital image steganography: A literature survey. Information Sciences, 609, 1451-1488. https://doi.org/10.1016/j.ins.2022.07.120
  • Mileva, A. (2018, August). Steganography in the world of IoT. IoT-SECFOR 2018, International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany.
  • Mishra, R., & Bhanodiya, P. (2015, March). A review on steganography and cryptography. 2015 International Conference on Advances in Computer Engineering and Applications, 119-122. IEEE. https://doi.org/10.1109/ICACEA.2015.7164679
  • Mustafa, G., Ashraf, R., Mirza, M. A., Jamil, A., & Muhammad. (2018, June). A review of data security and cryptographic techniques in IoT based devices. Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 1-9. https://doi.org/10.1145/3231053.3231100
  • Pradhan, A., Sahu, A. K., Swain, G., & Sekhar, K. R. (2016, May). Performance evaluation parameters of image steganography techniques. 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), 1-8. IEEE. https://doi.org/10.1109/RAINS.2016.7764399
  • Qin, J., Luo, Y., Xiang, X., Tan, Y., & Huang, H. (2019). Coverless image steganography: a survey. IEEE Access, 7, 171372-171394. https://doi.org/10.1109/ACCESS.2019.2955452
  • Ray, A. M., Sarkar, A., Obaid, A. J., & Pandiaraj, S. (2021). IoT security using steganography. In Multidisciplinary approach to modern digital steganography (pp. 191-210). IGI Global. https://doi.org/10.4018/978-1-7998-7160-6.ch009
  • Setiadi, D. R., Rustad, S., Andono, P. N., & Shidik, G. F. (2023). Digital image steganography survey and investigation (goal, assessment, method, development, and dataset). Signal Processing, 206, 108908. https://doi.org/10.1016/j.sigpro.2022.108908
  • Sharda, S., & Budhiraja, S. (2013). Image steganography: A review. International Journal of Emerging Technology and Advanced Engineering (IJETAE), 3(1), 707-710.
  • Strelkoff, S. (2021). Underwater communications with acoustic steganography: Recovery analysis and modeling. (Doctoral dissertation), Monterey, CA; Naval Postgraduate School.
  • Subhedar, M. S., & Mankar, V. H. (2014). Current status and key issues in image steganography: A survey. Computer Science Review, 13-14, 95-113. https://doi.org/10.1016/j.cosrev.2014.09.001
  • Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image steganography: A review of the recent advances. IEEE Access, 9, 23409-23423. https://doi.org/10.1109/ACCESS.2021.3053998
  • Tao, J., Li, S., Zhang, X., & Wang, Z. (2018). Towards robust image steganography. IEEE Transactions on Circuits and Systems for Video Technology, 29(2), 594-600. https://doi.org/10.1109/TCSVT.2018.2881118
  • Wang, W., & Li, Q. (2022). An image steganography algorithm based on PSO and IWT for underwater acoustic communication. IEEE Access, 10, 107376-107385. https://doi.org/10.1109/ACCESS.2022.3212691
  • Wani, M. A., & Sultan, B. (2023). Deep learning based image steganography: A review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 13(3), e1481. https://doi.org/10.1002/widm.1481
  • Yin, J. H. J., Fen, G. M., Mughal, F., & Iranmanesh, V. (2015, December). Internet of Things: Securing data using image steganography. 2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), 310-314. IEEE. https://doi.org/10.1109/AIMS.2015.56
  • Yu, J., Zhang, X., Xu, Y., & Zhang, J. (2024). Cross: Diffusion model makes controllable, robust and secure image steganography. Advances in Neural Information Processing Systems (NeurIPS) 36.
There are 38 citations in total.

Details

Primary Language English
Subjects Information Security Management, Cryptography, Data Communications
Journal Section Engineering and Architecture / Mühendislik ve Mimarlık
Authors

İsmail Burak Parlak 0000-0002-0887-4226

Publication Date April 29, 2025
Submission Date January 20, 2025
Acceptance Date April 2, 2025
Published in Issue Year 2025 Volume: 30 Issue: 1

Cite

APA Parlak, İ. B. (2025). Using the Sound of Scrambled Images for Innovative IoT Underwater Data Transmission. Yüzüncü Yıl Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 30(1), 113-128. https://doi.org/10.53433/yyufbed.1623589