Artificial neural network for steganography

被引:0
|
作者
Sabah Husien
Haitham Badi
机构
[1] Al Yarmouk University College,
[2] University of Malaya,undefined
来源
Neural Computing and Applications | 2015年 / 26卷
关键词
Human–computer interaction; Artificial neural network ; System identification; Neuro-identifier; Cryptanalysis;
D O I
暂无
中图分类号
学科分类号
摘要
The digital information revolution has brought about changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. The strength of the information hiding science is due to the nonexistence of standard algorithms to be used in hiding secret message. Also, there is randomness in hiding method such as combining several media (covers) with different methods to pass secret message. Information hiding represents a class of process used to embed data into various forms of media such as image, audio, or text. The proposed text in image cryptography and steganography system (TICSS) is an approach used to embed text into gray image (BMP). TICSS is easily applied by any end user.
引用
收藏
页码:111 / 116
页数:5
相关论文
共 50 条
  • [31] High-accuracy image steganography with invertible neural network and generative adversarial network
    Wang, Ke
    Zhu, Yani
    Chang, Qi
    Wang, Junyu
    Yao, Ye
    SIGNAL PROCESSING, 2025, 234
  • [32] Artificial neural network and convolutional neural network for prediction of dental caries
    Basri, Katrul Nadia
    Yazid, Farinawati
    Zain, Mohd Norzaliman Mohd
    Yusof, Zalhan Md
    Rani, Rozina Abdul
    Zoolfakar, Ahmad Sabirin
    SPECTROCHIMICA ACTA PART A-MOLECULAR AND BIOMOLECULAR SPECTROSCOPY, 2024, 312
  • [33] Conversion of Artificial Neural Network to Spiking Neural Network for Hardware Implementation
    Chen, Yi-Lun
    Lu, Chih-Cheng
    Juang, Kai-Cheung
    Tang, Kea-Tiong
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,
  • [34] Optimized support vector neural network and contourlet transform for image steganography
    V. K. Reshma
    R. S. Vinod Kumar
    D. Shahi
    M. B. Shyjith
    Evolutionary Intelligence, 2022, 15 : 1295 - 1311
  • [35] Genetic algorithms and artificial neural network (II) Training artificial neural network by EGA-GDR
    Chen, Fangze
    Chen, Bingzhen
    He, Xiaorong
    Huagong Xuebao/Journal of Chemical Industry and Engineering (China), 1996, 47 (04): : 421 - 426
  • [36] EFFICIENT U-SHAPE INVERTIBLE NEURAL NETWORK FOR IMAGE STEGANOGRAPHY
    Zhang, Le
    Li, Tong
    Lu, Yao
    Hou, Mixiao
    Lu, Guangming
    2024 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME 2024, 2024,
  • [37] A Novel Edge Based Chaotic Steganography Method Using Neural Network
    Alam, Shahzad
    Ahmad, Tanvir
    Doja, M. N.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 : 467 - 475
  • [38] Optimized support vector neural network and contourlet transform for image steganography
    Reshma, V. K.
    Kumar, R. S. Vinod
    Shahi, D.
    Shyjith, M. B.
    EVOLUTIONARY INTELLIGENCE, 2022, 15 (02) : 1295 - 1311
  • [39] SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network
    Duan, Xintao
    Liu, Nao
    Gou, Mengxiao
    Wang, Wenxin
    Qin, Chuan
    ENTROPY, 2020, 22 (10) : 1 - 15
  • [40] STEGANOGRAPHY APPROACH TO IMAGE AUTHENTICATION USING PULSE COUPLED NEURAL NETWORK
    Forgac, Radoslav
    Ockay, Milos
    Javurek, Martin
    Badidova, Bianca
    COMPUTING AND INFORMATICS, 2023, 42 (03) : 591 - 614