Artificial neural network for steganography

Abstract The digital information revolution has brought about changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. The strength of the information hiding science is due to the nonexistence of standard algorithms to be used in hiding secret message. Also, there is randomness in hiding method such as combining several media (covers) with different methods to pass secret message. Information hiding represents a class of process used to embed data into various forms of media such as image, audio, or text. The proposed text in image cryptography and steganography system (TICSS) is an approach used to embed text into gray image (BMP). TICSS is easily applied by any end user.

[1]  S. Abdul-Kareem,et al.  RETRACTED ARTICLE: Static hand gesture recognition using neural networks , 2014, Artificial Intelligence Review.

[2]  Alaa H. Alhamami,et al.  Attack and construction of simulator for some cipher systems using neuro-Identifier , 2010, Int. Arab J. Inf. Technol..

[3]  Sameem Abdul Kareem,et al.  Gesture Feature Extraction for Static Gesture Recognition , 2013 .

[4]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[5]  M.E. Hellman,et al.  Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.

[6]  Abdolreza Moghadassi,et al.  A New Approach Based on Artificial Neural Networks for Prediction of High Pressure Vapor-liquid Equilibrium , 2009 .

[7]  Andrzej Dzielinski,et al.  Neural Approximation: A Control Perspective , 1995 .

[8]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[9]  J. Tanomaru,et al.  Comparative study of two neural network approaches for nonlinear identification , 1994, Proceedings of ICSIPNN '94. International Conference on Speech, Image Processing and Neural Networks.

[10]  G.R.S. Murthy,et al.  Hand gesture recognition using neural networks , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[11]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[12]  Sameem Abdul Kareem,et al.  RETRACTED ARTICLE: Feature extraction and ML techniques for static gesture recognition , 2013, Neural Computing and Applications.

[13]  Haitham Hasan,et al.  RETRACTED ARTICLE: Human–computer interaction using vision-based hand gesture recognition systems: a survey , 2013, Neural Computing and Applications.

[14]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[15]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[16]  Alfred Menezes,et al.  Contemporary cryptology—The science of information integrity , 1994 .

[17]  Thomas Baignères,et al.  Quantitative security of block ciphers - designs and cryptanalysis tools , 2008 .

[18]  Haitham Sabah Badi,et al.  Hand posture and gesture recognition technology , 2014, Neural Computing and Applications.

[19]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[20]  Jennifer Seberry,et al.  Cryptography - an introduction to computer security , 1991, Advances in computer science series.

[21]  Sameem Abdul Kareem,et al.  Fingerprint image enhancement and recognition algorithms: a survey , 2012, Neural Computing and Applications.

[22]  Benjamín Barán,et al.  Steganographic watermarking for documents , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[23]  S. Abdul-Kareem,et al.  Static hand gesture recognition using neural networks , 2012 .

[24]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[25]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[26]  V. P. Lane Security of computer based information systems , 1985 .

[27]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[28]  D. Signorini,et al.  Neural networks , 1995, The Lancet.