Neural Network Approach to Image Steganography Techniques

Steganography is one of the methods used for the hidden exchange of information and it can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. In this way, if successfully it is achieved, the message does not attract attention from eavesdroppers and attackers. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images, audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier. The proposed approach is based on backpropagation neural networks. The essential part of this article aims to verify the proposed approach in an experimental study. Further, contemporary method of application and results are presented in this paper as an example.

[1]  P. R. Deshmukh,et al.  Hash Based Least Significant Bit Technique For Video Steganography , 2014 .

[2]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[3]  Yao Hongxun,et al.  Neural network based steganalysis in still images , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[4]  Roman Senkerik,et al.  Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.

[5]  Ajaz Hussain Mir,et al.  Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..

[6]  James C. Schatzman,et al.  Accuracy of the Discrete Fourier Transform and the Fast Fourier Transform , 1996, SIAM J. Sci. Comput..

[7]  B. Geetha vani,et al.  SCALABLE AND HIGHLY SECURED IMAGE STEGANOGRAPHY BASED ON HOPFIELD CHAOTIC NEURAL NETWORK AND WAVELET TRANSFORMS , 2013 .

[8]  Shaohui Liu,et al.  Steganalysis based on wavelet texture analysis and neural network , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[9]  Mohammad Saniee Abadeh,et al.  A Survey of Data Mining Techniques for Steganalysis , 2012 .