Nothing Special   »   [go: up one dir, main page]

Skip to main content

Neural Based Steganography

  • Conference paper
PRICAI 2004: Trends in Artificial Intelligence (PRICAI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3157))

Included in the following conference series:

Abstract

Steganography is the art of hiding messages inside a multimedia block. Data hiding can be done in different medias like text, images, and audio signals. It is very difficult for the hackers to find whether the media has any valid data or not. The goal of this research is to indirectly hide the data into a graphical image using a neural algorithm, as it adds additional complexity for the hackers. Our approach hides indirectly the secured binary bits along with some selected graphical image bits, based on the neural network algorithm, to get cipher bits. The generated cipher bits are then placed in least significant bit (LSB) position of the transmitted graphical image. In reverse process, this method regenerates the original data bits. The neural model used here is the multi-layer feed forward network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Peticolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding – A Survey. Proc. IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  2. Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. Computer 31(2), 26–34 (1998)

    Article  Google Scholar 

  3. Anderson, R.J., Peticolas, F.A.P.: On the Limits of Steganography. Journal of Selected Areas in Comm. 16(4), 474–481 (1998)

    Article  Google Scholar 

  4. Cachin, C.: An Information – Theoretic Model for Steganography, Cryptology ePrint Archive, Report 2000/028 (2002)

    Google Scholar 

  5. Westfeld, A.: F5 – A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In: Proc. 4th Int’l Work-shop Information Hiding, pp. 289–302. Springer, Heidelberg (2001)

    Google Scholar 

  6. Beale, R., Jackson, T.: Neural Computing: An Introduction. Adam Hilger (1990)

    Google Scholar 

  7. Pao, Y.H.: Adaptive pattern recognition and neural networks. Addison-Wesley, Reading (1989)

    MATH  Google Scholar 

  8. Rajasekaran, S., Vijayalakshmi Pai, G.A.: Neural Networks, Fuzzy Logic, and Genetic Algorithms Synthesis and Applications. Prentice - Hall of India Private Limited, New Delhi (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kavitha, V., Easwarakumar, K.S. (2004). Neural Based Steganography. In: Zhang, C., W. Guesgen, H., Yeap, WK. (eds) PRICAI 2004: Trends in Artificial Intelligence. PRICAI 2004. Lecture Notes in Computer Science(), vol 3157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28633-2_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-28633-2_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22817-2

  • Online ISBN: 978-3-540-28633-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics