Skip to main content
Top
Published in: Neural Computing and Applications 1/2015

01-01-2015 | Original Article

Artificial neural network for steganography

Authors: Sabah Husien, Haitham Badi

Published in: Neural Computing and Applications | Issue 1/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The digital information revolution has brought about changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. The strength of the information hiding science is due to the nonexistence of standard algorithms to be used in hiding secret message. Also, there is randomness in hiding method such as combining several media (covers) with different methods to pass secret message. Information hiding represents a class of process used to embed data into various forms of media such as image, audio, or text. The proposed text in image cryptography and steganography system (TICSS) is an approach used to embed text into gray image (BMP). TICSS is easily applied by any end user.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Johnson NF, Duric ZJ (2001) Information hiding steganography and watermarking attack and countermeasure. Kluwer Academic Publishers, Norwell, MA Johnson NF, Duric ZJ (2001) Information hiding steganography and watermarking attack and countermeasure. Kluwer Academic Publishers, Norwell, MA
3.
go back to reference Hasan H, Abdul Kareem S (2012) Static hand gesture recognition using neural networks. Artif Intell Rev Hasan H, Abdul Kareem S (2012) Static hand gesture recognition using neural networks. Artif Intell Rev
4.
go back to reference Hasan H, Abdul Kareem S (2013) Fingerprint image enhancement and recognition algorithms: a survey. Neural Comput Appl 23:606–1608CrossRef Hasan H, Abdul Kareem S (2013) Fingerprint image enhancement and recognition algorithms: a survey. Neural Comput Appl 23:606–1608CrossRef
6.
9.
go back to reference Symonidis K (2000) Hand gesture recognition using neural networks. Master thesis, School of electronic and electrical engineering Symonidis K (2000) Hand gesture recognition using neural networks. Master thesis, School of electronic and electrical engineering
10.
go back to reference Haykin S (1994) Neural networks a comprehensive foundation. Macmillan College Publishing Company, New YorkMATH Haykin S (1994) Neural networks a comprehensive foundation. Macmillan College Publishing Company, New YorkMATH
11.
go back to reference Moghadassi A, Parvizian F, Hosseini S (2009) A new approach based on artificial neural networks for prediction of high pressure vapor-liquid equilibrium. Aust J Basic Appl Sci 3(3):1851–1862 Moghadassi A, Parvizian F, Hosseini S (2009) A new approach based on artificial neural networks for prediction of high pressure vapor-liquid equilibrium. Aust J Basic Appl Sci 3(3):1851–1862
12.
go back to reference Din A (2002) Optimization and forecasting with financial time series. Paper presented at the note from seminar at CERN Din A (2002) Optimization and forecasting with financial time series. Paper presented at the note from seminar at CERN
13.
go back to reference Dorothy E, Denning R (1983) Cryptography and data security. Addison Wesley Publishing Company Inc., Boston, MA Dorothy E, Denning R (1983) Cryptography and data security. Addison Wesley Publishing Company Inc., Boston, MA
14.
go back to reference Lane V (1988) Security of computer based information system. Macmillan Education LTD, New York, NY Lane V (1988) Security of computer based information system. Macmillan Education LTD, New York, NY
15.
go back to reference Johnson (2001) Information hiding steganography and watermarking attack and countermeasures. Kluwer Academic Publishers Johnson (2001) Information hiding steganography and watermarking attack and countermeasures. Kluwer Academic Publishers
16.
go back to reference Benjamin B, Santiago G, Victor B (2001) Steganographic watermarking for documents. In: Proceeding on the 34th Hawaii international conference on system science Benjamin B, Santiago G, Victor B (2001) Steganographic watermarking for documents. In: Proceeding on the 34th Hawaii international conference on system science
17.
go back to reference Craver S (1998) On public-key steganography in the presence of an active warden information hiding, second international workshop proceeding, vol 1525, pp 355–368 Craver S (1998) On public-key steganography in the presence of an active warden information hiding, second international workshop proceeding, vol 1525, pp 355–368
18.
go back to reference Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and grayscale image, magazine of IEEE multimedia special issue on security, October–November issue, pp 22–28 Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and grayscale image, magazine of IEEE multimedia special issue on security, October–November issue, pp 22–28
19.
go back to reference Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of the ACM, special session on multimedia security and watermarking. Ottawa, Canada, pp 27–30 Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of the ACM, special session on multimedia security and watermarking. Ottawa, Canada, pp 27–30
20.
go back to reference Uruba I (2001) Hiding text in image. M.Sc. Thesis, University of technology, Computer Science Department Uruba I (2001) Hiding text in image. M.Sc. Thesis, University of technology, Computer Science Department
21.
go back to reference Mohammed S (2001) Text file hiding techniques with implementation. M.Sc. Thesis, National Computer Center Mohammed S (2001) Text file hiding techniques with implementation. M.Sc. Thesis, National Computer Center
22.
go back to reference Al-hamami M (2002) Information hiding attack in Image. M.Sc.thesis, Iraqi commission for computer and informatics, Informatics Institute for Postgraduate Studies Al-hamami M (2002) Information hiding attack in Image. M.Sc.thesis, Iraqi commission for computer and informatics, Informatics Institute for Postgraduate Studies
23.
go back to reference Petitcolas, Fabien A, Ross J (1998) Attack on copyright marking systems information hiding, second international workshop proceeding, vol 1525, pp 218–238 Petitcolas, Fabien A, Ross J (1998) Attack on copyright marking systems information hiding, second international workshop proceeding, vol 1525, pp 218–238
24.
go back to reference Thomas B (2008) Quantitative security of block ciphers designs and cryptanalysis tools. PhD Ecole Polytechnique Federale De Lausame, Suisse Thomas B (2008) Quantitative security of block ciphers designs and cryptanalysis tools. PhD Ecole Polytechnique Federale De Lausame, Suisse
25.
go back to reference Zehnran J, Yanhong Z (2006) Using gene neural network to D target identification. J Integr Bioinform 1(2):26–28 Zehnran J, Yanhong Z (2006) Using gene neural network to D target identification. J Integr Bioinform 1(2):26–28
26.
27.
go back to reference Whitefield D, Martin H (1979) Privacy and authentication an introduction to cryptography. Comput J IEEE 67(3):397–427 Whitefield D, Martin H (1979) Privacy and authentication an introduction to cryptography. Comput J IEEE 67(3):397–427
28.
go back to reference Khaled A, Waiel F, Mohamed A, Alaa A (2010) Attack and construction of simulator for some of cipher system using neuro-identifier. Int Arab J Inf Technol 7(4):365–372 Khaled A, Waiel F, Mohamed A, Alaa A (2010) Attack and construction of simulator for some of cipher system using neuro-identifier. Int Arab J Inf Technol 7(4):365–372
29.
go back to reference Tanomaru J (2002) Comparative study of two neuro network approaches for nonlinear identification. In: Proceeding of international symposium on speech image processing and neural networks. Hong Kong, pp 487–490 Tanomaru J (2002) Comparative study of two neuro network approaches for nonlinear identification. In: Proceeding of international symposium on speech image processing and neural networks. Hong Kong, pp 487–490
30.
go back to reference Josef P, Jennifer S (1988) Cryptography an introduction to computer security. Prentice Hall, Upper Saddle River Josef P, Jennifer S (1988) Cryptography an introduction to computer security. Prentice Hall, Upper Saddle River
31.
go back to reference Zabikowski R, Dzielinski A (1995) Neural approximation a control perspective. In: Proceeding of neural network engineering and dynamic control systems, advances in industrial control. Berlin, pp 1–25 Zabikowski R, Dzielinski A (1995) Neural approximation a control perspective. In: Proceeding of neural network engineering and dynamic control systems, advances in industrial control. Berlin, pp 1–25
32.
go back to reference Ruppel RA (1992) Security models and notions for stream cipher, cryptography and coding II. Mitchell press, Burnaby, BC Ruppel RA (1992) Security models and notions for stream cipher, cryptography and coding II. Mitchell press, Burnaby, BC
33.
go back to reference Ruppel RA (1992) Stream ciphers contemporary cryptology, the science of information integrity, Simmons, j. IEEE Press Ruppel RA (1992) Stream ciphers contemporary cryptology, the science of information integrity, Simmons, j. IEEE Press
Metadata
Title
Artificial neural network for steganography
Authors
Sabah Husien
Haitham Badi
Publication date
01-01-2015
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 1/2015
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-014-1702-1

Other articles of this Issue 1/2015

Neural Computing and Applications 1/2015 Go to the issue

Premium Partner