Abstract
The digital information revolution has brought about changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. The strength of the information hiding science is due to the nonexistence of standard algorithms to be used in hiding secret message. Also, there is randomness in hiding method such as combining several media (covers) with different methods to pass secret message. Information hiding represents a class of process used to embed data into various forms of media such as image, audio, or text. The proposed text in image cryptography and steganography system (TICSS) is an approach used to embed text into gray image (BMP). TICSS is easily applied by any end user.
Similar content being viewed by others
References
Johnson NF, Duric ZJ (2001) Information hiding steganography and watermarking attack and countermeasure. Kluwer Academic Publishers, Norwell, MA
Stergiou C, Siganos D (1996) Neural networks. http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/cs11/report.html. Retrieved Mar 2008
Hasan H, Abdul Kareem S (2012) Static hand gesture recognition using neural networks. Artif Intell Rev
Hasan H, Abdul Kareem S (2013) Fingerprint image enhancement and recognition algorithms: a survey. Neural Comput Appl 23:606–1608
Hasan H, Abdul Kareem S (2012) Static hand gesture recognition using neural networks. Artif Intell Rev. doi:10.1007/s10462-011-9303-1
Hasan H, Abdul Kareem S (2013) Human–computer interaction using vision based hand gesture recognition systems:a survey. Neural Comput Appl. doi:10.1007/s00521013-1481-0
Sabah H, Hussien H (2014) Hand posture and gesture recognition technology. Neural Comput Appl. doi:10.1007/s00521-014-1574-4
Badi H, Hussien S, Abdul Kareem S (2014) Feature extraction and ML techniques for static gesture recognition. Neural Comput Appl. doi:10.1007/s00521-013-1540-6
Symonidis K (2000) Hand gesture recognition using neural networks. Master thesis, School of electronic and electrical engineering
Haykin S (1994) Neural networks a comprehensive foundation. Macmillan College Publishing Company, New York
Moghadassi A, Parvizian F, Hosseini S (2009) A new approach based on artificial neural networks for prediction of high pressure vapor-liquid equilibrium. Aust J Basic Appl Sci 3(3):1851–1862
Din A (2002) Optimization and forecasting with financial time series. Paper presented at the note from seminar at CERN
Dorothy E, Denning R (1983) Cryptography and data security. Addison Wesley Publishing Company Inc., Boston, MA
Lane V (1988) Security of computer based information system. Macmillan Education LTD, New York, NY
Johnson (2001) Information hiding steganography and watermarking attack and countermeasures. Kluwer Academic Publishers
Benjamin B, Santiago G, Victor B (2001) Steganographic watermarking for documents. In: Proceeding on the 34th Hawaii international conference on system science
Craver S (1998) On public-key steganography in the presence of an active warden information hiding, second international workshop proceeding, vol 1525, pp 355–368
Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and grayscale image, magazine of IEEE multimedia special issue on security, October–November issue, pp 22–28
Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of the ACM, special session on multimedia security and watermarking. Ottawa, Canada, pp 27–30
Uruba I (2001) Hiding text in image. M.Sc. Thesis, University of technology, Computer Science Department
Mohammed S (2001) Text file hiding techniques with implementation. M.Sc. Thesis, National Computer Center
Al-hamami M (2002) Information hiding attack in Image. M.Sc.thesis, Iraqi commission for computer and informatics, Informatics Institute for Postgraduate Studies
Petitcolas, Fabien A, Ross J (1998) Attack on copyright marking systems information hiding, second international workshop proceeding, vol 1525, pp 218–238
Thomas B (2008) Quantitative security of block ciphers designs and cryptanalysis tools. PhD Ecole Polytechnique Federale De Lausame, Suisse
Zehnran J, Yanhong Z (2006) Using gene neural network to D target identification. J Integr Bioinform 1(2):26–28
Sarle S (1999) Artificial neural networks and their biological motivation internet explorer. Artif Intell Worlf Wide Navig. http://www.csa.ru
Whitefield D, Martin H (1979) Privacy and authentication an introduction to cryptography. Comput J IEEE 67(3):397–427
Khaled A, Waiel F, Mohamed A, Alaa A (2010) Attack and construction of simulator for some of cipher system using neuro-identifier. Int Arab J Inf Technol 7(4):365–372
Tanomaru J (2002) Comparative study of two neuro network approaches for nonlinear identification. In: Proceeding of international symposium on speech image processing and neural networks. Hong Kong, pp 487–490
Josef P, Jennifer S (1988) Cryptography an introduction to computer security. Prentice Hall, Upper Saddle River
Zabikowski R, Dzielinski A (1995) Neural approximation a control perspective. In: Proceeding of neural network engineering and dynamic control systems, advances in industrial control. Berlin, pp 1–25
Ruppel RA (1992) Security models and notions for stream cipher, cryptography and coding II. Mitchell press, Burnaby, BC
Ruppel RA (1992) Stream ciphers contemporary cryptology, the science of information integrity, Simmons, j. IEEE Press
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Husien, S., Badi, H. Artificial neural network for steganography. Neural Comput & Applic 26, 111–116 (2015). https://doi.org/10.1007/s00521-014-1702-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-014-1702-1