Skip to main content

Advertisement

Log in

Artificial neural network for steganography

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

The digital information revolution has brought about changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. The strength of the information hiding science is due to the nonexistence of standard algorithms to be used in hiding secret message. Also, there is randomness in hiding method such as combining several media (covers) with different methods to pass secret message. Information hiding represents a class of process used to embed data into various forms of media such as image, audio, or text. The proposed text in image cryptography and steganography system (TICSS) is an approach used to embed text into gray image (BMP). TICSS is easily applied by any end user.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Johnson NF, Duric ZJ (2001) Information hiding steganography and watermarking attack and countermeasure. Kluwer Academic Publishers, Norwell, MA

  2. Stergiou C, Siganos D (1996) Neural networks. http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/cs11/report.html. Retrieved Mar 2008

  3. Hasan H, Abdul Kareem S (2012) Static hand gesture recognition using neural networks. Artif Intell Rev

    Google Scholar 

  4. Hasan H, Abdul Kareem S (2013) Fingerprint image enhancement and recognition algorithms: a survey. Neural Comput Appl 23:606–1608

    Article  Google Scholar 

  5. Hasan H, Abdul Kareem S (2012) Static hand gesture recognition using neural networks. Artif Intell Rev. doi:10.1007/s10462-011-9303-1

  6. Hasan H, Abdul Kareem S (2013) Human–computer interaction using vision based hand gesture recognition systems:a survey. Neural Comput Appl. doi:10.1007/s00521013-1481-0

  7. Sabah H, Hussien H (2014) Hand posture and gesture recognition technology. Neural Comput Appl. doi:10.1007/s00521-014-1574-4

  8. Badi H, Hussien S, Abdul Kareem S (2014) Feature extraction and ML techniques for static gesture recognition. Neural Comput Appl. doi:10.1007/s00521-013-1540-6

  9. Symonidis K (2000) Hand gesture recognition using neural networks. Master thesis, School of electronic and electrical engineering

  10. Haykin S (1994) Neural networks a comprehensive foundation. Macmillan College Publishing Company, New York

    MATH  Google Scholar 

  11. Moghadassi A, Parvizian F, Hosseini S (2009) A new approach based on artificial neural networks for prediction of high pressure vapor-liquid equilibrium. Aust J Basic Appl Sci 3(3):1851–1862

    Google Scholar 

  12. Din A (2002) Optimization and forecasting with financial time series. Paper presented at the note from seminar at CERN

  13. Dorothy E, Denning R (1983) Cryptography and data security. Addison Wesley Publishing Company Inc., Boston, MA

  14. Lane V (1988) Security of computer based information system. Macmillan Education LTD, New York, NY

  15. Johnson (2001) Information hiding steganography and watermarking attack and countermeasures. Kluwer Academic Publishers

  16. Benjamin B, Santiago G, Victor B (2001) Steganographic watermarking for documents. In: Proceeding on the 34th Hawaii international conference on system science

  17. Craver S (1998) On public-key steganography in the presence of an active warden information hiding, second international workshop proceeding, vol 1525, pp 355–368

  18. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and grayscale image, magazine of IEEE multimedia special issue on security, October–November issue, pp 22–28

  19. Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of the ACM, special session on multimedia security and watermarking. Ottawa, Canada, pp 27–30

  20. Uruba I (2001) Hiding text in image. M.Sc. Thesis, University of technology, Computer Science Department

  21. Mohammed S (2001) Text file hiding techniques with implementation. M.Sc. Thesis, National Computer Center

  22. Al-hamami M (2002) Information hiding attack in Image. M.Sc.thesis, Iraqi commission for computer and informatics, Informatics Institute for Postgraduate Studies

  23. Petitcolas, Fabien A, Ross J (1998) Attack on copyright marking systems information hiding, second international workshop proceeding, vol 1525, pp 218–238

  24. Thomas B (2008) Quantitative security of block ciphers designs and cryptanalysis tools. PhD Ecole Polytechnique Federale De Lausame, Suisse

  25. Zehnran J, Yanhong Z (2006) Using gene neural network to D target identification. J Integr Bioinform 1(2):26–28

    Google Scholar 

  26. Sarle S (1999) Artificial neural networks and their biological motivation internet explorer. Artif Intell Worlf Wide Navig. http://www.csa.ru

  27. Whitefield D, Martin H (1979) Privacy and authentication an introduction to cryptography. Comput J IEEE 67(3):397–427

    Google Scholar 

  28. Khaled A, Waiel F, Mohamed A, Alaa A (2010) Attack and construction of simulator for some of cipher system using neuro-identifier. Int Arab J Inf Technol 7(4):365–372

    Google Scholar 

  29. Tanomaru J (2002) Comparative study of two neuro network approaches for nonlinear identification. In: Proceeding of international symposium on speech image processing and neural networks. Hong Kong, pp 487–490

    Google Scholar 

  30. Josef P, Jennifer S (1988) Cryptography an introduction to computer security. Prentice Hall, Upper Saddle River

    Google Scholar 

  31. Zabikowski R, Dzielinski A (1995) Neural approximation a control perspective. In: Proceeding of neural network engineering and dynamic control systems, advances in industrial control. Berlin, pp 1–25

  32. Ruppel RA (1992) Security models and notions for stream cipher, cryptography and coding II. Mitchell press, Burnaby, BC

  33. Ruppel RA (1992) Stream ciphers contemporary cryptology, the science of information integrity, Simmons, j. IEEE Press

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sabah Husien.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Husien, S., Badi, H. Artificial neural network for steganography. Neural Comput & Applic 26, 111–116 (2015). https://doi.org/10.1007/s00521-014-1702-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-014-1702-1

Keywords

Navigation