A Secure Image Steganography Method Based on Neural Network
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 6
Abstract
Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover the data. Before hiding the data in an image the application first encrypts it. The proposed method of steganography in this work encodes the secret message in least significant bits of the original image using DWT method, where the pixels values of the encrypted image are modified by the genetic algorithm (GA) and neural network (NN) to retain their statistic characters, thereby making the detection of secret of message difficult. The whole implementation is done in MATLAB using MSE, Time and PSNR parameters.
Authors and Affiliations
Jasmeen Kaur Pandher , Kamalpreet kaur
SPY BOT:A BOOM FOR CAMOUFLAGING
The objective behind making this project deals out with satisfying various functional needs such as secretly spying or keeping surveillance over a desired target location. We also aim to achieve a few more additional com...
Design of Web Access Interface Design for People with Neuromotor Disorders
A major part of Indian population suffers from different types of motor disorders. A majority of this people has cerebral palsy. People suffering from cerebral palsy have great difficulties for communication. Augmentativ...
CLASSIFICATION TECHNIQUES APPLIED FOR INTRUSION DETECTION
Intrusion detection system (IDS) was designed to monitor the network activity and it identifies the normal and abnormal behavioral pattern in the network. If there was any abnormal pattern, it indicates the system is in...
Malicious Code Detection through Data Mining Techniques
Nowadays computer systems and communication infrastructures are likely to be influenced by different types of attacks so there is need to put further efforts for improving the software trust. Therefore, there will be inc...
A Review of Cyber Security Techniques for Critical Infrastructure Protection
Security is the most important aspect of any infrastructure. Infrastructure may be of private organization or government organization and the economy of the nation depends on this infrastructure. A no. of approaches have...