Harnessing advanced techniques for image steganography: sequential and random encoding with deep learning detection
dc.contributor.author | Al Zakitat, Mustafa Ali Sahib | |
dc.contributor.author | Abdulrazzaq, Mohammed Majid | |
dc.contributor.author | Ramaha, Nehad T. A. | |
dc.contributor.author | Mukhlif, Yasir Adil | |
dc.contributor.author | Ismael, Omar Ayad | |
dc.date.accessioned | 2024-05-31T07:59:51Z | |
dc.date.available | 2024-05-31T07:59:51Z | |
dc.date.issued | 2024 | en_US |
dc.department | Enstitüler, Lisansüstü Eğitim Enstitüsü, Elektrik ve Bilgisayar Mühendisliği Ana Bilim Dalı | en_US |
dc.description | Volume Editors : GarcÃa Márquez F.P., Jamil A., Hameed A.A., Segovia RamÃrez I. | |
dc.description.abstract | This study delves into the intricacies of steganography, a method employed for concealing information within a clandestine medium to enhance data security during transmission. Given that information is often represented in various forms, such as text, audio, video, or images, steganography offers a distinctive advantage over conventional cryptography by focusing on concealing the very existence of the message, rather than merely its content. This research introduces a novel steganographic technique that places equal emphasis on both message concealment and security enhancement. This study highlights two primary steganographic methods: sequential encoding and random encoding. By employing both encryption and image compression, these techniques fortify data security while preserving the visual integrity of cover images. Advanced deep learning models, namely Vgg-16 and Vgg-19, are proposed for the detection of image steganography, with their accuracy and loss rates rigorously evaluated. The significance of steganography extends across various sectors, including the military, government, and online domains, underscoring its pivotal role in contemporary data communication and security. | en_US |
dc.identifier.citation | Al Zakitat, M. A. S., Abdulrazzaq, M. M., Ramaha, N. T. A., Mukhlif, Y. A., Ismael, O. A. (2024). Harnessing advanced techniques for image steganography: sequential and random encoding with deep learning detection. Lecture Notes in Networks and Systems, 960, 456-470. 10.1007/978-3-031-56728-5_38 | en_US |
dc.identifier.endpage | 470 | en_US |
dc.identifier.isbn | 9783031567278 | |
dc.identifier.issn | 2367-3370 | |
dc.identifier.scopus | 2-s2.0-85193627930 | |
dc.identifier.scopusquality | Q4 | |
dc.identifier.startpage | 456 | en_US |
dc.identifier.uri | https://hdl.handle.net/20.500.12939/4718 | |
dc.identifier.volume | 960 | en_US |
dc.indekslendigikaynak | Scopus | |
dc.institutionauthor | Al Zakitat, Mustafa Ali Sahib | |
dc.language.iso | en | |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.relation.ispartof | Lecture Notes in Networks and Systems | |
dc.relation.isversionof | 10.1007/978-3-031-56728-5_38 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - İdari Personel ve Öğrenci | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Artificial neural network | en_US |
dc.subject | Cryptograph | en_US |
dc.subject | Data mining | en_US |
dc.subject | Machine learning | en_US |
dc.subject | Network security | en_US |
dc.title | Harnessing advanced techniques for image steganography: sequential and random encoding with deep learning detection | |
dc.type | Conference Object |
Dosyalar
Lisans paketi
1 - 1 / 1
[ X ]
- Ä°sim:
- license.txt
- Boyut:
- 1.44 KB
- Biçim:
- Item-specific license agreed upon to submission
- Açıklama: