CFP last date
20 December 2024
Reseach Article

Cognitive Prediction of the Most Appropriate Image Steganography Approach

by Usha B.a, N.ksrinath, Ravikumar C N, Vismayas P
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 8
Year of Publication: 2015
Authors: Usha B.a, N.ksrinath, Ravikumar C N, Vismayas P
10.5120/21564-4599

Usha B.a, N.ksrinath, Ravikumar C N, Vismayas P . Cognitive Prediction of the Most Appropriate Image Steganography Approach. International Journal of Computer Applications. 121, 8 ( July 2015), 42-45. DOI=10.5120/21564-4599

@article{ 10.5120/21564-4599,
author = { Usha B.a, N.ksrinath, Ravikumar C N, Vismayas P },
title = { Cognitive Prediction of the Most Appropriate Image Steganography Approach },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 8 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number8/21564-4599/ },
doi = { 10.5120/21564-4599 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:07:57.647784+05:30
%A Usha B.a
%A N.ksrinath
%A Ravikumar C N
%A Vismayas P
%T Cognitive Prediction of the Most Appropriate Image Steganography Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 8
%P 42-45
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the light of growing technological advancements, data security has become a matter of great concern. This in turn has reiterated the significance of fields like cryptography and steganography to modify or hide secret data. The conventional methodologies of steganography and cryptography are not designed to utilize the semantic meaning of data. Even though these traditional methods offers ample security, it fails to personalize the whole process and make it dependent on the requirements as specified by an individual. Thus the idea of cognitive cryptography took birth. The field of cognitive science has been progressing at a fast rate and deals with decision making. In this paper, the idea of cognitive cryptography has been adapted to give rise to cognitive steganography. The application developed here aims at deciding the most suitable steganography approach (among the chosen four algorithms) for hiding input data, by taking into account its semantic meaning and the intended application. The development of such an algorithm overcomes the shortcomings of traditional techniques in terms of computational complexity, memory usage, image distortion and effective bandwidth utilization.

References
  1. Srinath N K, Usha B A, Narayan K, Tushara C K, "Analysis of Data Embedding Technique in Image Steganography – A Survey" , in International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 6, pp. 54-59, June 2014.
  2. Priyadarshni, "A hybrid data hiding scheme to enhance the capacity of one-third probability embedding method", in 2015 IEEE International Conference on Computational Intelligence & Communication Technology, ISBN: 978-1-4799-6022-4, Pages: 269 – 272, 13-14 Feb. 2015.
  3. Ramandeep Kaur, Abhishek Thakur, Hardeep Singh Saini, Rajesh Kumar, "Enhanced Steganographic Method Preserving Base Quality of Information Using LSB, Parity and Spread Spectrum Technique", 2015 Fifth International Conference on Advanced Computing & Communication Technologies IEEE,Pages:148 – 152, ISBN:978-1-4799-8487-9, 21-22 Feb. 2015.
  4. Marek R. Ogiela, "New Directions in Cognitive Cryptography", in Journal of Convergence, Volume 5, Number 3, September 2014.
  5. Lidia Ogiela and Marek R. Ogiela, "Towards Cognitive Cryptography", in Journal of Internet Services and Information Security (JISIS), volume: 4, number: 1, pp. 58-63, 2014.
  6. Chin-Teng Lin, Fellow, Mukesh Prasad, and Amit Saxena, "An Improved Polynomial Neural Network Classi?er Using Real-Coded Genetic Algorithm", Systems, Man, and Cybernetics: Systems, IEEE Transactions on (Volume: PP, Issue: 99 ), ISSN :2168-2216, 12 March 2015.
  7. Jan Chorowski and Jacek M. Zurad, "Learning Understandable Neural Networks with Nonnegative Weight Constraints", IEEE Transactions on Neural Networks and Learning Systems, Vol. 26, No. 1, January 2015.
  8. Masoud Nosrati, Ali Hanani, Ronak Karimi, "Steganography in Image Segments using Genetic Algorithm ", in 2015 Fifth International Conference on Advanced Computing & Communication Technologies, ISBN:978-1-4799-8487-9,21-22 Feb. 2015
  9. Kirti Bala Bahekar, Praneet Saurabh and Bhupendra Verma, ?Improving High Embedding Capacity Using Artificial Immune System: A Novel Approach for DataHiding, in Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012)Lecture Notes in Bioengineering 2013, pp 209-219, 02 Nov 2012
  10. Mamta juneja, Parvinder Singh Sandhu , ?Improved information security using Steganography and Image Segmentation during transmission?,seminar in Rayat and Bahra Institute of Engineering and Technology (RBIEBT) ,2011.
  11. Khalid A. Darabkh, Iyad F. Jafar, Raed T. Al-Zubi, and Mohammed Hawa, ?An improved Image Least Significant Bit Replacement Method. MIPRO 2014, 26-30 May 2014, Opatija, Croatia.
  12. Mrs. Sayantani Ghosh, Mr. Sudipta Roy, and Prof. Samir K. Bandyopadhyay, ?A tutorial review on Text Mining Algorithms?, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 4, June 2012.
  13. Niti Syal, Naresh Kumar Garg, ?Text Extraction in Images Using DWT, Gradient Method and SVM Classifier, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 6, June 2014.
  14. Vishal Gupta, Gurpreet S. Lehal, ?A Survey of Text Mining Techniques and Applications?, Journal of Emerging Technologies In Web Intelligence, Vol. 1, No. 1, August 2009.
  15. Divya Nasa, ?Text Mining Techniques- A Survey, International Journal of Advanced Research in Computer Science and Software Engineering Research Paper, Volume 2, Issue 4, April 2012
Index Terms

Computer Science
Information Sciences

Keywords

Cognitive Steganography Artificial Neural Networks Text Mining Machine learning techniques Image Steganography