SlideShare a Scribd company logo
1 of 34
Karim H. Moussa
School of Internet of Things, Xi’an
Jiatong-Liverpool University, Suzhou,
China. karim.moussa@xjjtlu.edu.cn
Marwa H. Elsherif
Electrical Engineering Department,
Alexandria University Alexandria,
Egypt. marwaelsherif2@gmail.com
1. Introduction to Steganography
2. Aim of Proposed Work
3. System Model
4. Experimental Results
5. Conclusions
STEGANOGRAPHY
 STEGAN-O-GRAPHY
 The goal of steganography is to hide
messages in such a way that no one
apart from the intended recipient
even knows that a message has been
sent.”
ADVANTAGE OF STEGANOGRAPHY
OVER CRYPTOGRAPHY
Messages do not attract
attention to themselves
Protects both messages
and communicating
parties
COMBINED CRYPTO-
STEGANOGRAPHY
Merge
Steganography Encryption
 Embedding secret messages
into digital sound is known
as Audio Steganography.
 GOALS OF HIDING TECHNIQUE
EFFECTIVE
ALGORITHM
TRANSPAREN
CY
CAPACITY
ROBUSTNES
S
 THE PROPOSED WORK
 To propose a new chaos-based
audio steganography method that
increases the embedding capacity
while maintaining high
imperceptibility and robustness,
employing chaotic neural networks
and wavelet transform.
•HAMMING CODES (7, 4)
The Hamming code is one of the
most well-known block code
methods that can do both error
detection and correction on a
block of data. Hamming Codes
are still widely used in computing,
telecommunication, and other
applications.
•HAMMING CODES(CONT.)
CHAOS AND RANDOM SYSTEM
Chaos is
statistically
indistinguishable
from
randomness,
and yet it is
deterministic
and not random
at all .
CHAOS IN NEURAL
NETWORK
 Artificial neural networks are an integral
part of emerging technologies, and
ongoing research has shown that they
can be applied to a variety of applications.
 This paper proposes a
new Steganographic algorithm using
chaotic neural networks, whose function
is enhanced by construction with
polynomials that exhibit chaos, namely,
nonlinear Hermite and Chebyshev
polynomials.
CHAOTIC NEURAL NETWORK
 Chaotic neural networks offer greatly
increase memory capacity.Each memory is
encoded by an Unstable Periodic Orbit
(UPO) on the chaotic attractor
The delayed feedback method is
considered to be best suited to
the control of chaos in neural
networks
CHAOTIC NEURAL NETWORK (CONT.)
.
A HOPFIELD NEURAL NETWORK
WHICH SHOWS CHAOTIC NATURE
IS PERFORMED AS FOLLOWS:
 THE PROPOSED STEPS FOR
EMBEDDING PROCESS
 EXTRACTION PROCESS
•SUBJECTIVE TEST
RESULTS
QUALITY TEST
RESULTS
Mean–structure similarity-index-measure (MSSIM) is an estimate for the deformity of
extracted image
AVERAGE PSNR VALUES OF
COVER AUDIO WITH
ATTACKS
53.65
40.1
34.12
55.65
60.11
44.6
Average PSNR of Cover Audio (dB)
Gaussian noise attack MP3 compression attack
Cropping attack Jittering Attack
Amp.Scaling Attack Echo Addition Attack
AVERAGE MSSIM VALUES
OF HIDDEN IMAGE WITH
ATTACKS
0.69 0.66
1
0.77
1
0.77
AVERAGE MSSIM OF HIDDEN IMAGE
Average MSSIM of Hidden Image
Gaussian noise attack MP3 compression attack Cropping attack
Jittering Attack Amp.Scaling Echo Addition
 HIDING CAPACITY AND MEAN PSNR OF THE
PROPOSED ALGORITHM AND SOME OTHER
RELATED WORKS
COMPARISON BETWEEN BER OF THE
PROPOSED ALGORITHM AND SOME
OTHER RELATED WORKS
Attack Type BER%
Proposed
algorithm
[1] [2] [6] [8] [9]
Gaussian Noise
(20 dB)
0.21 - 0.23 0.03 0.53 0.31
Amp. scaling
(1.2)
0 0.03 - 1.44 - -
MP3 Comp.
(64 kbps)
0.23 0.74 0.07 - 0.45 0.2
CONCLUSION
Performance improvement was
achieved by obtaining high hiding
capacity above 3000 kbps and
average quality of more than 60 dB.
The secret message is encoded by
applying Hamming code (7, 4)
before the embedding process to
make the message even more
secure.
 Using delayed chaotic neural
network makes it difficult for any
cryptanalyst to determine the actual
parameters of the hiding method as it
is difficult to synchronize the
unknown chaotic neural networks
unless you know the neural network
clearly so it enhanced the security of
the algorithm
REFERENCES
[1] Hsu, C.‐Y., Tu, S.‐Y., Yang, C.‐T., Chang, C.‐L. and
Chen, S.‐T. (2020), Digital audio signal
watermarking using minimum‐energy scaling
optimization in the wavelet domain. IET Signal
Process., 14: 791-802. https://doi.org/10.1049/iet-
spr.2020.0220.
[2] Budiman, G., Suksmono, A. B.., & Danudirdjo, D.
(2020). FFT-Based Data Hiding on Audio in LWT-
Domain Using Spread Spectrum Technique.
ElektronikaIrElektrotechnika, 26(3), 20-27.
https://doi.org/10.5755/j01.eie.26.3.23950
[3] Wang, S., Wang, C., Yuan, W., Wang, L., &
Wang, J. (2020). Secure echo-hiding audio
watermarking method based on improved
PN sequence and robust principal
component analysis. IET Signal Processing.
doi:10.1049/iet-spr.2019.0376
[4] Hong, Y., & Kim, J. (2019). Autocorrelation
Modulation-Based Audio Blind
Watermarking Robust Against High
Efficiency Advanced Audio Coding. Applied
Sciences, 9(14), 2780.
doi:10.3390/app9142780.
[5] Budiman, G., Suksmono, A. B., &Danudirdjo, D.
(2018). CPT-Based Data Hiding in Selected
Subband Using Combined Transform and
Decomposition Method. 2018 International
Conference on Control, Electronics, Renewable
Energy and Communications (ICCEREC).
doi:10.1109/iccerec.2018.8712001
[6] Li, R., Xu, S., & Yang, H. (2016). Spread spectrum
audio watermarking based on perceptual
characteristic aware extraction. IET Signal
Processing, 10(3), 266–273. doi:10.1049/iet-
spr.2014.0388
[7] Banik BG, Bandyopadhyay S (2018)
Blind key-based attack resistant audio
steganography using cocktail party effect.
Sec CommunNetw
2018(2):121.https://doi.org/10.1155/2018/1
781384
A New Hybrid Steganography Scheme Employing Time-Varying Delayed.pptx

More Related Content

Similar to A New Hybrid Steganography Scheme Employing Time-Varying Delayed.pptx

Review of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO SystemReview of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO Systemijtsrd
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkIAEME Publication
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsCSCJournals
 
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingTELKOMNIKA JOURNAL
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Provably secure and efficient audio compression based on compressive sensing
Provably secure and efficient audio compression based on  compressive sensingProvably secure and efficient audio compression based on  compressive sensing
Provably secure and efficient audio compression based on compressive sensingIJECEIAES
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdfPHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdfadeel paracha
 
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...IRJET Journal
 
Deep Learning Based Voice Activity Detection and Speech Enhancement
Deep Learning Based Voice Activity Detection and Speech EnhancementDeep Learning Based Voice Activity Detection and Speech Enhancement
Deep Learning Based Voice Activity Detection and Speech EnhancementNAVER Engineering
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audioinventy
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryptionnooriasukmaningtyas
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
 
Improved steganographic security by
Improved steganographic security byImproved steganographic security by
Improved steganographic security byIJNSA Journal
 

Similar to A New Hybrid Steganography Scheme Employing Time-Varying Delayed.pptx (20)

Review of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO SystemReview of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO System
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
G0261041046
G0261041046G0261041046
G0261041046
 
G0261041046
G0261041046G0261041046
G0261041046
 
Provably secure and efficient audio compression based on compressive sensing
Provably secure and efficient audio compression based on  compressive sensingProvably secure and efficient audio compression based on  compressive sensing
Provably secure and efficient audio compression based on compressive sensing
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdfPHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
 
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
 
Deep Learning Based Voice Activity Detection and Speech Enhancement
Deep Learning Based Voice Activity Detection and Speech EnhancementDeep Learning Based Voice Activity Detection and Speech Enhancement
Deep Learning Based Voice Activity Detection and Speech Enhancement
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryption
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
D010312230
D010312230D010312230
D010312230
 
Improved steganographic security by
Improved steganographic security byImproved steganographic security by
Improved steganographic security by
 

More from DrMarwaElsherif

Artificial Intelligence description and applications.pptx
Artificial Intelligence description and applications.pptxArtificial Intelligence description and applications.pptx
Artificial Intelligence description and applications.pptxDrMarwaElsherif
 
iot ppt.pptx a presentation about iot definition
iot ppt.pptx a presentation about iot definitioniot ppt.pptx a presentation about iot definition
iot ppt.pptx a presentation about iot definitionDrMarwaElsherif
 
Excellence+in+Problem+Solving-Understanding+KTPA.pdf
Excellence+in+Problem+Solving-Understanding+KTPA.pdfExcellence+in+Problem+Solving-Understanding+KTPA.pdf
Excellence+in+Problem+Solving-Understanding+KTPA.pdfDrMarwaElsherif
 
Excellence+in+Time+Management-+Time+Management+Competency+II.pdf
Excellence+in+Time+Management-+Time+Management+Competency+II.pdfExcellence+in+Time+Management-+Time+Management+Competency+II.pdf
Excellence+in+Time+Management-+Time+Management+Competency+II.pdfDrMarwaElsherif
 
Internet of things (iot) power point.pprtx
Internet of things (iot) power point.pprtxInternet of things (iot) power point.pprtx
Internet of things (iot) power point.pprtxDrMarwaElsherif
 
thermal physics course igcse for year 10.pdf
thermal physics course igcse for year 10.pdfthermal physics course igcse for year 10.pdf
thermal physics course igcse for year 10.pdfDrMarwaElsherif
 
Developing-Psychological-Safety-Workbook.pdf
Developing-Psychological-Safety-Workbook.pdfDeveloping-Psychological-Safety-Workbook.pdf
Developing-Psychological-Safety-Workbook.pdfDrMarwaElsherif
 
Excellence+in+Problem+Solving-Methodologies.pdf
Excellence+in+Problem+Solving-Methodologies.pdfExcellence+in+Problem+Solving-Methodologies.pdf
Excellence+in+Problem+Solving-Methodologies.pdfDrMarwaElsherif
 
igcsephysicsrevision-110411075846-phpapp01.pdf
igcsephysicsrevision-110411075846-phpapp01.pdfigcsephysicsrevision-110411075846-phpapp01.pdf
igcsephysicsrevision-110411075846-phpapp01.pdfDrMarwaElsherif
 
قطاع الدراسات والبحوث.pptx
قطاع الدراسات والبحوث.pptxقطاع الدراسات والبحوث.pptx
قطاع الدراسات والبحوث.pptxDrMarwaElsherif
 
505693676-Complete-Igcse-Physics-Ppt-Compilation.pptx
505693676-Complete-Igcse-Physics-Ppt-Compilation.pptx505693676-Complete-Igcse-Physics-Ppt-Compilation.pptx
505693676-Complete-Igcse-Physics-Ppt-Compilation.pptxDrMarwaElsherif
 
ماذا لو غاب القمر؟؟2!!.ppsx
ماذا لو غاب القمر؟؟2!!.ppsxماذا لو غاب القمر؟؟2!!.ppsx
ماذا لو غاب القمر؟؟2!!.ppsxDrMarwaElsherif
 
إيجابيات و سلبيات مواقع التواصل الاجتماعي.pptx
إيجابيات و سلبيات مواقع التواصل الاجتماعي.pptxإيجابيات و سلبيات مواقع التواصل الاجتماعي.pptx
إيجابيات و سلبيات مواقع التواصل الاجتماعي.pptxDrMarwaElsherif
 

More from DrMarwaElsherif (20)

Artificial Intelligence description and applications.pptx
Artificial Intelligence description and applications.pptxArtificial Intelligence description and applications.pptx
Artificial Intelligence description and applications.pptx
 
iot ppt.pptx a presentation about iot definition
iot ppt.pptx a presentation about iot definitioniot ppt.pptx a presentation about iot definition
iot ppt.pptx a presentation about iot definition
 
Excellence+in+Problem+Solving-Understanding+KTPA.pdf
Excellence+in+Problem+Solving-Understanding+KTPA.pdfExcellence+in+Problem+Solving-Understanding+KTPA.pdf
Excellence+in+Problem+Solving-Understanding+KTPA.pdf
 
Excellence+in+Time+Management-+Time+Management+Competency+II.pdf
Excellence+in+Time+Management-+Time+Management+Competency+II.pdfExcellence+in+Time+Management-+Time+Management+Competency+II.pdf
Excellence+in+Time+Management-+Time+Management+Competency+II.pdf
 
Internet of things (iot) power point.pprtx
Internet of things (iot) power point.pprtxInternet of things (iot) power point.pprtx
Internet of things (iot) power point.pprtx
 
thermal physics course igcse for year 10.pdf
thermal physics course igcse for year 10.pdfthermal physics course igcse for year 10.pdf
thermal physics course igcse for year 10.pdf
 
Developing-Psychological-Safety-Workbook.pdf
Developing-Psychological-Safety-Workbook.pdfDeveloping-Psychological-Safety-Workbook.pdf
Developing-Psychological-Safety-Workbook.pdf
 
Excellence+in+Problem+Solving-Methodologies.pdf
Excellence+in+Problem+Solving-Methodologies.pdfExcellence+in+Problem+Solving-Methodologies.pdf
Excellence+in+Problem+Solving-Methodologies.pdf
 
igcsephysicsrevision-110411075846-phpapp01.pdf
igcsephysicsrevision-110411075846-phpapp01.pdfigcsephysicsrevision-110411075846-phpapp01.pdf
igcsephysicsrevision-110411075846-phpapp01.pdf
 
قطاع الدراسات والبحوث.pptx
قطاع الدراسات والبحوث.pptxقطاع الدراسات والبحوث.pptx
قطاع الدراسات والبحوث.pptx
 
wifi tech-1.pptx
wifi tech-1.pptxwifi tech-1.pptx
wifi tech-1.pptx
 
PreCalc Section 1.4.ppt
PreCalc Section 1.4.pptPreCalc Section 1.4.ppt
PreCalc Section 1.4.ppt
 
CFI-L4-TryitNow.pptx
CFI-L4-TryitNow.pptxCFI-L4-TryitNow.pptx
CFI-L4-TryitNow.pptx
 
505693676-Complete-Igcse-Physics-Ppt-Compilation.pptx
505693676-Complete-Igcse-Physics-Ppt-Compilation.pptx505693676-Complete-Igcse-Physics-Ppt-Compilation.pptx
505693676-Complete-Igcse-Physics-Ppt-Compilation.pptx
 
PARENT FUNCTIONS.pptx
PARENT FUNCTIONS.pptxPARENT FUNCTIONS.pptx
PARENT FUNCTIONS.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
presentation1.ppsx
presentation1.ppsxpresentation1.ppsx
presentation1.ppsx
 
ماذا لو غاب القمر؟؟2!!.ppsx
ماذا لو غاب القمر؟؟2!!.ppsxماذا لو غاب القمر؟؟2!!.ppsx
ماذا لو غاب القمر؟؟2!!.ppsx
 
إيجابيات و سلبيات مواقع التواصل الاجتماعي.pptx
إيجابيات و سلبيات مواقع التواصل الاجتماعي.pptxإيجابيات و سلبيات مواقع التواصل الاجتماعي.pptx
إيجابيات و سلبيات مواقع التواصل الاجتماعي.pptx
 
Wi-Fi.pptx
Wi-Fi.pptxWi-Fi.pptx
Wi-Fi.pptx
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

A New Hybrid Steganography Scheme Employing Time-Varying Delayed.pptx

  • 1. Karim H. Moussa School of Internet of Things, Xi’an Jiatong-Liverpool University, Suzhou, China. karim.moussa@xjjtlu.edu.cn Marwa H. Elsherif Electrical Engineering Department, Alexandria University Alexandria, Egypt. marwaelsherif2@gmail.com
  • 2. 1. Introduction to Steganography 2. Aim of Proposed Work 3. System Model 4. Experimental Results 5. Conclusions
  • 4.  The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”
  • 5. ADVANTAGE OF STEGANOGRAPHY OVER CRYPTOGRAPHY Messages do not attract attention to themselves Protects both messages and communicating parties
  • 7.
  • 8.
  • 9.  Embedding secret messages into digital sound is known as Audio Steganography.
  • 10.  GOALS OF HIDING TECHNIQUE EFFECTIVE ALGORITHM TRANSPAREN CY CAPACITY ROBUSTNES S
  • 11.  THE PROPOSED WORK  To propose a new chaos-based audio steganography method that increases the embedding capacity while maintaining high imperceptibility and robustness, employing chaotic neural networks and wavelet transform.
  • 12. •HAMMING CODES (7, 4) The Hamming code is one of the most well-known block code methods that can do both error detection and correction on a block of data. Hamming Codes are still widely used in computing, telecommunication, and other applications.
  • 14. CHAOS AND RANDOM SYSTEM Chaos is statistically indistinguishable from randomness, and yet it is deterministic and not random at all .
  • 15. CHAOS IN NEURAL NETWORK  Artificial neural networks are an integral part of emerging technologies, and ongoing research has shown that they can be applied to a variety of applications.  This paper proposes a new Steganographic algorithm using chaotic neural networks, whose function is enhanced by construction with polynomials that exhibit chaos, namely, nonlinear Hermite and Chebyshev polynomials.
  • 16. CHAOTIC NEURAL NETWORK  Chaotic neural networks offer greatly increase memory capacity.Each memory is encoded by an Unstable Periodic Orbit (UPO) on the chaotic attractor
  • 17. The delayed feedback method is considered to be best suited to the control of chaos in neural networks CHAOTIC NEURAL NETWORK (CONT.)
  • 18. . A HOPFIELD NEURAL NETWORK WHICH SHOWS CHAOTIC NATURE IS PERFORMED AS FOLLOWS:
  • 19.  THE PROPOSED STEPS FOR EMBEDDING PROCESS
  • 22. QUALITY TEST RESULTS Mean–structure similarity-index-measure (MSSIM) is an estimate for the deformity of extracted image
  • 23. AVERAGE PSNR VALUES OF COVER AUDIO WITH ATTACKS 53.65 40.1 34.12 55.65 60.11 44.6 Average PSNR of Cover Audio (dB) Gaussian noise attack MP3 compression attack Cropping attack Jittering Attack Amp.Scaling Attack Echo Addition Attack
  • 24. AVERAGE MSSIM VALUES OF HIDDEN IMAGE WITH ATTACKS 0.69 0.66 1 0.77 1 0.77 AVERAGE MSSIM OF HIDDEN IMAGE Average MSSIM of Hidden Image Gaussian noise attack MP3 compression attack Cropping attack Jittering Attack Amp.Scaling Echo Addition
  • 25.  HIDING CAPACITY AND MEAN PSNR OF THE PROPOSED ALGORITHM AND SOME OTHER RELATED WORKS
  • 26. COMPARISON BETWEEN BER OF THE PROPOSED ALGORITHM AND SOME OTHER RELATED WORKS Attack Type BER% Proposed algorithm [1] [2] [6] [8] [9] Gaussian Noise (20 dB) 0.21 - 0.23 0.03 0.53 0.31 Amp. scaling (1.2) 0 0.03 - 1.44 - - MP3 Comp. (64 kbps) 0.23 0.74 0.07 - 0.45 0.2
  • 28. Performance improvement was achieved by obtaining high hiding capacity above 3000 kbps and average quality of more than 60 dB. The secret message is encoded by applying Hamming code (7, 4) before the embedding process to make the message even more secure.
  • 29.  Using delayed chaotic neural network makes it difficult for any cryptanalyst to determine the actual parameters of the hiding method as it is difficult to synchronize the unknown chaotic neural networks unless you know the neural network clearly so it enhanced the security of the algorithm
  • 30. REFERENCES [1] Hsu, C.‐Y., Tu, S.‐Y., Yang, C.‐T., Chang, C.‐L. and Chen, S.‐T. (2020), Digital audio signal watermarking using minimum‐energy scaling optimization in the wavelet domain. IET Signal Process., 14: 791-802. https://doi.org/10.1049/iet- spr.2020.0220. [2] Budiman, G., Suksmono, A. B.., & Danudirdjo, D. (2020). FFT-Based Data Hiding on Audio in LWT- Domain Using Spread Spectrum Technique. ElektronikaIrElektrotechnika, 26(3), 20-27. https://doi.org/10.5755/j01.eie.26.3.23950
  • 31. [3] Wang, S., Wang, C., Yuan, W., Wang, L., & Wang, J. (2020). Secure echo-hiding audio watermarking method based on improved PN sequence and robust principal component analysis. IET Signal Processing. doi:10.1049/iet-spr.2019.0376 [4] Hong, Y., & Kim, J. (2019). Autocorrelation Modulation-Based Audio Blind Watermarking Robust Against High Efficiency Advanced Audio Coding. Applied Sciences, 9(14), 2780. doi:10.3390/app9142780.
  • 32. [5] Budiman, G., Suksmono, A. B., &Danudirdjo, D. (2018). CPT-Based Data Hiding in Selected Subband Using Combined Transform and Decomposition Method. 2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC). doi:10.1109/iccerec.2018.8712001 [6] Li, R., Xu, S., & Yang, H. (2016). Spread spectrum audio watermarking based on perceptual characteristic aware extraction. IET Signal Processing, 10(3), 266–273. doi:10.1049/iet- spr.2014.0388
  • 33. [7] Banik BG, Bandyopadhyay S (2018) Blind key-based attack resistant audio steganography using cocktail party effect. Sec CommunNetw 2018(2):121.https://doi.org/10.1155/2018/1 781384