VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
A New Hybrid Steganography Scheme Employing Time-Varying Delayed.pptx
1. Karim H. Moussa
School of Internet of Things, Xi’an
Jiatong-Liverpool University, Suzhou,
China. karim.moussa@xjjtlu.edu.cn
Marwa H. Elsherif
Electrical Engineering Department,
Alexandria University Alexandria,
Egypt. marwaelsherif2@gmail.com
2. 1. Introduction to Steganography
2. Aim of Proposed Work
3. System Model
4. Experimental Results
5. Conclusions
4. The goal of steganography is to hide
messages in such a way that no one
apart from the intended recipient
even knows that a message has been
sent.”
5. ADVANTAGE OF STEGANOGRAPHY
OVER CRYPTOGRAPHY
Messages do not attract
attention to themselves
Protects both messages
and communicating
parties
9. Embedding secret messages
into digital sound is known
as Audio Steganography.
10. GOALS OF HIDING TECHNIQUE
EFFECTIVE
ALGORITHM
TRANSPAREN
CY
CAPACITY
ROBUSTNES
S
11. THE PROPOSED WORK
To propose a new chaos-based
audio steganography method that
increases the embedding capacity
while maintaining high
imperceptibility and robustness,
employing chaotic neural networks
and wavelet transform.
12. •HAMMING CODES (7, 4)
The Hamming code is one of the
most well-known block code
methods that can do both error
detection and correction on a
block of data. Hamming Codes
are still widely used in computing,
telecommunication, and other
applications.
14. CHAOS AND RANDOM SYSTEM
Chaos is
statistically
indistinguishable
from
randomness,
and yet it is
deterministic
and not random
at all .
15. CHAOS IN NEURAL
NETWORK
Artificial neural networks are an integral
part of emerging technologies, and
ongoing research has shown that they
can be applied to a variety of applications.
This paper proposes a
new Steganographic algorithm using
chaotic neural networks, whose function
is enhanced by construction with
polynomials that exhibit chaos, namely,
nonlinear Hermite and Chebyshev
polynomials.
16. CHAOTIC NEURAL NETWORK
Chaotic neural networks offer greatly
increase memory capacity.Each memory is
encoded by an Unstable Periodic Orbit
(UPO) on the chaotic attractor
17. The delayed feedback method is
considered to be best suited to
the control of chaos in neural
networks
CHAOTIC NEURAL NETWORK (CONT.)
18. .
A HOPFIELD NEURAL NETWORK
WHICH SHOWS CHAOTIC NATURE
IS PERFORMED AS FOLLOWS:
28. Performance improvement was
achieved by obtaining high hiding
capacity above 3000 kbps and
average quality of more than 60 dB.
The secret message is encoded by
applying Hamming code (7, 4)
before the embedding process to
make the message even more
secure.
29. Using delayed chaotic neural
network makes it difficult for any
cryptanalyst to determine the actual
parameters of the hiding method as it
is difficult to synchronize the
unknown chaotic neural networks
unless you know the neural network
clearly so it enhanced the security of
the algorithm
30. REFERENCES
[1] Hsu, C.‐Y., Tu, S.‐Y., Yang, C.‐T., Chang, C.‐L. and
Chen, S.‐T. (2020), Digital audio signal
watermarking using minimum‐energy scaling
optimization in the wavelet domain. IET Signal
Process., 14: 791-802. https://doi.org/10.1049/iet-
spr.2020.0220.
[2] Budiman, G., Suksmono, A. B.., & Danudirdjo, D.
(2020). FFT-Based Data Hiding on Audio in LWT-
Domain Using Spread Spectrum Technique.
ElektronikaIrElektrotechnika, 26(3), 20-27.
https://doi.org/10.5755/j01.eie.26.3.23950
31. [3] Wang, S., Wang, C., Yuan, W., Wang, L., &
Wang, J. (2020). Secure echo-hiding audio
watermarking method based on improved
PN sequence and robust principal
component analysis. IET Signal Processing.
doi:10.1049/iet-spr.2019.0376
[4] Hong, Y., & Kim, J. (2019). Autocorrelation
Modulation-Based Audio Blind
Watermarking Robust Against High
Efficiency Advanced Audio Coding. Applied
Sciences, 9(14), 2780.
doi:10.3390/app9142780.
32. [5] Budiman, G., Suksmono, A. B., &Danudirdjo, D.
(2018). CPT-Based Data Hiding in Selected
Subband Using Combined Transform and
Decomposition Method. 2018 International
Conference on Control, Electronics, Renewable
Energy and Communications (ICCEREC).
doi:10.1109/iccerec.2018.8712001
[6] Li, R., Xu, S., & Yang, H. (2016). Spread spectrum
audio watermarking based on perceptual
characteristic aware extraction. IET Signal
Processing, 10(3), 266–273. doi:10.1049/iet-
spr.2014.0388
33. [7] Banik BG, Bandyopadhyay S (2018)
Blind key-based attack resistant audio
steganography using cocktail party effect.
Sec CommunNetw
2018(2):121.https://doi.org/10.1155/2018/1
781384