Farooq / Bashir / Selwal | Development of Intelligent Framework. Image Steganalysis using Deep Level Features | E-Book | sack.de
E-Book

E-Book, Englisch, 44 Seiten

Farooq / Bashir / Selwal Development of Intelligent Framework. Image Steganalysis using Deep Level Features


1. Auflage 2022
ISBN: 978-3-346-74177-6
Verlag: GRIN Verlag
Format: PDF
Kopierschutz: 0 - No protection

E-Book, Englisch, 44 Seiten

ISBN: 978-3-346-74177-6
Verlag: GRIN Verlag
Format: PDF
Kopierschutz: 0 - No protection



Master's Thesis from the year 2020 in the subject Computer Sciences - Artificial Intelligence, grade: 9.30, , language: English, abstract: The application of DL techniques in steganography has greatly increased the efficiency of steganographic concealment systems, leading to a substantial improvement in safety risks. To counter this, the researchers shifted to steganalysis, the method of detecting steganographic material. In practice, steganalysis is being used in a security framework that operates like a spam-filter to prevent the transmission of malicious steganographic content through networks. Newer steganalysis methods, however, have shown promising results, but they remain both fairly inefficient and non-robust. Steganography is the mechanism by which data are hidden inside an ordinary (non-secret) file to evade detection. Although encryption is intended to hide data information, steganography is intended to conceal data existence. Steganography can also hide new form of communication by hiding the existence of data, and thus provide behavioral protection. Steganography provides behavioral protection and plays a critical role in safeguarding the privacy of information. Although steganographic concealment systems are routinely used for benign activities, bad actors can also use them to transmit malicious information using ordinary files such as photographs, thus posing a risk to security. Because current network defenses do not search images for steganographic content, the transmission of malicious steganographic content cannot be effectively blocked. Hackers may thus use steganography to transfer vulnerabilities or other compromising data in an untraceable fashion through networks.

Farooq / Bashir / Selwal Development of Intelligent Framework. Image Steganalysis using Deep Level Features jetzt bestellen!


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.