Applications of Machine Learning in Steganography for Data Protection and Privacy

Applications of Machine Learning in Steganography for Data Protection and Privacy

Mahip M. Bartere, Sneha Bohra, Prashant Adakane, B. Santhosh Kumar
Copyright: © 2021 |Pages: 20
DOI: 10.4018/978-1-7998-7160-6.ch014
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Data security is one of the most important aspects in today's scenario. Whenever we send our data from source to destination, data protection is one of the prime components. With the help of data hiding and data extraction techniques, we are able to provide the solution of different types of problems whenever we transfer our data. Steganography is a process where we can hide our data and maintain the quality of the image. At the same time, we think about data alteration. With the help of stegtanalysis method, we reverse engineer and extract the original data. In this chapter, data hiding and data extraction techniques are explained in the combination of machine learning architecture. The combination of steganography and steganalysis along with machine learning is used to identify protected data using different techniques.
Chapter Preview
Top

Overview Of Steganography

As of late, it is suspected that creating data concealing technologies, particularly as steganography, poses a danger to individual defence, enterprise, what's more, national security interests. As Data extraction process can be represented in two ways: passive and dynamic, the countermeasure advancement to steganography protection is constantly suggested. The basic operation that an idle steganalysis should perform is to select the closeness or non-appearance of covering data in some media items (double theory testing issue). Dynamic steganalysis (otherwise referred to as criminology steganalysis) refers to the attempt of unintentional receivers to remove/evacuate/change legitimate secret information. The process of Dynamic Data Extraction Process is not at all similar to watermarking defence assaults in this particular case.

Steganography is one of the security in which information is covertly implanted in a cover picture, where the real message need to be sent is totally changed to another shape, shrouded information under a cover picture and sent to the goal. Just the individual who knows the method can without much of a stretch unscramble the message. The execution of Steganography strategies can be evaluated by three Parameters: limit, security and indistinctness. So “Steganography implies concealing one bit of information inside another.”

The equations of steganography help conduct mystery correspondence. The most used mainstream data classes are .bmp, .jpeg, .mp3, .txt, .pdf, .gif. The way to hide a mystery message inside the cover medium, for example, image, film, content, sound, is to store knowledge away. Concealed image has various uses, particularly in the new creative world of today. For a great many users on the site, privacy and mystery are a problem. Two meetings to convey furtively and secretly take care of the hidden photograph. During transition, the secret data must be protected and know how to be acquired by 2 means: cipher and data hiding. In order to expand information security, a hybrid of the two methods should be used.

Complete Chapter List

Search this Book:
Reset