Visible to the public New Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural Networks

TitleNew Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural Networks
Publication TypeConference Paper
Year of Publication2017
AuthorsAl-Salhi, Y. E. A., Lu, S.
Conference Name2017 Ieee 3rd International Conference on Big Data Security on Cloud (Bigdatasecurity), Ieee International Conference on High Performance and Smart Computing (Hpsc), and Ieee International Conference on Intelligent Data and Security (Ids)
ISBN Number978-1-5090-6296-6
KeywordsAdaptive systems, ANNS, ART, composability, data compression, edge detection operators, HVS, hybrid adaptive neural networks, I-AMBTC, Image coding, image compression methods, image concealing, Image edge detection, Image Steganography, image steganography scheme, improved absolute moment block truncation coding algorithm, improved-AMBTC algorithm, media file, Metrics, neural nets, Neural networks, privacy, pubcrawl, PVD systems, secret message concealing, smoothing methods, Standards, steganography, steganography detection
Abstract

The term steganography was used to conceal thesecret message into other media file. In this paper, a novel imagesteganography is proposed, based on adaptive neural networkswith recycling the Improved Absolute Moment Block TruncationCoding algorithm, and by employing the enhanced five edgedetection operators with an optimal target of the ANNS. Wepropose a new scheme of an image concealing using hybridadaptive neural networks based on I-AMBTC method by thehelp of two approaches, the relevant edge detection operators andimage compression methods. Despite that, many processes in ourscheme are used, but still the quality of concealed image lookinggood according to the HVS and PVD systems. The final simulationresults are discussed and compared with another related researchworks related to the image steganography system.

URLhttps://ieeexplore.ieee.org/document/7980327/
DOI10.1109/BigDataSecurity.2017.16
Citation Keyal-salhi_new_2017