Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/533980
Title: Artificial intelligence based steganography model for social media data set
Researcher: R, Gurunath
Guide(s): Samanta, Debabrata
Keywords: Artifcial Intelligence,
Computer Science
Computer Science Information Systems
Data Hiding,
Engineering and Technology
Huffman Tree,
Markov Chain,
Online Social Networks,
RNN,
Steganography,
University: CHRIST University
Completed Date: 2023
Abstract: Steganography, one of the data security mechanisms under our investigation, shields legitimate messages from hackers and spies by employing data hiding. Data protection is newlinecurrently the top priority due to the signifcant advancements in information technology due to high-security concerns. Traditional techniques for maintaining data confdentiality include steganography and cryptography; the distinction is that steganography does not naturally arouse suspicion, whereas cryptography does. Traditional linguistic steganographic methods suffer from limitations in automation, accuracy, and the volume of concealed text. The robustness and undetectability properties of these approaches also require improvement. Third-party vulnerability is often too high for conventional techniques to handle. Artifcial intelligence is increasingly replacing traditional model creation in steganography. Despite the fact that steganography ensures security, information sent over online social networks (OSN) is plainly not safe. Steganography along newlinewith encryption can make a difference with regard to privacy of information in transit. newlineThe research study aims to build algorithms or models and assess steganography s robustness, security, undetectability, and embedding ability. Two distinct types of data newlineconcealing employed for investigation: text and image. The results were encouraging newlinewhen we initially tested our Laplacian model using image steganography and compared newlinewith benchmark methods. The second experiment, which is based on AI, generates the cover text using secret information, examines the security and robustness of steganography. The study compared suggested text steganography model, 3-bit data concealing, with other existing techniques in order to ascertain the undetectability factor. The frst experiment used MATLAB tools, and the second used the markovify python module, RNN (Recurrent Neural networks), and the Huffman tree. Further format-based steganography methods utilized in the following experiment.
Pagination: xx, 176p.;
URI: http://hdl.handle.net/10603/533980
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File168.76 kBAdobe PDFView/Open
02_prelim pages.pdf718.1 kBAdobe PDFView/Open
03_abstract.pdf44.21 kBAdobe PDFView/Open
04_contents.pdf50.98 kBAdobe PDFView/Open
05_chapter1.pdf458.41 kBAdobe PDFView/Open
06_chapter2.pdf409.67 kBAdobe PDFView/Open
07_chapter3.pdf758.37 kBAdobe PDFView/Open
08_chapter4.pdf1.09 MBAdobe PDFView/Open
09_chapter5.pdf572.83 kBAdobe PDFView/Open
10_chapter6.pdf113.07 kBAdobe PDFView/Open
11_chapter7.pdf50.55 kBAdobe PDFView/Open
12_chapter8.pdf47.1 kBAdobe PDFView/Open
13_annexures.pdf114.23 kBAdobe PDFView/Open
80_recommendation.pdf215.18 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: