A Novel Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks

被引:16
作者
Gurunath, R. [1 ]
Alahmadi, Ahmed H. [2 ]
Samanta, Debabrata [1 ]
Khan, Mohammad Zubair [2 ]
Alahmadi, Abdulrahman [2 ]
机构
[1] CHRIST Deemed Univ, Dept Comp Sci, Bengaluru 560029, Karnataka, India
[2] Taibah Univ, Dept Comp Sci & Informat, Medina 42353, Saudi Arabia
来源
IEEE ACCESS | 2021年 / 9卷 / 09期
关键词
Markov processes; Linguistics; Recurrent neural networks; Natural language processing; Social networking (online); Artificial intelligence; Data models; steganography; linguistic steganography; statistical language model; natural language processing; NLP; Markov chain model; recurrent neural networks; RNN; LSTM;
D O I
10.1109/ACCESS.2021.3108183
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Increasing prevalence and simplicity of using Artificial Intelligence (AI) techniques, Steganography is shifting from conventional model building to AI model building. AI enables computers to learn from their mistakes, adapt to emerging inputs, and carry out human-like activities. Traditional Linguistic Steganographic approaches lack automation, analysis of Cover text and hidden text volume and accuracy. A formal methodology is used in only a few Steganographic approaches. In the vast majority of situations, traditional approaches fail to survive third-party vulnerability. This study looks at evaluation of an AI-based statistical language model for text Steganography. Since the advent of Natural Language Processing (NLP) into the research field, linguistic Steganography has superseded other types of Steganography. This paper proposes the positive aspects of NLP-based Markov chain model for an auto-generative cover text. The embedding rate, volume, and other attributes of Recurrent Neural Networks (RNN) Steganographic schemes are contrasted in this article between RNN-Stega and RNN-generated Lyrics, two RNN methods. Here the RNN model follows Long Short Term Memory (LSTM) neural network. The paper also includes a case study on Artificial Intelligence and Information Security, which discusses history, applications, AI challenges, and how AI can help with security threats and vulnerabilities. The final portion is dedicated to the study's shortcomings, which may be the subject of future research.
引用
收藏
页码:120869 / 120879
页数:11
相关论文
共 40 条
  • [1] Applications of Artificial Intelligence in Transport: An Overview
    Abduljabbar, Rusul
    Dia, Hussein
    Liyanage, Sohani
    Bagloee, Saeed Asadi
    [J]. SUSTAINABILITY, 2019, 11 (01)
  • [2] The realist approach for evaluation of computational intelligence in software engineering
    Althar, Raghavendra Rao
    Samanta, Debabrata
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2021, 17 (01) : 17 - 27
  • [3] [Anonymous], TEXT COVERLESS INFOR
  • [4] Biswal A. K., 2021, WIRELESS COMMUN MOBI, V2021, P1
  • [5] Biswas J., 2021, Mathematics Stat, V9, P285, DOI [10.13189/ms.2021.090309, DOI 10.13189/MS.2021.090309]
  • [6] Chang CY, 2014, COMPUT LINGUIST, V40, P403, DOI [10.1162/coli_a_00176, 10.1162/COLI_a_00176]
  • [7] Dhanush V, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), P324, DOI 10.1109/ICCMC.2017.8282701
  • [8] Din R., 2018, INDONESIAN J ELECT E, V11, P747
  • [9] What is AI? Applications of artificial intelligence to dermatology
    Du-Harpur, X.
    Watt, F. M.
    Luscombe, N. M.
    Lynch, M. D.
    [J]. BRITISH JOURNAL OF DERMATOLOGY, 2020, 183 (03) : 423 - 430
  • [10] Fang Tina, 2017, GENERATING STEGANOGR