A Novel Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks

被引:16
作者
Gurunath, R. [1 ]
Alahmadi, Ahmed H. [2 ]
Samanta, Debabrata [1 ]
Khan, Mohammad Zubair [2 ]
Alahmadi, Abdulrahman [2 ]
机构
[1] CHRIST Deemed Univ, Dept Comp Sci, Bengaluru 560029, Karnataka, India
[2] Taibah Univ, Dept Comp Sci & Informat, Medina 42353, Saudi Arabia
来源
IEEE ACCESS | 2021年 / 9卷 / 09期
关键词
Markov processes; Linguistics; Recurrent neural networks; Natural language processing; Social networking (online); Artificial intelligence; Data models; steganography; linguistic steganography; statistical language model; natural language processing; NLP; Markov chain model; recurrent neural networks; RNN; LSTM;
D O I
10.1109/ACCESS.2021.3108183
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Increasing prevalence and simplicity of using Artificial Intelligence (AI) techniques, Steganography is shifting from conventional model building to AI model building. AI enables computers to learn from their mistakes, adapt to emerging inputs, and carry out human-like activities. Traditional Linguistic Steganographic approaches lack automation, analysis of Cover text and hidden text volume and accuracy. A formal methodology is used in only a few Steganographic approaches. In the vast majority of situations, traditional approaches fail to survive third-party vulnerability. This study looks at evaluation of an AI-based statistical language model for text Steganography. Since the advent of Natural Language Processing (NLP) into the research field, linguistic Steganography has superseded other types of Steganography. This paper proposes the positive aspects of NLP-based Markov chain model for an auto-generative cover text. The embedding rate, volume, and other attributes of Recurrent Neural Networks (RNN) Steganographic schemes are contrasted in this article between RNN-Stega and RNN-generated Lyrics, two RNN methods. Here the RNN model follows Long Short Term Memory (LSTM) neural network. The paper also includes a case study on Artificial Intelligence and Information Security, which discusses history, applications, AI challenges, and how AI can help with security threats and vulnerabilities. The final portion is dedicated to the study's shortcomings, which may be the subject of future research.
引用
收藏
页码:120869 / 120879
页数:11
相关论文
共 40 条
  • [11] Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
    Gomathy, V.
    Padhy, Neelamadhab
    Samanta, Debabrata
    Sivaram, M.
    Jain, Vishal
    Amiri, Iraj Sadegh
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 4995 - 5001
  • [12] Grosvald M., 2011, J INF HIDING MULTIME, V2, P1
  • [13] A Deep Learning Model for Information Loss Prevention From Multi-Page Digital Documents
    Guha, Abhijit
    Samanta, Debabrata
    Banerjee, Amit
    Agarwal, Daksh
    [J]. IEEE ACCESS, 2021, 9 : 80451 - 80465
  • [14] Hybrid Approach to Document Anomaly Detection: An Application to Facilitate RPA in Title Insurance
    Guha, Abhijit
    Samanta, Debabrata
    [J]. INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2021, 18 (01) : 55 - 72
  • [15] Gurunath R., 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), P104, DOI 10.1109/I-SMAC.2018.8653728
  • [16] Gurunath R., 2020, INT J ADV SCI TECHNO, V29, P3705
  • [17] A Brief History of Artificial Intelligence: On the Past, Present, and Future of Artificial Intelligence
    Haenlein, Michael
    Kaplan, Andreas
    [J]. CALIFORNIA MANAGEMENT REVIEW, 2019, 61 (04) : 5 - 14
  • [18] An internet of health things-driven deep learning framework for detection and classification of skin cancer using transfer learning
    Khamparia, Aditya
    Singh, Prakash Kumar
    Rani, Poonam
    Samanta, Debabrata
    Khanna, Ashish
    Bhushan, Bharat
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (07)
  • [19] Kumar R, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), P134, DOI 10.1109/ICCMC.2017.8282660
  • [20] PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications
    Maheswari, M.
    Geetha, S.
    Kumar, S. Selva
    Karuppiah, Marimuthu
    Samanta, Debabrata
    Park, Yohan
    [J]. IEEE ACCESS, 2021, 9 : 20819 - 20827