Information Hiding by Machine Learning: A Method of Key Generation for Information Extracting Using Neural Network

نویسندگان

  • Kensuke Naoe
  • Hideyasu Sasaki
  • Yoshiyasu Takefuji
چکیده

In this paper, the authors propose information hiding by machine learning: a method of key generation for information extracting using neural network. The method consists of three layers for information hiding. First, the proposed method prepares feature extraction keys, which are saved by feature extraction attributes like feature coordinates and the region of frequency coefficients. Second, the proposed method prepares hidden patterns in advance to the embedding procedure as a watermark signal of the target contents. Finally, the proposed method generates information extraction keys by using machine learning to output presented hidden patterns. The proper hidden patterns are generated with the proper information extraction key and feature extraction key. In the experiments, the authors show that the proposed method is robust to high pass filtering and JPEG compression. The proposed method contributes to secure visual information hiding without damaging any detailed data of the target content. Kensuke Naoe Keio University, Japan

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Outlier Detection Using Extreme Learning Machines Based on Quantum Fuzzy C-Means

One of the most important concerns of a data miner is always to have accurate and error-free data. Data that does not contain human errors and whose records are full and contain correct data. In this paper, a new learning model based on an extreme learning machine neural network is proposed for outlier detection. The function of neural networks depends on various parameters such as the structur...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

بهبود مدل تفکیک‌کننده منیفلدهای غیرخطی به‌منظور بازشناسی چهره با یک تصویر از هر فرد

Manifold learning is a dimension reduction method for extracting nonlinear structures of high-dimensional data. Many methods have been introduced for this purpose. Most of these methods usually extract a global manifold for data. However, in many real-world problems, there is not only one global manifold, but also additional information about the objects is shared by a large number of manifolds...

متن کامل

Forecasting the Tehran Stock market by Machine ‎Learning Methods using a New Loss Function

Stock market forecasting has attracted so many researchers and investors that ‎many studies have been done in this field. These studies have led to the ‎development of many predictive methods, the most widely used of which are ‎machine learning-based methods. In machine learning-based methods, loss ‎function has a key role in determining the model weights. In this study a new loss ‎function is ...

متن کامل

Investigating the performance of machine learning-based methods in classroom reverberation time estimation using neural networks (Research Article)

Classrooms, as one of the most important educational environments, play a major role in the learning and academic progress of students. reverberation time, as one of the most important acoustic parameters inside rooms, has a significant effect on sound quality. The inefficiency of classical formulas such as Sabin, caused this article to examine the use of machine learning methods as an alternat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJOCI

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2011