Enhancing Steganography Through Deep Learning Approaches

Enhancing Steganography Through Deep Learning Approaches

Vijay Kumar, Chiranji Lal Chowdhary, Shakila Basheer, Srinath Doss, Sandeep Singh Sengar
Projected Release Date: July, 2024|Copyright: © 2025 |Pages: 300
DOI: 10.4018/979-8-3693-2223-9
ISBN13: 9798369322239|ISBN13 Softcover: 9798369349403|EISBN13: 9798369322246
Hardcover:
Forthcoming
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Forthcoming
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Forthcoming
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Forthcoming
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Forthcoming
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Forthcoming
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Softcover:
Forthcoming
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Softcover:
Forthcoming
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Article Processing Charge:
Forthcoming
$1,950.00
TOTAL SAVINGS: $1,950.00
Description & Coverage
Description:

In an era defined by digital connectivity, securing sensitive information against cyber threats is a pressing concern. As digital transmission systems advance, so do the methods of intrusion and data theft. Traditional security measures often need to catch up in safeguarding against sophisticated cyber-attacks. This book presents a timely solution by integrating steganography, the ancient art of concealing information, with cutting-edge deep learning techniques. By blending these two technologies, the book offers a comprehensive approach to fortifying the security of digital communication channels.

Enhancing Steganography Through Deep Learning Approaches addresses critical issues in national information security, business and personal privacy, property security, counterterrorism, and internet security. It thoroughly explores steganography's application in bolstering security across various domains. Readers will gain insights into the fusion of deep learning and steganography for advanced encryption and data protection, along with innovative steganographic techniques for securing physical and intellectual property. The book also delves into real-world examples of thwarting malicious activities using deep learning-enhanced steganography.

This book is tailored for academics and researchers in Artificial Intelligence, postgraduate students seeking in-depth knowledge in AI and deep learning, smart computing practitioners, data analysis professionals, and security sector professionals. It is a valuable resource for those looking to incorporate advanced security measures into their products and services. With a focus on practical insights and real-world applications, this book is an essential guide for understanding and implementing steganography and deep learning techniques to enhance security in digital transmission systems.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Adversarial Training for Steganography
  • Benchmarking and Evaluation Metrics for Deep Learning-based Steganography
  • Combining Traditional Steganography with Deep Learning
  • Deep Learning for Payload Compression and Efficiency
  • Deep Learning for Steganalysis Resistance
  • Deep Learning-Based Embedding Techniques
  • Deep Reinforcement Learning for Steganography
  • Generative Adversarial Networks (GANs)
  • Improving Security with GANs
  • Multimodal Steganography using Deep Learning
  • Privacy-Preserving Applications using Deep Learning Steganography
Download OnDemand Chapters Banner
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Chiranji Lal Chowdhary received his Ph.D. in information technology and engineering from VIT; his M.Tech. in computer science and engineering from MSRIT, VTU, Belagavi; and his B.E. in computer science and engineering from MBMEC, JNVU India. He is currently working as an Associate Professor in the SITE, VIT. He has 15 years of experience in academia and 6 months of experience in the industry. He has received research awards for publishing research papers in refereed journals from VIT 5 times consecutively. He has guided more than 20 graduate projects and more than 20 postgraduate level projects. His publications are indexed by the Clarivate Analytics, IEEE, SCOPUS, ACM, and other abstract and citation databases. He is a reviewer for many reputed journals. He is a life member of CSI, ISCA, and ISCA. He has published many papers in refereed journals and has attended international conferences. He has contributed many chapters and is currently in the process of editing books. He has written 3 books and edited 3 books with a reputed publisher. His current research included digital image processing, deep learning, pattern recognition, soft computing, and biometric systems.
Srinath Doss was born in India (1982) and currently residing in Botswana. He received his B.Tech. from the University of Madras in 2004, the M.Eng. degree Anna University in 2006, Ph.D. degree from St. Peter’s University in 2014, (PGDHE) Post Graduate Diploma in Higher Education from Botho University in 2017, Certified Information Systems Auditor from ISACA in 2020 and PGCCS(Post Graduate Certification in Cyber Security) from Indian Institute of Technology- Palakkad, 2023. Currently he is working as Professor and Dean, Faculty of Engineering and Technology, Botho University, Botswana. Previously, he was with various colleges in India, and with Garyounis University, Libya. He has authored2 books, published80 research article in refereed international journals and conferences. His research interests include MANET, information security, network security and cryptography, cloud computing, wireless and sensor network, and mobile computing. He serves as the editorial member, a reviewer for reputed international journals, and advisory member for various prestigious conference. He has been the session chair and an advisory member for various international conferences. Dr. Srinath is member of IAENG and Associate Member in UACEE.
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.