A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
DNA Steganalysis Using Deep Recurrent Neural Networks
[article]
2018
arXiv
pre-print
Using deep recurrent neural networks (RNNs), our framework identifies the distribution variations by using the classification score to predict whether a sequence is to be a coding or non-coding sequence ...
To address this limitation, we propose a general sequence learning-based DNA steganalysis framework. ...
17 ) using deep recurrent neural networks (RNNs). ...
arXiv:1704.08443v3
fatcat:o6vvte3turd2rd7643xtkceglu
DNA Steganalysis Using Deep Recurrent Neural Networks
2018
Biocomputing 2019
Using deep recurrent neural networks (RNNs), our framework identifies the distribution variations by using the classification score to predict whether a sequence is to be a coding or non-coding sequence ...
To address this limitation, we propose a general sequence learning-based DNA steganalysis framework. ...
17 ) using deep recurrent neural networks (RNNs). ...
doi:10.1142/9789813279827_0009
fatcat:rg5glh2ubfep3jynlw5cbsxa3q
A Survey of Image Information Hiding Algorithms Based on Deep Learning
2018
CMES - Computer Modeling in Engineering & Sciences
It is divided into four parts of steganography algorithms, watermarking embedding algorithms, coverless information hiding algorithms and steganalysis algorithms based on deep learning. ...
Image information hiding is to make use of the redundancy of the cover image to hide secret information in it. ...
[Bae, Lee, Kwon et al. (2017) ] mainly use deep recurrent neural networks to simulate the internal structure of DNA sequences by extracting hidden layers composed of circulating neural networks (RNNs). ...
doi:10.31614/cmes.2018.04765
fatcat:tvmits2gdrb4xesfswtr275wpy
DNA Privacy: Analyzing Malicious DNA Sequences using Deep Neural Networks
2020
IEEE/ACM Transactions on Computational Biology & Bioinformatics
To address the limitations of conventional approaches, a sequence-learning-based malicious DNA sequence analysis method based on neural networks has been proposed. ...
Recent advances in next-generation sequencing technologies have led to the successful insertion of video information into DNA using synthesized oligonucleotides. ...
(i.e., intron and exon modeling using recurrent neural networks (RNNs). ...
doi:10.1109/tcbb.2020.3017191
pmid:32809941
fatcat:spav3iisjfdnvcc6tlrwolx4wa
Digital image steganography and steganalysis: A journey of the past three decades
2020
Open Computer Science
Conversely, steganalysis is the study of uncovering the steganographic process. The evolution of steganography has been paralleled by the development of steganalysis. ...
In this game of hide and seek, the two player's steganography and steganalysis always want to break the other down. ...
Until now, the count of such techniques that use ML-based algorithms like CNN, artificial neural network, recurrent neural network, and deep learning are very few. ...
doi:10.1515/comp-2020-0136
fatcat:24hkc66e6fcqldeh4b3ivzjn3m
An Encrypted Speech Retrieval Scheme Based on Long Short-Term Memory Neural Network and Deep Hashing
2020
KSII Transactions on Internet and Information Systems
In this paper, we proposed an encrypted speech retrieval scheme based on long short-term memory (LSTM) neural network and deep hashing. ...
Secondly, the integrated LSTM network model and deep hashing algorithm are used to extract high-level features of speech data. ...
[21] proposed a convolution recurrent neural network that can directly use time domain waveform as input to urban sound classification. ...
doi:10.3837/tiis.2020.06.016
fatcat:alfme7ukibd3tjgxswt3xvprxe
2020 Index IEEE Transactions on Information Forensics and Security Vol. 15
2020
IEEE Transactions on Information Forensics and Security
Saxena, N., +, TIFS 2020 1470-1485 BioTouchPass2: Touchscreen Password Biometrics Using Time-Aligned Recurrent Neural Networks. ...
Wang, G., +, TIFS 2020 375-390 On-the-Fly Finger-Vein-Based Biometric Recognition Using Deep Neural Networks. ...
G Gait analysis Deep Learning-Based Gait Recognition Using Smartphones in the Wild. ...
doi:10.1109/tifs.2021.3053735
fatcat:eforexmnczeqzdj3sc2j4yoige
A Review on Text Steganography Techniques
2021
Mathematics
To address this issue, it is necessary to change the document in such a manner that the change would not be visible to the eye, but could still be decoded using a computer. ...
24 RNN-Stega: linguistic steganography based on recurrent neural networks [63] Linguistic Automatically generated text covers secret (RNN). bitstream based on recurrent neural networks 2020 Capacity 25 ...
Recurrent Neural Networks (RNN-Stega) was proposed in [63] , creating text covers automatically using a discrete bitstream. ...
doi:10.3390/math9212829
doaj:b8cb29df8ae44b2fb8aab4173ec498b3
fatcat:xudvbcx6hzfnxbskvbekr3xjqa
Digital Video Tampering Detection and Localization: Review, Representations, Challenges and Algorithm
2022
Mathematics
The state-of-the-art research work is analyzed extensively, highlighting the pros and cons and commonly used datasets. ...
[94] combined a CNN and recurrent neural network to detect video forgery. ...
[81] performed detection using auto-encoders and a recurrent neural network. The authors used only 10 videos for experiments. ...
doi:10.3390/math10020168
fatcat:oznmjpt7qvesdoauboa5zptgma
Introduction. The Mediality of Concealment: Material Practices and Symbolic Operativity
2018
intermédialités
Steganalysis Using Deep Recurrent Neural Networks," ArXiv Preprint, https://arxiv.org/abs/1704.08443 (accessed 28 July 2018). ...
The series Clear, Deep, Dark (2018) contrasts different facets of the Web, from the easily accessible surface to the deep ramifications of the network and the obscured territories of virtual private ...
doi:10.7202/1058467ar
fatcat:vzrtyywrdnab5pwscoscecvaru
An Evaluation of Entropy Measures for Microphone Identification
2020
Entropy
Various approaches have been used in literature to deal with it, ranging from the application of handcrafted statistical features to the recent application of deep learning techniques. ...
Abbreviations The following abbreviations are used in this manuscript: ...
Acknowledgments: This work acknowledges Directorate I of the EC DG JRC for the provision of a significant portion of the phones used in this analysis. ...
doi:10.3390/e22111235
pmid:33287003
fatcat:g23bfvvgmfe63dheg6gdr5xxye