Filters








11 Hits in 3.5 sec

DNA Steganalysis Using Deep Recurrent Neural Networks [article]

Ho Bae, Byunghan Lee, Sunyoung Kwon, Sungroh Yoon
2018 arXiv   pre-print
Using deep recurrent neural networks (RNNs), our framework identifies the distribution variations by using the classification score to predict whether a sequence is to be a coding or non-coding sequence  ...  To address this limitation, we propose a general sequence learning-based DNA steganalysis framework.  ...  17 ) using deep recurrent neural networks (RNNs).  ... 
arXiv:1704.08443v3 fatcat:o6vvte3turd2rd7643xtkceglu

DNA Steganalysis Using Deep Recurrent Neural Networks

Ho Bae, Byunghan Lee, Sunyoung Kwon, Sungroh Yoon
2018 Biocomputing 2019  
Using deep recurrent neural networks (RNNs), our framework identifies the distribution variations by using the classification score to predict whether a sequence is to be a coding or non-coding sequence  ...  To address this limitation, we propose a general sequence learning-based DNA steganalysis framework.  ...  17 ) using deep recurrent neural networks (RNNs).  ... 
doi:10.1142/9789813279827_0009 fatcat:rg5glh2ubfep3jynlw5cbsxa3q

A Survey of Image Information Hiding Algorithms Based on Deep Learning

Ruohan Meng, Qi Cui, Chengsheng Yuan
2018 CMES - Computer Modeling in Engineering & Sciences  
It is divided into four parts of steganography algorithms, watermarking embedding algorithms, coverless information hiding algorithms and steganalysis algorithms based on deep learning.  ...  Image information hiding is to make use of the redundancy of the cover image to hide secret information in it.  ...  [Bae, Lee, Kwon et al. (2017) ] mainly use deep recurrent neural networks to simulate the internal structure of DNA sequences by extracting hidden layers composed of circulating neural networks (RNNs).  ... 
doi:10.31614/cmes.2018.04765 fatcat:tvmits2gdrb4xesfswtr275wpy

DNA Privacy: Analyzing Malicious DNA Sequences using Deep Neural Networks

Ho Bae, Seonwoo Min, Hyun-Soo Choi, Sungroh Yoon
2020 IEEE/ACM Transactions on Computational Biology & Bioinformatics  
To address the limitations of conventional approaches, a sequence-learning-based malicious DNA sequence analysis method based on neural networks has been proposed.  ...  Recent advances in next-generation sequencing technologies have led to the successful insertion of video information into DNA using synthesized oligonucleotides.  ...  (i.e., intron and exon modeling using recurrent neural networks (RNNs).  ... 
doi:10.1109/tcbb.2020.3017191 pmid:32809941 fatcat:spav3iisjfdnvcc6tlrwolx4wa

Digital image steganography and steganalysis: A journey of the past three decades

Aditya Kumar Sahu, Monalisa Sahu
2020 Open Computer Science  
Conversely, steganalysis is the study of uncovering the steganographic process. The evolution of steganography has been paralleled by the development of steganalysis.  ...  In this game of hide and seek, the two player's steganography and steganalysis always want to break the other down.  ...  Until now, the count of such techniques that use ML-based algorithms like CNN, artificial neural network, recurrent neural network, and deep learning are very few.  ... 
doi:10.1515/comp-2020-0136 fatcat:24hkc66e6fcqldeh4b3ivzjn3m

An Encrypted Speech Retrieval Scheme Based on Long Short-Term Memory Neural Network and Deep Hashing

2020 KSII Transactions on Internet and Information Systems  
In this paper, we proposed an encrypted speech retrieval scheme based on long short-term memory (LSTM) neural network and deep hashing.  ...  Secondly, the integrated LSTM network model and deep hashing algorithm are used to extract high-level features of speech data.  ...  [21] proposed a convolution recurrent neural network that can directly use time domain waveform as input to urban sound classification.  ... 
doi:10.3837/tiis.2020.06.016 fatcat:alfme7ukibd3tjgxswt3xvprxe

2020 Index IEEE Transactions on Information Forensics and Security Vol. 15

2020 IEEE Transactions on Information Forensics and Security  
Saxena, N., +, TIFS 2020 1470-1485 BioTouchPass2: Touchscreen Password Biometrics Using Time-Aligned Recurrent Neural Networks.  ...  Wang, G., +, TIFS 2020 375-390 On-the-Fly Finger-Vein-Based Biometric Recognition Using Deep Neural Networks.  ...  G Gait analysis Deep Learning-Based Gait Recognition Using Smartphones in the Wild.  ... 
doi:10.1109/tifs.2021.3053735 fatcat:eforexmnczeqzdj3sc2j4yoige

A Review on Text Steganography Techniques

Mohammed Abdul Majeed, Rossilawati Sulaiman, Zarina Shukur, Mohammad Kamrul Hasan
2021 Mathematics  
To address this issue, it is necessary to change the document in such a manner that the change would not be visible to the eye, but could still be decoded using a computer.  ...  24 RNN-Stega: linguistic steganography based on recurrent neural networks [63] Linguistic Automatically generated text covers secret (RNN). bitstream based on recurrent neural networks 2020 Capacity 25  ...  Recurrent Neural Networks (RNN-Stega) was proposed in [63] , creating text covers automatically using a discrete bitstream.  ... 
doi:10.3390/math9212829 doaj:b8cb29df8ae44b2fb8aab4173ec498b3 fatcat:xudvbcx6hzfnxbskvbekr3xjqa

Digital Video Tampering Detection and Localization: Review, Representations, Challenges and Algorithm

Naheed Akhtar, Mubbashar Saddique, Khurshid Asghar, Usama Ijaz Bajwa, Muhammad Hussain, Zulfiqar Habib
2022 Mathematics  
The state-of-the-art research work is analyzed extensively, highlighting the pros and cons and commonly used datasets.  ...  [94] combined a CNN and recurrent neural network to detect video forgery.  ...  [81] performed detection using auto-encoders and a recurrent neural network. The authors used only 10 videos for experiments.  ... 
doi:10.3390/math10020168 fatcat:oznmjpt7qvesdoauboa5zptgma

Introduction. The Mediality of Concealment: Material Practices and Symbolic Operativity

Nathalie Casemajor, Sophie Toupin
2018 intermédialités  
Steganalysis Using Deep Recurrent Neural Networks," ArXiv Preprint, https://arxiv.org/abs/1704.08443 (accessed 28 July 2018).  ...  The series Clear, Deep, Dark (2018) contrasts different facets of the Web, from the easily accessible surface to the deep ramifications of the network and the obscured territories of virtual private  ... 
doi:10.7202/1058467ar fatcat:vzrtyywrdnab5pwscoscecvaru

An Evaluation of Entropy Measures for Microphone Identification

Gianmarco Baldini, Irene Amerini
2020 Entropy  
Various approaches have been used in literature to deal with it, ranging from the application of handcrafted statistical features to the recent application of deep learning techniques.  ...  Abbreviations The following abbreviations are used in this manuscript:  ...  Acknowledgments: This work acknowledges Directorate I of the EC DG JRC for the provision of a significant portion of the phones used in this analysis.  ... 
doi:10.3390/e22111235 pmid:33287003 fatcat:g23bfvvgmfe63dheg6gdr5xxye