A Reliable Transmission and Extraction of Textual Information Using Keyless Encryption, Steganography, and Deep Algorithm with Cuckoo Optimization

dc.contributor.authorPandey, B.K.
dc.contributor.authorPandey, D.
dc.contributor.authorAlkhafaji, M.A.
dc.contributor.authorGüneser, M.T.
dc.contributor.authorSeker, C.
dc.date.accessioned2024-09-29T16:21:14Z
dc.date.available2024-09-29T16:21:14Z
dc.date.issued2023
dc.departmentKarabük Üniversitesien_US
dc.description6th International Conference on Microelectronics and Telecommunication Engineering, ICMETE 2022 -- 1 June 2023 through 2 June 2023 -- Ghaziabad -- 296819en_US
dc.description.abstractThe entire work postulates a fusion of an innovative keyless image encoding approach based on a chaotic map and steganography. Nearly every single picture element has been encrypted by rearranging pixel values that are then assessed by such an adapted cat map as well as steganography has been used in the suggested methodology to transmit keyless encoded textual information utilizing a cover image, with encoded textual image information inserted into cover images. But on the other hand, retrieving textual images embedded in the receiver has indeed been regarded as the most challenging process. Furthermore, a sender will indeed transfer reasoning rather than a key to the recipient, ignoring the fact that acquiring engrained textual information hidden inside the cover image to enhance efficiency would have been challenging. Steganography was easily accomplished by placing data bits of secret textual image information into the cover image’s least significant bit of picture elements. The image quality, on the other hand, suffers greatly from the inclusion of an encrypted message. Images could indeed cause some disturbances from time to time. As a consequence, non-smooth areas of the image have been regarded as smooth. Therefore, the weighted Naive Bayes algorithm (NBA) method is being used in the illustration to retrieve the appropriate textual image information from complicated deteriorated images. Normally, images comprise a small amount of noise, so the introduction of the guided filter (GF) during the initial preprocessing phase is required. A very important feature in the textual image information extraction procedure was obtained utilizing a variety of techniques, including Gabor transform (GT), weighted Naive Bayes algorithms (WNBA), and a high-quality learning procedure for standard procedure. Eventually, textual content identification and recognition are performed using a combination of DNN and cuckoo algorithms. Again, for the proposed system, the set of data IIIT5K is being used, as well as high performance has been gained with parameters such as mean square error and peak signal-to-noise ratio. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.en_US
dc.identifier.doi10.1007/978-981-19-9512-5_57
dc.identifier.endpage636en_US
dc.identifier.isbn978-981199511-8
dc.identifier.issn2367-3370
dc.identifier.scopus2-s2.0-85165038234en_US
dc.identifier.scopusqualityQ4en_US
dc.identifier.startpage629en_US
dc.identifier.urihttps://doi.org/10.1007/978-981-19-9512-5_57
dc.identifier.urihttps://hdl.handle.net/20.500.14619/9634
dc.identifier.volume617 LNNSen_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.relation.ispartofLecture Notes in Networks and Systemsen_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectData transmissionen_US
dc.subjectHybrid convolution neural networken_US
dc.subjectKeyless encryptionen_US
dc.subjectSecurityen_US
dc.subjectSteganographyen_US
dc.titleA Reliable Transmission and Extraction of Textual Information Using Keyless Encryption, Steganography, and Deep Algorithm with Cuckoo Optimizationen_US
dc.typeConference Objecten_US

Dosyalar