Enhancing Steganography Through Deep Learning Approaches
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Data encryption > Enhancing Steganography Through Deep Learning Approaches: (Advances in Information Security, Privacy, and Ethics)
Enhancing Steganography Through Deep Learning Approaches: (Advances in Information Security, Privacy, and Ethics)

Enhancing Steganography Through Deep Learning Approaches: (Advances in Information Security, Privacy, and Ethics)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

In an era defined by digital connectivity, securing sensitive information against cyber threats is a pressing concern. As digital transmission systems advance, so do the methods of intrusion and data theft. Traditional security measures often need to catch up in safeguarding against sophisticated cyber-attacks. This book presents a timely solution by integrating steganography, the ancient art of concealing information, with cutting-edge deep learning techniques. By blending these two technologies, the book offers a comprehensive approach to fortifying the security of digital communication channels. Enhancing Steganography Through Deep Learning Approaches addresses critical issues in national information security, business and personal privacy, property security, counterterrorism, and internet security. It thoroughly explores steganography's application in bolstering security across various domains. Readers will gain insights into the fusion of deep learning and steganography for advanced encryption and data protection, along with innovative steganographic techniques for securing physical and intellectual property. The book also delves into real-world examples of thwarting malicious activities using deep learning-enhanced steganography. This book is tailored for academics and researchers in Artificial Intelligence, postgraduate students seeking in-depth knowledge in AI and deep learning, smart computing practitioners, data analysis professionals, and security sector professionals. It is a valuable resource for those looking to incorporate advanced security measures into their products and services. With a focus on practical insights and real-world applications, this book is an essential guide for understanding and implementing steganography and deep learning techniques to enhance security in digital transmission systems.

About the Author :
Vijay Kumar is Associate Professor and HoD in Information Technology Department, Dr B R Ambedkar NIT Jalandhar, Punjab. He received his Ph.D. degree from NIT Kuruksherta. Previously, he received M.Tech. and B.Tech. degrees from GJUS&T, Hisar and Kurukshetra University Kurukshetra, respectively. He has more than 3 years of teaching and research experience at NIT Hamirpur. Prior, he had 12 years of teaching experience in various reputed institutes like Manipal University Jaipur and Thapar University Patiala. He completed 2 DST SERB and 1 CSIR-sponsored research projects. He has published more than 180 research papers in International Journals/Conferences. He has many book chapters in international repute publishers. He has supervised many Ph.D. and M.Tech. thesis on Metaheuristics, Image Mining, and Data Clustering. He is the reviewer of several reputed SCI journals. He is member of ACM, CSI, International Association of Engineers, International Association of Computer Science and Information Technology, Singapore. His current research area is Soft Computing, Data Mining, Deep Learning, Steganography, and Pattern Recognition. Chiranji Lal Chowdhary is a Professor in the SCORE at VIT University, where he has been since 2010. He received a B.E. (CSE) from MBM Engineering College (currently named MBM University) at Jodhpur, and M. Tech. (CSE) from the M.S. Ramaiah Institute of Technology in Bangalore. He received his PhD in Information Technology and Engineering from the VIT University Vellore. From 2006 to 2010 he worked at MSRIT in Bangalore, eventually as a Lecturer. His research interests span both computer vision and image processing. Much of his work has been on images, mainly through the application of image processing, computer vision, pattern recognition, machine learning, biometric systems, deep learning, soft computing, and computational intelligence. Professor Chowdhary is editor/co-editor of 8 books and is the author of over forty articles on computer science. He filed four patents deriving from his research. Austrian Science Fund (FWF), Vienna, Austria identified him as International Reviewer forlong-term funding projects at Austria. He also has an ongoing sponsored project from British council through SPARC as Co-PI. Srinath Doss is the Professor and Dean in the Faculty of Engineering and Technology, Botho University, responsible for Botswana, Lesotho, Eswatini, Namibia and Ghana Campuses. He has previously worked with various reputed Engineering colleges in India, and with Garyounis University, Libya. He has written good number of books and more than 80 papers in International Journals and attended several prestigious conferences. His research interests include MANET, Information Security, Network Security and Cryptography, Artificial Intelligence, Cloud Computing and Wireless and Sensor Network. He serves as an editorial member and reviewer for reputed international journals, and an advisory member for various prestigious conference. Prof. Srinath is member of IAENG and Associate Member in UACEE. Sandeep Singh Sengar is a Senior Lecturer and Head of Computer Vision and Artificial Intelligence at Cardiff Metropolitan University, United Kingdom. He also holds the position of Cluster Leader for Computer Vision/Image Processing and British Computer Society representative at this place. Before joining this position, he worked as a Postdoctoral Research Fellow at the Machine Learning Section of the Computer Science Department, at the University of Copenhagen, Denmark. He completed his Ph.D. degree in Computer Vision at the Department of Computer Science and Engineering from the Indian Institute of Technology (ISM), Dhanbad, India, and an M. Tech. degree from Motilal Nehru National Institute of Technology, Allahabad, India. He is also a Fellow of UK Higher Education Academy, a Senior Member of IEEE, and a Professional Member of ACM. Dr. Sengar’s broader research interests include Machine/Deep Learning, Computer Vision, Image/Video Processing, and its applications. He has published several research articles in reputable international journals and conferences. He is an Editorial Board Member, Guest Editor, and Reviewer at reputable International Journals. He is a reviewer of research grants at EPSRC and Cardiff Met. He is a Board of Studies Member at Universal AI University, Mumbai, India. He is on the Ph.D. examiner panel of many reputable universities like the University of South Wales Cardiff, Indian Institute of Technology (IIT) Patna, National Institute of Technology (NIT) Hamirpur, NIT Srinagar, NIT Jalandhar, Visvesvaraya Technological University, Karnataka, Dr. A. P. J. Abdul Kalam Technical University Lucknow, Madan Mohan Malaviya University of Technology Gorakhpur, etc. He has also served as an Organizing Chair, Distinguished Guest, Publicity Chair, Publication & Technical Chair, and Committee Member (Steering, International Advisory, Scientific, and Technical Program) at International Conferences. In addition to these, he has also given many expert talks at different organizations and International Conferences across the globe.


Best Sellers


Product Details
  • ISBN-13: 9798369322253
  • Publisher: IGI Global
  • Publisher Imprint: Information Science Reference
  • Language: English
  • Series Title: Advances in Information Security, Privacy, and Ethics
  • ISBN-10: 8369322255
  • Publisher Date: 04 Nov 2024
  • Binding: Digital download and online
  • No of Pages: 434


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Enhancing Steganography Through Deep Learning Approaches: (Advances in Information Security, Privacy, and Ethics)
IGI Global -
Enhancing Steganography Through Deep Learning Approaches: (Advances in Information Security, Privacy, and Ethics)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Enhancing Steganography Through Deep Learning Approaches: (Advances in Information Security, Privacy, and Ethics)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!