Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
6001CEM-DEEP-STEGANOGRAPHY/README.md
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
35 lines (21 sloc)
2.25 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# ADAPTIVE STEGANOGRAPHY USING DEEP LEARNING TECHNIQUES | |
# OVERVIEW | |
This projects implements deep steganography techniques and integrates them with existing steganography methods. The project is designed to hide messages within images and extract them to ensure visual similarity and security between original and embedded images. The project uses Convulational Neural Networks and uses three existing image steganography methods which are Least Significant Bit (LSB), Discrete Cosine transform (DCT) and Spatial Universal Wavelet Relative distortion (S-UNIWARD). The projects compares between the original methods and the methods integrated with deep learning to answer the research question while also meeting the objectives stated in the Dissertation Document. | |
![image](https://github.coventry.ac.uk/storage/user/5140/files/d3dbbd8e-f1b9-4dc0-b001-d6988ca2df4c) | |
# AUTHORS | |
Rutendo Beverly Musara | |
Student ID: 9733633 | |
# INSTALLATIONS | |
The main enviroment used for this project was [Jupyter Notebook](https://jupyter.org/) | |
# ACKNOWGEMENTS | |
I would like to acknowledge [Coventry University](https://www.coventry.ac.uk/) as this Dissertation is submitted on the behalf of this Univeristy | |
[Dr Norlaily Yaacob](https://www.coventry.ac.uk/life-on-campus/staff-directory/engineering-environment-and-computing/dr-norlaily-yaacob/) - Project Supervisor who helped me with this project | |
[Liang Wang](https://figshare.com/authors/Liang_Wang/5169563) - Developed this dataset used for this project | |
[Figshare](https://figshare.com/articles/dataset/An_Novel_Image_Steganography_Method_via_Deep_Convolutional_Generative_Adversarial_Networks/6216326) - Obtained dataset from this database platform | |
# LICENSES | |
The dataset used for this Disseration was licensed by [CC BY 4.0 DEEDS](https://creativecommons.org/licenses/by/4.0/) | |
Copyright (c) Project Jupyter Contributors. | |
Distributed under the terms of the 3-Clause BSD License. | |
This project is licensed under the [MIT](https://github.coventry.ac.uk/musarar/6001CEM-DEEP-STEGANOGRAPHY/blob/main/LICENSE) license | |
LICENCES FOR THE STEGANOGRAPHY TOOLS USED IN THE PROJECT [Aperisolve](https://github.com/Zeecka/AperiSolve/blob/master/LICENSE) And | |
[FotoForensics](https://fotoforensics.com/analysis.php?id=b559b5bf8ef5f99a29ee4661e96d5e7dd1a6a70e.27952&show=ela) |