scholarly journals A Survey of the Various Steganography Techniques Using Soft Computing Techniques

Author(s):  
Er. Savita Devi

Steganography is the method of storing information by hiding that information’s existence. It can be used to carry out hidden exchanges and hence can enhance individual privacy. Steganography aims at communicating the secret data in an appropriate multimedia carrier. In this paper, the various techniques used to perform Steganography in a secure way are studied and reviewed. In this the various Artificial Intelligence techniques used for steganography are reviewed and analyzed.

Author(s):  
VICENÇ TORRA ◽  
JOSEP DOMINGO-FERRER

As e-commerce and Internet-based data handling become pervasive, companies and statistical agencies have the need to exploit the data they accumulate without violating citizens' privacy. Inference control is a discipline whose goal is to prevent published/exchanged data from being linked with the individual respondents they originated from. This special issue illustrates that inference control largely draws on soft computing and artificial intelligence techniques.


Author(s):  
Avinash Kumar ◽  
Abhishek Kumar ◽  
Arun Prasad Burnwal

Artificial Intelligence (AI) is a part of computer science concerned with designing intelligent computer systems that exhibit the characteristics used to associate with intelligence in human behavior. Basically, it define as a field that study and design of intelligent agents. Traditional AI approach deals with cognitive and biological models that imitate and describe human information processing skills. This processing skills help to perceive and interact with their environment. But in modern era developers can build system that assemble superior information processing needs of government and industry by choosing from large areas of mature technologies. Soft Computing (SC) is an added area of AI. It focused on the design of intelligent systems that process uncertain, imprecise and incomplete information. It applied in real world problems frequently to offer more robust, tractable and less costly solutions than those obtained by more conventional mathematical techniques. This paper reviews correlation of artificial intelligence techniques with soft computing in various areas.


Author(s):  
Shashi Bhushan

This paper presents an enhanced system in the field of text identification using Soft computing techniques. The model designed in this work analyzes the blogs or input text and classifies the personality into five major categories; Neuroticism, Extraversion, Openness, Conscientiousness and Agreeableness. The blog or text is first passed through POS tagger then a feature vector matrix is generated according to the attributes of the personality chart. Each column of FVM is calculated in its domain that improves the final result of personality identification. The result of the proposed model is improvement over similar work by other researchers [1, 2, 3].


Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


Sign in / Sign up

Export Citation Format

Share Document