Page 24 - Handbook of Deep Learning in Biomedical Engineering Techniques and Applications
P. 24
12 Chapter 1 Congruence of deep learning in biomedical engineering
utilized to shroud messages inside different innocuous messages.
It does not permit an antagonist to recognize that there is
another hidden message. Steganography is ideal for concealing
top-secret information in precise transporter data. Steganogra-
phy is significant at shrouding information in media such as
models, pictures, sound, video, text, and so on.
3.1.1.2 Watermarking
This is a method for concealing data via transporter media,
which utilizes an advanced medium. In general, watermarking
is applied in noticeable media, for example, pictures and videos;
however, in advanced watermarking the sign might be sounds,
videos, text, and so forth. Watermarking and fingerprinting are
both advancements that are firmly connected with steganogra-
phy. Watermarking are for the most part frightened with insur-
ance of scholarly effects. In watermarking the whole item is
“stamped.” Articles shroud the data when using watermarking,
which commonly indicates establishment or ownership of copy-
right assurance. Be that as it may, in another way, different marks
are inserted in various duplicates of the transporter media. They
are flexibly toward various shoppers in fingerprinting.
3.1.1.3 Cryptography
Cryptography implies that the sender changes the plain text
into figure text, transporting the encryption key to the recipient
who unscrambles the figure text into plain text. Cryptography is
utilized for developing and depicting conventions that maintain
a strategic distance from the outsider open from understanding
the mystery message; distinctive viewpoint in information secu-
rity which is privacy, confirmation, uprightness and nonrevoca-
tion. Present cryptography make due in the orders of crossing
point of mathematic, Comp Sc.,ETC, material science and inter-
changes and so forth.
3.2 Advantages of steganography over
cryptography
A cryptography key is utilized to decipher a message that is
known uniquely by the approved individual. The constraint of
cryptography is that the message could be decoded by other in-
dividuals. Cryptography adjusts the structure of the private mes-
sage but does not change its structure. To defeat this restriction,
steganography was developed. Steganography consistently covers
the assurance of messages, while cryptography clutters messages