Search In this Thesis
   Search In this Thesis  
العنوان
A deep steganography approach to secure data transmission in ad-hoc cloud systems /
المؤلف
Ahmed Mohamed Adel-Mawgoud Mohamed,
هيئة الاعداد
باحث / Ahmed Mohamed Adel-Mawgoud Mohamed
مشرف / Amira Kotb
مشرف / Mohamed Hamed N. Taha
مناقش / Passent El-Kafrawy
الموضوع
Information Technology
تاريخ النشر
2022.
عدد الصفحات
97 leaves. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Computer Science (miscellaneous)
تاريخ الإجازة
5/7/2022
مكان الإجازة
جامعة القاهرة - كلية الحاسبات و المعلومات - CLOUD NETWORKS TECHNOLOGY
الفهرس
Only 14 pages are availabe for public view

from 10

from 10

Abstract

In the early days of digital transformation, the automation, scalability, and
availability of cloud computing made a big difference for business. Nonetheless,
significant concerns have been raised regarding the security and privacy levels that
cloud systems can provide, as enterprises have accelerated their cloud migration
journeys in an effort to provide a remote working environment for their employees,
primarily in light of the COVID-19 outbreak. The goal of this thesis is to come up with
a way to improve steganography in ad hoc cloud systems by using deep learning. This
research implementation is divided into two phases. In phase 1, the ”Ad-hoc Cloud
System” idea and deployment plan were set up with the help of V-BOINC. In Phase 2,
a modified form of steganography and deep learning were used to study the security
of data transmission in ad-hoc cloud networks. In the majority of prior studies,
attempts to employ deep learning models to augment or replace data-hiding systems
did not achieve a high success rate. The implemented model inserts data images
through colored images in the developed ad-hoc cloud system. A systematic
steganography model conceals from statistics lower message detection rates. In
addition, it may be necessary to embed small images beneath large cover images. The
implemented ad-hoc system has delivered a well-stable performance compared to
Amazon AC2, and the execution of the proposed deep steganography approach
provided a high rate of evaluation in concealing both data and images when tested
against various attacks in an ad-hoc cloud system environment.