Skip to content

References

Additional References

These contain more detailed explaintions on concepts that we have used.

Autoencoders:

Nice set of video lectures from NPTEL which describe how Auto-enocders work in detail.

Crpytography:

You can have a look at Coursera Course from Stanford University.

Credits

  1. Autoencoder Image in docs is taken from Neural Network Projects with Python, James Loy

  2. This is docs built using mkdocs.org.

  3. Google Colab for model training and notebooks !

Citations

  1. Volna, Eva and Kotyrba, Martin and Kocian, Vaclav and Janosek, Michal, “Cryp- tography Based On Neural Network,“10.7148/2012-0386-0391, May 2012.

  2. Martin Abadi and David G. Andersen, “ Learning to Protect Communications using Adverserial Neural Cryptography, “ arXiv:1610.06918v1, October 2016.

  3. Dayiheng Liu, J.Lv, Xiaofeng Qi and Jiangshu Wei, “ A neural words encoding model, “ 2016 International Joint Conference on Neural Networks (IJCNN), pp 532–536, July 2016.

  4. P. Saraswat, K. Garg, K. Oka, R. Tripathi and A. Agarwal, “Encryption Algorithm Based on Neural Network, vol “, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU),pp 1–5, April 2019.

  5. Theo Ryffel, Andrew Trask, Morten Dahl, Bobby Wagner, Jason Mancuso, Daniel Rueckert and Jonathan Passerat-Palmbach, “ A generic framework for privacy pre- serving deep learning “, arXiv:1811.04017, 2018.

  6. Ajit Singh and Aarti nandal “ Neural Cryptography for Secret Key Exchange and Encryption with AES “, International Journal of Advanced Research in Computer Science and Software Engineering, ISBN 2277 128X, Volume 3, Issue 5,pp 376-381, May 2013.

  7. Qutaiba Ali and Shefa A. Dawwd, “ On demand ciphering engine using artificial neural network, “ Int. Arab J. Inf. Technol., Volume 13, pp 462–470, 2016

  8. Shweta Joshi and Vishwanath Udupi and Dipesh Joshi, “A novel neural network approach for digital image data encryption/decryption “, 2012 International Con- ference on Power, Signals, Controls and Computation, pp 1–4, 2012.

  9. R. Yegireddi and R. K. Kumar “A survey on conventional encryption algorithms of Cryptography“, 2016 International Conference on ICT in Business Industry Gov- ernment (ICTBIG), pp 1–4, 2016.

  10. Mushtaq, Muhammad and Jamel, Sapiee and Disina, Abdulkadir and Pindar, Zahraddeen and Shakir, Nur and Mat Deris, Mustafa, “ A Survey on the Cryp- tographic Encryption Algorithms “, International Journal of Advanced Computer Science and Applications, Volume 8, pp 333–344, November 2017.

  11. F. J. D’souza and D. Panchal, “ Advanced encryption standard (AES) security en- hancement using hybrid approach “, 2017 International Conference on Computing, Communication and Automation (ICCCA), pp 647–652, 2017.

  12. N. Provos, ”A Virtual Honeypot Framework”, Proc. Usenix Security Conf., 2004.