References
Additional References
These contain more detailed explaintions on concepts that we have used.
Autoencoders:
Nice set of video lectures from NPTEL which describe how Auto-enocders work in detail.
Crpytography:
You can have a look at Coursera Course from Stanford University.
Credits
-
Autoencoder Image in docs is taken from Neural Network Projects with Python, James Loy
-
This is docs built using mkdocs.org.
-
Google Colab for model training and notebooks !
Citations
-
Volna, Eva and Kotyrba, Martin and Kocian, Vaclav and Janosek, Michal, “Cryp- tography Based On Neural Network,“10.7148/2012-0386-0391, May 2012.
-
Martin Abadi and David G. Andersen, “ Learning to Protect Communications using Adverserial Neural Cryptography, “ arXiv:1610.06918v1, October 2016.
-
Dayiheng Liu, J.Lv, Xiaofeng Qi and Jiangshu Wei, “ A neural words encoding model, “ 2016 International Joint Conference on Neural Networks (IJCNN), pp 532–536, July 2016.
-
P. Saraswat, K. Garg, K. Oka, R. Tripathi and A. Agarwal, “Encryption Algorithm Based on Neural Network, vol “, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU),pp 1–5, April 2019.
-
Theo Ryffel, Andrew Trask, Morten Dahl, Bobby Wagner, Jason Mancuso, Daniel Rueckert and Jonathan Passerat-Palmbach, “ A generic framework for privacy pre- serving deep learning “, arXiv:1811.04017, 2018.
-
Ajit Singh and Aarti nandal “ Neural Cryptography for Secret Key Exchange and Encryption with AES “, International Journal of Advanced Research in Computer Science and Software Engineering, ISBN 2277 128X, Volume 3, Issue 5,pp 376-381, May 2013.
-
Qutaiba Ali and Shefa A. Dawwd, “ On demand ciphering engine using artificial neural network, “ Int. Arab J. Inf. Technol., Volume 13, pp 462–470, 2016
-
Shweta Joshi and Vishwanath Udupi and Dipesh Joshi, “A novel neural network approach for digital image data encryption/decryption “, 2012 International Con- ference on Power, Signals, Controls and Computation, pp 1–4, 2012.
-
R. Yegireddi and R. K. Kumar “A survey on conventional encryption algorithms of Cryptography“, 2016 International Conference on ICT in Business Industry Gov- ernment (ICTBIG), pp 1–4, 2016.
-
Mushtaq, Muhammad and Jamel, Sapiee and Disina, Abdulkadir and Pindar, Zahraddeen and Shakir, Nur and Mat Deris, Mustafa, “ A Survey on the Cryp- tographic Encryption Algorithms “, International Journal of Advanced Computer Science and Applications, Volume 8, pp 333–344, November 2017.
-
F. J. D’souza and D. Panchal, “ Advanced encryption standard (AES) security en- hancement using hybrid approach “, 2017 International Conference on Computing, Communication and Automation (ICCCA), pp 647–652, 2017.
-
N. Provos, ”A Virtual Honeypot Framework”, Proc. Usenix Security Conf., 2004.