Loading

Secret Data Hiding using Artificial Neural Networks and Discrete Wavelet Transform
Shivank Tiwari1, Nipun Mittal2, Nupur Garg3, Tribhuwan Kumar Tewari4, Manish K Thakur5

1Shivank Tiwari, Department of CSE and IT, Jaypee Institute of Information Technology, Noida (U.P), India.
2Nipun Mittal, Department of CSE and IT, Jaypee Institute of Information Technology, Noida (U.P), India.
3Nupur Garg, Department of CSE and IT, Jaypee Institute of Information Technology, Noida (U.P), India.
4Dr. Tribhuwan Kumar Tewari, Department of CSE and IT, Jaypee Institute of Information Technology, Noida (U.P), India.
5Dr. Manish K Thakur, Department of CSE and IT, Jaypee Institute of Information Technology, Noida (U.P), India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 649-656 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7192068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Sensitive information requires safe and secure transmission. To hide such information, cryptographic models are used which require a set of keys in their working. Maintaining such keys itself is costly and securing them adds to the task of security. Also, such models are specific to a particular type of information that can be hidden i.e. not dynamic in working. The proposed interface omits the use of these complex mathematical models instead uses Neural Networks for data hiding. In this technique during the training phase of the network, it is subjected to a variety of data and once trained can be utilized to encrypt or decrypt the information of any size irrespective of what was used in training set. Once encrypted, it is concealed in a cover image using steganography and Discrete Wavelet Transform. This all being done at senders end, it is now transmitted over any channel to the designated receiver. After receiving the stegano image, a similar process is operated and thus we receive our secret message. For better results and analysis we incorporated our focus on the type of network, number of neurons, number of layers, simplicity and on parameters such as Peak Signal to Noise Ratio (PSNR). The proposed method shows greater flexibility in operation and low maintenance in regard to other crypto methods. The suggested technique would be suitable to incorporate in scenarios requiring least suspicion during an exchange of information and hence less prone to attackers. It would be easy to utilize on public modes of communication as sensitive information would be hidden in any media file which will appear just like some other normal media file.
Keywords: Cryptography, Discrete Wavelet transform (DWT), Neural Networks, Steganography

Scope of the Article: Neural Information Processing