( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311

**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 12    Submit Your Rating     Cite This   Download        Certificate


    1 Author(s):  DR P.SHANTHI

Vol -  10, Issue- 1 ,         Page(s) : 51 - 57  (2020 ) DOI :


Sensitive information requires safe and secure transmission. To hide such information, cryptographic models are used which require a set of keys in their working. Maintaining such keys itself is costly and securing them adds to the task of security. Also, such models are specific to a particular type of information that can be hidden i.e. not dynamic in working. The proposed interface omits the use of these complex mathematical models instead uses Neural Networks for data hiding. In this technique during the training phase of the network, it is subjected to a variety of data and once trained can be utilized to encrypt or decrypt the information of any size irrespective of what was used in training set. This all being done at senders end, it is now transmitted over any channel to the designated receiver. For better results and analysis we incorporated our focus on the type of network, number of neurons, number of layers, simplicity and on parameters such as Peak Signal to Noise Ratio (PSNR). The proposed method shows greater flexibility in operation and low maintenance in regard to other crypto methods. The suggested technique would be suitable to incorporate in scenarios requiring least suspicion during an exchange of information and hence less prone to attackers. It would be easy to utilize on public modes of communication as sensitive information would be hidden in any media file which will appear just like some other normal media file.

1. P.Shanthi, R.S Bhuvaneswaran “Robust Chaos Based Image watermarking Scheme For Fractal-Wavelet” is published in Applied Mathematical Sciences Vol. 8 No.32,1593-1604  (2014).  
2. P.Shanthi, R.S Bhuvaneswaran “Dual Image Watermarking Based on  DWT-SVD ” is  published an  “International Journal of Future Innovative Science and      Engineering Research (IJFISER) ” Volume-2, Issue-4, Dec - 2016.
3. P.Shanthi,  “Chaotic based Image Cryptography using Wavelet Transform” is  published an  “International Journal of Engineering Research in Computer Science  and Engineering ” Volume-5, Issue-3, (2018).
4.  T. Gao, Z. Chen, "Image encryption based on a new total shuffling algorithm," Chaos, Solitons and Fractals 38, pp. 213–22,2006.
5. Ismail IA, Amin M, Diab H. A digital image encryption algorithm based a composition of two chaotic logistic maps. IJ Network Security. 2010;11(1):1–10.
6. Tedmori S, Al-Najdawi N. Lossless image cryptography algorithm based on discrete cosine transform. Int Arab J of Technol. 2012; 9(5):471–8.
7. S. Zaboli and M. S. Moin, “CEW: A non-blind adaptive image watermarking approach based on entropy in contourlet domain,” in Proc. 2007 IEEE Int. Symp. Ind. Electron., 2007, pp. 1687–1692.

*Contents are provided by Authors of articles. Please contact us if you having any query.


Bank Details