Implementing Data Hiding Approach by Neural Network and Retrieval of Audio , Video and Text Files

Authors

  • Komal Tahiliani  Computer science, People's University, Bhopal, Madhya pradesh, India
  • Dr. N. K.Tiwari  Director, Bansal Institute of science and Technology, Bhopal, Madhya Pradesh, India

Keywords:

Data Hiding, Neural Network, MLP

Abstract

Hiding Messages in image data, which is generally known as Steganography is used for both illegal and legal scenarios. In such applications various file formats are used as cover-object which contains confidential data. As the new research field the techniques introduces Artificial Neural Network.. This newly developed technique uses Multilayer Perceptron algorithm of Neural Network for data security. Results are observed through different Media file as cover-objects. In the proposed method, MLP algorithm is implemented with traditional substitution method to obtain high embedding capacity with no visibility. The system provides confidentiality and integrity to the data during communication through open channels.

References

  1. Arup Kumar Bhaumik, Minkyu Choi,Rosslin J.Robles and Maricel O.Balitanas. "Data Hiding in video" International journal of Database Theory and Application vol.2, No.2 June 2009.pp 9-14
  2. Jacob T. Jackson, Gregg H. Gunsch, Roger L. Claypoole, and Gary B.Lamont.:Novel Steganography Detection Using an Artificial Immune System Approach" IEEE 2010
  3. Poulami Dutta, Debnath Bhattacharyya and Tai-hoon Kim."Data hiding in Audio Signal".International Journal of Database theory and Application vol.2,No.2 June2009 pp.1-8
  4. Shan Wang,Bian Yang and Xiamu Niu ."A secure Steganography Method based on Genetic Algorithm" Journal of Information Hiding and Multimedia Signal Processing ,’Ubiquitous International’,ISSN2073-4212 ,Volume 1 Number 1 ,2010, pp:323-322.
  5. Encryption, Data Hiding, and Hostile Code. In Write Work.com. Retrieved 02:12, October 24, 2012
  6. Jammi Ashok, y.Raju k.Srinivas "Steganography: an overview" International Journal of Engineering Science and Technology Vol. 2(10), 2010pp: 5985-5992
  7. W.Bender,D.Gruhl,N.Morimoto,A.lu. "Techniques for data hiding" IBM System Journal, Vol 35,No. 3&4,1996 pp:313-336
  8. M.S Shashidhara,A.Pandurangan,Suhasini CHV "Data hiding and retrival of Encrypted file in Images and videos using ANN methods Int.J.Advanced Networking and Applications Vol.02,Issu:02,2010, pp:544-549
  9. Abbas Cheddad,Joan Condell,Kenvin Curran,Paul Mc Kevitt."Digital image stegnogrphy:survey and analysis of current methods".SIgnal processI 90 2010 pp: 727-752
  10. Jayaram P.,Ranganatha H.R,Anuppama H S ."Information Hiding using Audio Steganography".The international Journal of Multimedia & Its Application (IJMA) Vol.3, No.3 August 2011,pp-86-96,
  11. I,Aveibas,N.Memon,B.Sankur."Steganalysis based on image quality metrics". Multimedia Signal Processing, 2001. IEEE IV workshop 2001
  12. El-sayed M.El-Alfy,Azzat A.Al-sadi "Pixel-Valued Differencing Steganogrphy:Attacks and Improvements" ICCIT,2012, pp:757-765
  13. Rosziati Ibrahim , Teoh suk kuan " Steganography Algorithm to hide Secret message inside an image" Computer Technology and Application 2 ,2011, pp:102-108
  14. Imran Khan "An Efficient Neural Network based Algorithm of Steganography for image" International journal of Computer Technology and Electronics Engineering(IJCTEE) Vol.1,Issue 2, ISSN 2249-6343, 2011, pp:63 -67
  15. K.B Shiva Kumar K B Raja "Bit Length Replacement Steganography Based on DCT coefficients" International Journal of Engineering Science and Technology vol.2(8), 2010, pp:3561-3570
  16. Souvik Bhattacharya, Lalan Kumar ang gautam Sanyal " A novel approach of data hiding using Pixel Mappng Methods" International journal of computer science and information security, Vol. 8, no. 4 july 2010 pp:207-214

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Komal Tahiliani, Dr. N. K.Tiwari, " Implementing Data Hiding Approach by Neural Network and Retrieval of Audio , Video and Text Files, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.561-567, January-February-2018.