International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 130

Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 8, August 2015


Pixel Masking Based Data Hiding Technique (PMDHT)

Vivek Jaladi [2] | Avinash [110]


Abstract: In this paper a pixel masking based data hiding technique (PMDHT) has been presented. The main purpose of this paper work is to hide secret message/image/video into source image/video. Here we are embedding secret message/image/video into image/video by choosing standard 3 x 3 mask in a row major order in which each bits of the secret image/video are embedded in the single bit position of the source image/video. A message digest MD5 is generated from the secret image/video and to be inserted in the embedded image/video for additional security purpose. We then perform embedding all this (Secret and MD5) in the source image/video using our proposed technique. Result is analyzed in terms of SNR.


Keywords: PMDHT, Pixel masking, Message Digest, MATLAB, and GUI


Edition: Volume 4 Issue 8, August 2015,


Pages: 288 - 293


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Vivek Jaladi, Avinash, "Pixel Masking Based Data Hiding Technique (PMDHT)", International Journal of Science and Research (IJSR), Volume 4 Issue 8, August 2015, pp. 288-293, https://www.ijsr.net/get_abstract.php?paper_id=SUB157341

Similar Articles with Keyword 'Message Digest'

Downloads: 88

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1471 - 1476

HMAC Based Secure Authentication of VANETs

Swagat. S. Gudagudi | Dr. Veena Desai

Share this Article

Downloads: 117

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015

Pages: 864 - 867

Performance Analysis of Cryptographic Hash Functions

Smriti Gupta | Sandeep Kumar Yadav

Share this Article
Top