International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 320

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 2, February 2014 | Popularity: 6.9 / 10


     

Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography

D. Pradeepa, S. Rani Lakshmi


Abstract: In structured P2P systems, message deliverance can be done by identifying the peer IDs of the individual systems. The message passes from one hop to another correctly by identifying the IP address and finally reaches the destination. In this paper we propose an efficient routing strategy to control the routing path and to identify the malicious nodes. We also eliminate the drawbacks of encryption by introducing steganography in message deliverance. A lossless data hiding scheme is presented based on quantized coefficients of discrete wavelet transform (DWT) in the frequency domain to embed secret message. Using the quantized DWT based method, we embed secret data into the successive zero coefficients of the medium-high frequency components in each reconstructed block for 3-level 2-D DWT of cover image. The security of the proposed scheme can be further improved by employing compression and encryption techniques using AES. The experimental results show that the algorithm has a high capacity and a good invisibility. Moreover the quality of the messages/images are messured by the PSNR, Figure of Merits, MSSI (Mean Structural Similarity Index) of cover image with stego-image shows better results in comparison with other existing steganography approaches.


Keywords: peer-to-peer system, DWT, 2D-DWT, PSNR, MSE


Edition: Volume 3 Issue 2, February 2014


Pages: 79 - 82



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
D. Pradeepa, S. Rani Lakshmi, "Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography", International Journal of Science and Research (IJSR), Volume 3 Issue 2, February 2014, pp. 79-82, https://www.ijsr.net/getabstract.php?paperid=2013876, DOI: https://www.doi.org/10.21275/2013876



Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, Kazakhstan, Volume 13 Issue 11, November 2024

Pages: 1485 - 1488

Enhancing Recommendation Systems with Fuzzy Logic-Based Collaborative Filtering

Yernar Seitay

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 4, April 2022

Pages: 1028 - 1031

Machine Learning Approaches to Ambient Air Quality Prediction

Sweta

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 428 - 429

An Approach for Traffic Prediction in SDN for Performing Routing

H. Pavithra, Dr. G. N. Srinivasan

Share this Article

Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 113 - 116

Semantic Segmentation using Deep Learning Approaches - A Study

Salim Ahmed Ali, Dr. B. G. Prasad

Share this Article

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article



Top