International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129 | Views: 254

Research Paper | Computer Science & Engineering | Myanmar | Volume 8 Issue 3, March 2019 | Popularity: 6.8 / 10


     

Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT

Hnin Lai Nyo, Aye Wai Oo


Abstract: The growing possibilities of modern communications need the high security especially on computer network. Due to the increasing number of data being exchanged on the internet, it is becoming more important to the network security. Therefore, the confidentiality and data integrity are required in order to protect against unauthorized access and use. This has caused to the emergency growth of information hiding research area. In this system, combination of steganography and cryptography techniques are used to transmit data securely to the authorized person and to improve imperceptibility and payload capacity. The hashed frequency values of secret image are embedded in the video file with the use of Discrete Wavelet Transformation and Least Significant bit. The secret key generated these hashed values is encrypted with the another secret key by using a new encryption algorithm, Twisted Exchange Algorithm and the resulted encrypted key is hide behind the audio file with the parity bit technique. The system performance is measured MSU video quality measurement tool and the results are analysed with different parameters.


Keywords: cryptography, steganography, security, discrete wavelet transform, least significant bit


Edition: Volume 8 Issue 3, March 2019


Pages: 1516 - 1520



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Hnin Lai Nyo, Aye Wai Oo, "Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT", International Journal of Science and Research (IJSR), Volume 8 Issue 3, March 2019, pp. 1516-1520, https://www.ijsr.net/getabstract.php?paperid=ART20196277, DOI: https://www.doi.org/10.21275/ART20196277



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article
Top