Downloads: 129 | Views: 254
Research Paper | Computer Science & Engineering | Myanmar | Volume 8 Issue 3, March 2019 | Popularity: 6.8 / 10
Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT
Hnin Lai Nyo, Aye Wai Oo
Abstract: The growing possibilities of modern communications need the high security especially on computer network. Due to the increasing number of data being exchanged on the internet, it is becoming more important to the network security. Therefore, the confidentiality and data integrity are required in order to protect against unauthorized access and use. This has caused to the emergency growth of information hiding research area. In this system, combination of steganography and cryptography techniques are used to transmit data securely to the authorized person and to improve imperceptibility and payload capacity. The hashed frequency values of secret image are embedded in the video file with the use of Discrete Wavelet Transformation and Least Significant bit. The secret key generated these hashed values is encrypted with the another secret key by using a new encryption algorithm, Twisted Exchange Algorithm and the resulted encrypted key is hide behind the audio file with the parity bit technique. The system performance is measured MSU video quality measurement tool and the results are analysed with different parameters.
Keywords: cryptography, steganography, security, discrete wavelet transform, least significant bit
Edition: Volume 8 Issue 3, March 2019
Pages: 1516 - 1520
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V