Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Computer Science & Engineering | India | Volume 3 Issue 2, February 2014

Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography

D. Pradeepa, S. Rani Lakshmi

In structured P2P systems, message deliverance can be done by identifying the peer IDs of the individual systems. The message passes from one hop to another correctly by identifying the IP address and finally reaches the destination. In this paper we propose an efficient routing strategy to control the routing path and to identify the malicious nodes. We also eliminate the drawbacks of encryption by introducing steganography in message deliverance. A lossless data hiding scheme is presented based on quantized coefficients of discrete wavelet transform (DWT) in the frequency domain to embed secret message. Using the quantized DWT based method, we embed secret data into the successive zero coefficients of the medium-high frequency components in each reconstructed block for 3-level 2-D DWT of cover image. The security of the proposed scheme can be further improved by employing compression and encryption techniques using AES. The experimental results show that the algorithm has a high capacity and a good invisibility.Moreover the quality of the messages/images are messured by the PSNR, Figure of Merits, MSSI (Mean Structural Similarity Index) of cover image with stego-image shows better results in comparison with other existing steganography approaches.

Keywords: peer-to-peer system, DWT, 2D-DWT, PSNR, MSE

Edition: Volume 3 Issue 2, February 2014

Pages: 79 - 82

Share this Article

How to Cite this Article?

D. Pradeepa, S. Rani Lakshmi, "Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2013876, Volume 3 Issue 2, February 2014, 79 - 82

73 PDF Views | 62 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'peer-to-peer system'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1690 - 1693

Extended Best Peer: A Peer-to-Peer Based System by Corporate Network for Data Sharing

Chandre P.R, Bhavsar Harshada

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2762 - 2766

Large Scale Data Shared by Peer to Peer Based System in Shared Network

Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2103 - 2107

Analyzing Big Data Problem Using Hadoop and Cloud Technology

Hemlata S. Urade

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2374 - 2378

Analysis and Implementation of Peer to Peer Live Video Streaming System

Lekshmy A Sasi, Minu Lalitha Madhavu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 79 - 82

Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography

D. Pradeepa, S. Rani Lakshmi

Share this Article

Similar Articles with Keyword 'DWT'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 829 - 833

Comparison of Video Shot Detection and Video Summarization Techniques

Vijay Kumar D, Santhosh Kumar K.L, Jharna Majumdar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 907 - 910

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1338 - 1343

Implementation of Adaptive Video Compression using Hybridized Wavelet Transform

Anurag Srivastava, Puneet Sharma

Share this Article

Similar Articles with Keyword 'PSNR'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1538 - 1540

Survey on Optimization of Fractal Image Compression

Er. Awdhesh Kumari, Dr. Shaveta Rani, Dr. Paramjeet Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2078 - 2080

Image Enhancement Technique Using Symlet and Daubechies Wavelets

Shivani Jain, Jyoti Rani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 538 - 541

Simplified Filtering Technique to Edge Reconstruction and Comparison of Original Image in Low to High Density Noise Values

Dr. N. Naveen Kumar, K. Chandra Sekhar, K. Chokkanathan

Share this Article

Similar Articles with Keyword 'MSE'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANET's

Umar I. Masumdar, N. S. Killarikar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1538 - 1540

Survey on Optimization of Fractal Image Compression

Er. Awdhesh Kumari, Dr. Shaveta Rani, Dr. Paramjeet Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2734 - 2838

Efficient Techniques for Mining High Utility Itemsets from Transactional Databases: A Survey

Ganesh Sawant, Bhawana Kanawde

Share this Article
Top