International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 124

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 2, February 2014


Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography

D. Pradeepa | S. Rani Lakshmi


Abstract: In structured P2P systems, message deliverance can be done by identifying the peer IDs of the individual systems. The message passes from one hop to another correctly by identifying the IP address and finally reaches the destination. In this paper we propose an efficient routing strategy to control the routing path and to identify the malicious nodes. We also eliminate the drawbacks of encryption by introducing steganography in message deliverance. A lossless data hiding scheme is presented based on quantized coefficients of discrete wavelet transform (DWT) in the frequency domain to embed secret message. Using the quantized DWT based method, we embed secret data into the successive zero coefficients of the medium-high frequency components in each reconstructed block for 3-level 2-D DWT of cover image. The security of the proposed scheme can be further improved by employing compression and encryption techniques using AES. The experimental results show that the algorithm has a high capacity and a good invisibility. Moreover the quality of the messages/images are messured by the PSNR, Figure of Merits, MSSI (Mean Structural Similarity Index) of cover image with stego-image shows better results in comparison with other existing steganography approaches.


Keywords: peer-to-peer system, DWT, 2D-DWT, PSNR, MSE


Edition: Volume 3 Issue 2, February 2014,


Pages: 79 - 82

Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography


How to Cite this Article?

D. Pradeepa, S. Rani Lakshmi, "Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=2013876, Volume 3 Issue 2, February 2014, 79 - 82, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'DWT'

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari | Ayush Pandey

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani [3] | Apoorva Arora [2]

Share this Article


Top