International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 129

Research Paper | Computer Science & Engineering | Myanmar | Volume 8 Issue 3, March 2019


Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT

Hnin Lai Nyo | Aye Wai Oo


Abstract: The growing possibilities of modern communications need the high security especially on computer network. Due to the increasing number of data being exchanged on the internet, it is becoming more important to the network security. Therefore, the confidentiality and data integrity are required in order to protect against unauthorized access and use. This has caused to the emergency growth of information hiding research area. In this system, combination of steganography and cryptography techniques are used to transmit data securely to the authorized person and to improve imperceptibility and payload capacity. The hashed frequency values of secret image are embedded in the video file with the use of Discrete Wavelet Transformation and Least Significant bit. The secret key generated these hashed values is encrypted with the another secret key by using a new encryption algorithm, Twisted Exchange Algorithm and the resulted encrypted key is hide behind the audio file with the parity bit technique. The system performance is measured MSU video quality measurement tool and the results are analysed with different parameters.


Keywords: cryptography, steganography, security, discrete wavelet transform, least significant bit


Edition: Volume 8 Issue 3, March 2019,


Pages: 1516 - 1520

Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT


How to Cite this Article?

Hnin Lai Nyo, Aye Wai Oo, "Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20196277, Volume 8 Issue 3, March 2019, 1516 - 1520, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'cryptography'

Downloads: 121 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article


Top