International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129

Research Paper | Computer Science & Engineering | Myanmar | Volume 8 Issue 3, March 2019


Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT

Hnin Lai Nyo | Aye Wai Oo


Abstract: The growing possibilities of modern communications need the high security especially on computer network. Due to the increasing number of data being exchanged on the internet, it is becoming more important to the network security. Therefore, the confidentiality and data integrity are required in order to protect against unauthorized access and use. This has caused to the emergency growth of information hiding research area. In this system, combination of steganography and cryptography techniques are used to transmit data securely to the authorized person and to improve imperceptibility and payload capacity. The hashed frequency values of secret image are embedded in the video file with the use of Discrete Wavelet Transformation and Least Significant bit. The secret key generated these hashed values is encrypted with the another secret key by using a new encryption algorithm, Twisted Exchange Algorithm and the resulted encrypted key is hide behind the audio file with the parity bit technique. The system performance is measured MSU video quality measurement tool and the results are analysed with different parameters.


Keywords: cryptography, steganography, security, discrete wavelet transform, least significant bit


Edition: Volume 8 Issue 3, March 2019,


Pages: 1516 - 1520


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Hnin Lai Nyo, Aye Wai Oo, "Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT", International Journal of Science and Research (IJSR), Volume 8 Issue 3, March 2019, pp. 1516-1520, https://www.ijsr.net/get_abstract.php?paper_id=ART20196277

Similar Articles with Keyword 'cryptography'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [10] | R. Sathya [8]

Share this Article
Top