Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129 | Views: 265

Research Paper | Computer Science & Engineering | Myanmar | Volume 8 Issue 3, March 2019 | Popularity: 6.8 / 10


     

Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT

Hnin Lai Nyo, Aye Wai Oo


Abstract: The growing possibilities of modern communications need the high security especially on computer network. Due to the increasing number of data being exchanged on the internet, it is becoming more important to the network security. Therefore, the confidentiality and data integrity are required in order to protect against unauthorized access and use. This has caused to the emergency growth of information hiding research area. In this system, combination of steganography and cryptography techniques are used to transmit data securely to the authorized person and to improve imperceptibility and payload capacity. The hashed frequency values of secret image are embedded in the video file with the use of Discrete Wavelet Transformation and Least Significant bit. The secret key generated these hashed values is encrypted with the another secret key by using a new encryption algorithm, Twisted Exchange Algorithm and the resulted encrypted key is hide behind the audio file with the parity bit technique. The system performance is measured MSU video quality measurement tool and the results are analysed with different parameters.


Keywords: cryptography, steganography, security, discrete wavelet transform, least significant bit


Edition: Volume 8 Issue 3, March 2019


Pages: 1516 - 1520



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Hnin Lai Nyo, Aye Wai Oo, "Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT", International Journal of Science and Research (IJSR), Volume 8 Issue 3, March 2019, pp. 1516-1520, https://www.ijsr.net/getabstract.php?paperid=ART20196277, DOI: https://www.doi.org/10.21275/ART20196277

Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 1362 - 1373

Design and Implementation of a Novel Hybrid Quantum-Classical Processor for Enhanced Computation Speed

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article
Top