Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 2)Publication Date: 2014-02-05
Authors : D. Pradeepa; S. Rani Lakshmi;
Page : 79-82
Keywords : peer-to-peer system; DWT; 2D-DWT; PSNR; MSE;
- A Study of ECG Signal Classification using Fuzzy Logic Control
- A two Stage Fuzzy Logic Adaptive Traffic Signal Control for an Isolated Intersection Based on Real Data using SUMO Simulator
- Fuzzy Logic Temperature Control: A feedback control system implemented by fuzzy logic
- Applying Fuzzy Mathematical Model of Emotional Learning for EEG Signal Classification Between Schizophrenics and Control Participant
- Study of Load Frequency Control in an Interconnected System Using Conventional and Fuzzy Logic Controller
Abstract
In structured P2P systems, message deliverance can be done by identifying the peer IDs of the individual systems. The message passes from one hop to another correctly by identifying the IP address and finally reaches the destination. In this paper we propose an efficient routing strategy to control the routing path and to identify the malicious nodes. We also eliminate the drawbacks of encryption by introducing steganography in message deliverance. A lossless data hiding scheme is presented based on quantized coefficients of discrete wavelet transform (DWT) in the frequency domain to embed secret message. Using the quantized DWT based method, we embed secret data into the successive zero coefficients of the medium-high frequency components in each reconstructed block for 3-level 2-D DWT of cover image. The security of the proposed scheme can be further improved by employing compression and encryption techniques using AES. The experimental results show that the algorithm has a high capacity and a good invisibility. Moreover the quality of the messages/images are messured by the PSNR, Figure of Merits, MSSI (Mean Structural Similarity Index) of cover image with stego-image shows better results in comparison with other existing steganography approaches.
Other Latest Articles
Last modified: 2021-06-30 20:58:50