scispace - formally typeset
Journal ArticleDOI

Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques

Reads0
Chats0
TLDR
In the proposed work, the elliptic Galois cryptography protocol is introduced and discussed, and a cryptography technique is used to encrypt confidential data that came from different medical sources and embeds the encrypted data into a low complexity image.
Abstract
Internet of Things (IoT) is a domain wherein which the transfer of data is taking place every single second. The security of these data is a challenging task; however, security challenges can be mitigated with cryptography and steganography techniques. These techniques are crucial when dealing with user authentication and data privacy. In the proposed work, the elliptic Galois cryptography protocol is introduced and discussed. In this protocol, a cryptography technique is used to encrypt confidential data that came from different medical sources. Next, a Matrix XOR encoding steganography technique is used to embed the encrypted data into a low complexity image. The proposed work also uses an optimization algorithm called Adaptive Firefly to optimize the selection of cover blocks within the image. Based on the results, various parameters are evaluated and compared with the existing techniques. Finally, the data that is hidden in the image is recovered and is then decrypted.

read more

Citations
More filters
Journal ArticleDOI

SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT

TL;DR: In this article, the authors proposed an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique.
Journal ArticleDOI

Analysis of various data security techniques of steganography: A survey

TL;DR: The objective of the paper is to examine and scrutinize the different algorithms of steganography based on parameters like PSNR, MSE, and Robustness and make recommendations for producing high-quality stego images, high-payload capacity, and robust techniques of Steganography.
Journal ArticleDOI

Physical layer security for massive access in cellular Internet of Things

TL;DR: The security issues in the cellular IoT network are reviewed with an emphasis on revealing the corresponding challenges and opportunities for the design of securemassive access and a secure massive access framework is proposed by exploiting the inherent co-channel interferences.
Proceedings ArticleDOI

E-Healthcare Monitoring System using IoT with Machine Learning Approaches

TL;DR: An IoT application framework E-Healthcare Monitoring System (EHMS) integrated with Machine learning (ML) techniques to design an advanced automation system to connect, monitor and decisions making for proper diagnosis.
Journal ArticleDOI

Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework

TL;DR: In this article , an integrated data-driven framework applicable at the control level is proposed to deal with secure transmission and attack detection simultaneously, where a secure correlation-based encryption/decryption approach and a trustworthiness judgement approach are proposed.
References
More filters
Journal ArticleDOI

Overview of the H.264/AVC video coding standard

TL;DR: An overview of the technical features of H.264/AVC is provided, profiles and applications for the standard are described, and the history of the standardization process is outlined.
Journal ArticleDOI

Internet of things - new security and privacy challenges

TL;DR: An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable.
Journal ArticleDOI

Mixed variable structural optimization using Firefly Algorithm

TL;DR: A recently developed metaheuristic optimization algorithm, the Firefly Algorithm, which mimics the social behavior of fireflies based on their flashing characteristics is used for solving mixed continuous/discrete structural optimization problems.
Journal ArticleDOI

Lithe: Lightweight Secure CoAP for the Internet of Things

TL;DR: Lithe-an integration of DTLS and CoAP for the IoT is presented and a novel DTLS header compression scheme is proposed that aims to significantly reduce the energy consumption by leveraging the 6LoWPAN standard.
Journal ArticleDOI

Medical JPEG image steganography based on preserving inter-block dependencies

TL;DR: Experimental results show that the proposed scheme can cluster the inter-block embedding changes and perform better than the state-of-the-art steganographic method.
Related Papers (5)