2022
DOI: 10.11591/eei.v11i6.4194
|View full text |Cite
|
Sign up to set email alerts
|

A crypto-steganography scheme for IoT applications based on bit interchange and crypto-system

Abstract: Image steganography and cryptography have been used widely due to the dramatic evolution of the internet of things (IoT) and the simplicity of capturing and transferring digital images. Pressing challenges in the context of a steganography system include security, imperceptibility, and capacity issues. In the existing schemes, fixing one issue has been indicated to affect the other and vice versa. Based on the above challenges, a new scheme has been proposed for the Crypt-steganography scheme. The proposed sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…Another notable observation is the surge in articles focusing on a specific technology in 2022. However, the applications discussed in these articles ( [7,36,87,91]) seem unrelated, making it challenging to identify any underlying reason behind this trend. Furthermore, an attempt was made to employ the VOSviewer 13 tool to identify any authorship overlap among the identified journal articles.…”
Section: Personal Computingmentioning
confidence: 99%
See 4 more Smart Citations
“…Another notable observation is the surge in articles focusing on a specific technology in 2022. However, the applications discussed in these articles ( [7,36,87,91]) seem unrelated, making it challenging to identify any underlying reason behind this trend. Furthermore, an attempt was made to employ the VOSviewer 13 tool to identify any authorship overlap among the identified journal articles.…”
Section: Personal Computingmentioning
confidence: 99%
“…Journal Articles Image [88], [76], [57], [62], [89], [22], [42], [45], [13], [49], [86], [87], [9], [7], [33], [36], [1], [10], [19], [5] Signal [34], [91] Audio [14] Hardware [79] Based on these findings, it is evident that there is a need to diversify research in terms of methods and cover mediums. Attention should be given to addressing security challenges in government applications, while a more comprehensive assessment of the performance of chaotic algorithms in medical domains is required.…”
Section: Mediummentioning
confidence: 99%
See 3 more Smart Citations