2021
DOI: 10.1007/978-3-030-85428-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Overview of Information Hiding Algorithms for Ensuring Security in IoT Based Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 83 publications
0
10
0
Order By: Relevance
“…In this section, we study the security framework in CPS cloud and compare the performance of our suggested technique to that of other existing methods. The existing methods are RSA [22], Twofish algorithm [23], improved chacha20 algorithm (ICC [24]), Fully Homomorphic encryption algorithm (FHEA [25]). Encryption time analyses and illustrates the average amount of time required to encrypt media content files as input.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we study the security framework in CPS cloud and compare the performance of our suggested technique to that of other existing methods. The existing methods are RSA [22], Twofish algorithm [23], improved chacha20 algorithm (ICC [24]), Fully Homomorphic encryption algorithm (FHEA [25]). Encryption time analyses and illustrates the average amount of time required to encrypt media content files as input.…”
Section: Resultsmentioning
confidence: 99%
“…The amount of time that elapses between the moment that a user submits a request and the time that the server RSA [22] 90…”
Section: Resultsmentioning
confidence: 99%
“…The difference between the image containing hidden data and the original image can be found only through some statistical treatments through which the proposed method is evaluated, and this will be discussing in detail later in the results section. Candidate pixels will manipulate according to embedding condition then will store again in stego image with different order and illustrated in ( 2) and (3).…”
Section: Figure 5 Classification Of Ir Via Svm Classifiermentioning
confidence: 99%
“…Step 4: extract regions R and P from vectors 𝑅 𝑖 = (𝐾 𝑖1 , 𝐾 𝑖2 , 𝐾 𝑖3 , … , 𝐾 𝑖(𝑛−1) ) 𝐾 𝑖𝑗 = (𝑃 𝑖𝑗 (1) , 𝑃 𝑖𝑗 (2) , 𝑃 𝑖𝑗 (3) , … , 𝑃 𝑖𝑗 (𝑛) )…”
Section: Extractingmentioning
confidence: 99%
See 1 more Smart Citation