2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN) 2016
DOI: 10.1109/icrcicn.2016.7813674
|View full text |Cite
|
Sign up to set email alerts
|

Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(27 citation statements)
references
References 15 publications
0
27
0
Order By: Relevance
“…Embedding process: Four pixels from the grayscale Baboon cover image (145, 116, 77, 71), n=4, SD1=(5)10 Firstly, calculate the gemd(p1,p2,p3,p4) value, gemd(145,116,77,71)= (145x1+116x2+77x3+71x4) mod (2x4+1) gemd= 892 mod 9 =1, then convert secret data (SD1)to (2x4+1)-ary notational system (5)9, calculate diff value, diff=(5 -1) mod 9 = 4, diff ≤ n, only chanced , using (5). , = + 1 = 71 + 1 = 72.…”
Section: Examplementioning
confidence: 99%
“…Embedding process: Four pixels from the grayscale Baboon cover image (145, 116, 77, 71), n=4, SD1=(5)10 Firstly, calculate the gemd(p1,p2,p3,p4) value, gemd(145,116,77,71)= (145x1+116x2+77x3+71x4) mod (2x4+1) gemd= 892 mod 9 =1, then convert secret data (SD1)to (2x4+1)-ary notational system (5)9, calculate diff value, diff=(5 -1) mod 9 = 4, diff ≤ n, only chanced , using (5). , = + 1 = 71 + 1 = 72.…”
Section: Examplementioning
confidence: 99%
“…The main issue with the security proposed by Ria Das et al [22] examines accessing and altering all the data and information. By using the cryptography we can prevent Integrity attacks where steganography has been used to avoid confidentiality attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Internet of Things (IoT) generally refers to scenarios where network connectivity and computing capability extends to individuals, wireless identifiable objects, sensors, sensor embedded-smart tiny devices and everyday items (not normally considered computers) enabling these to generate, exchange and consume data with minimal human intervention [1], [2]. The fundamental fact that IoT consists of a ubiquitous array of devices having sensing and actuating abilities being confined to the Internet depicts the scenario that the relationships between objects and people are tightly intertwined.…”
Section: Introductionmentioning
confidence: 99%
“…The fundamental fact that IoT consists of a ubiquitous array of devices having sensing and actuating abilities being confined to the Internet depicts the scenario that the relationships between objects and people are tightly intertwined. Additionally, the deployed proportion of IoT devices will get doubled (50 billion devices) by 2020 is the forecast predicted by Cisco's Internet Business Solutions Group [2], [3]. Some examples of IoT applications lies in EHealth, Smart Transportation, Smart Home Experience, Environmental Monitoring, Precision Agriculture, Retail and Logistics and numerous such domains [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation