2016
DOI: 10.1007/978-981-10-3433-6_44
|View full text |Cite
|
Sign up to set email alerts
|

Securing Internet of Things in 5G Using Audio Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…5G is a cloud and software-based network; therefore, all the underlying security issues of a standard network and its software get inherited in it, and the same is discussed in Singh, Verma, S., and Parashar (2016). These security issues can exploit its resources in different ways, many of which can be Zero-day vulnerabilities.…”
Section: Proposed Architecture and Design Methodology Of Iot Ecosystem In 5g With Network Slicing Proposed Architecturementioning
confidence: 99%
“…5G is a cloud and software-based network; therefore, all the underlying security issues of a standard network and its software get inherited in it, and the same is discussed in Singh, Verma, S., and Parashar (2016). These security issues can exploit its resources in different ways, many of which can be Zero-day vulnerabilities.…”
Section: Proposed Architecture and Design Methodology Of Iot Ecosystem In 5g With Network Slicing Proposed Architecturementioning
confidence: 99%
“…Combining image and sound, a video file such as MPEG, AVI, or MP4 carries the capability of hiding a massive amount of sensitive information. A computed tomography (CT) scan, which is applied for image steganography, can likewise be implemented for video steganography by embedding sensitive information in each image of the video [11,30,31]. Other commonly applied techniques for video steganography include the Least Significant Bit (LSB); Tri-way Pixel-Value Differencing (TPVD), which embeds the secret bits in the Inline frame (Iframe); and Bit Plane Complexity Segmentation (BPCS), which is also utilized for embedding secret bits within the MPEG video.…”
Section: Video Steganographymentioning
confidence: 99%
“…In various modern steganography methods, LSBs are changed with error diffusion. It is additionally conceivable to conceal secret messages using inaudible frequencies [30].…”
Section: Audio Steganographymentioning
confidence: 99%