2020
DOI: 10.1007/s11042-020-09652-5
|View full text |Cite
|
Sign up to set email alerts
|

Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…It is less chance of an attacker being enabled to use steganalysis to recover data when matching data to an image. In [28], They suggest a new form of steganography based on gray m level modulation using image transformation, hidden key, and cryptography for true color images. Both the private key and the secret data are initially encoded using multiple encryption algorithms (bitxor processing, bit shuffling, and stego key based encoding); then encoded in the pixels of the host image.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is less chance of an attacker being enabled to use steganalysis to recover data when matching data to an image. In [28], They suggest a new form of steganography based on gray m level modulation using image transformation, hidden key, and cryptography for true color images. Both the private key and the secret data are initially encoded using multiple encryption algorithms (bitxor processing, bit shuffling, and stego key based encoding); then encoded in the pixels of the host image.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Khan et al 35 suggested a steganography‐assisted safe location of smart devices for VSN (visual sensor network). Steganography was a security process in communication systems.…”
Section: Literature Surveymentioning
confidence: 99%
“…• Support ease of understanding of these privacy policies, e.g., using automated methods to extract deeply embedded implications or promoting privacy practice standards and implementation guides. • Promote appropriate protections such as more rigorous encoding and concealment of personal data, 44 and education for consumers.…”
Section: Consequences For Informaticsmentioning
confidence: 99%