Internet of things in industry: Research profiling, application, challenges and opportunities—a review

K Wójcicki, M Biegańska, B Paliwoda, J Górna - Energies, 2022 - mdpi.com
The fourth industrial revolution taking place in the industrial sector is related to the
increasing digitization and linkage of goods, products, value chains and business models …

Uncovering the social impact of digital steganalysis tools applied to cybercrime investigations: a European Union perspective

A Nicolás-Sánchez, FJ Castro-Toledo - Crime Science, 2024 - Springer
Abstract Background European Union (EU) research on cybersecurity is actively developing
more efficient digital steganalysis techniques aimed at uncovering hidden online illegal …

Artificial Intelligence and the Internet of Things Forensics in a National Security Context

R Montasari - Countering Cyberterrorism: The Confluence of Artificial …, 2023 - Springer
In recent years, there has been an increasing number of cyber-attacks targeting
organisations both in the public and private sectors. With an increase in the number of such …

A discrete wavelet transform-based audio watermarking technique for digital security

V Prabhu, L Sundar, V Drishya… - International …, 2022 - inderscienceonline.com
This work proposes a model using discrete wavelet transform (DWT) to eliminate the attacks
on digital security. Semi-fragile watermarking techniques strive towards establishing the …

Video Steganography in IoT: Information Embedding using OpenCV and 2LSB

U Pilania, M Kumar, S Singh… - … on Sustainable Computing …, 2023 - ieeexplore.ieee.org
After a review of many research study it is been concluded that various security techniques
are used for data transmission in Internet of Things (IoT) devices. Considerable progress …

Securing Data in the Internet of Things (IoT) using Metamorphic Cryptography-A Survey

MS Narayan, MC Trivedi… - … and Networking (CICTN), 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) involves connecting a wide range of devices to the internet,
allowing them to be controlled and monitored remotely. However, the transmission and …

[PDF][PDF] Lightweight Steganography Technique in The Internet of Things: A survey

HA Qasim, RS Mohammed - Al-Salam Journal for Engineering and …, 2024 - iasj.net
In the context of the Internet of Things (IoT), lightweight steganography provides a
revolutionary combination of technology and security, where data concealment meets the …

Dual Method Cryptography and Steganography in Video Frames in IoT

RA Muhammed, AM Alabaichi - IRAQI JOURNAL OF COMPUTERS …, 2023 - iasj.net
Abstract The Internet of things (IoT) is one of those emerging technologies, which are going
to rule the world in the next few decades. The IoT environment not only enables Human to …

A review paper on various image security techniques

M Bodke, P Tiwari, S Gurav, S Deshpande… - AIP Conference …, 2024 - pubs.aip.org
In the contemporary era, ensuring security is imperative for safeguarding information and
assets, preventing unauthorized access, data breaches, and maintaining the integrity and …

A Method of Cover Audio Selection for Embedding Based on Various Criteria

MHN Azam, F Ridzuan, MNSM Sayuti… - ITM Web of …, 2024 - itm-conferences.org
The main goal of an audio steganography method is to improve the capacity, im-
perceptibility, and robustness. Several methods of audio steganography have been …