Internet of things in industry: Research profiling, application, challenges and opportunities—a review
The fourth industrial revolution taking place in the industrial sector is related to the
increasing digitization and linkage of goods, products, value chains and business models …
increasing digitization and linkage of goods, products, value chains and business models …
Uncovering the social impact of digital steganalysis tools applied to cybercrime investigations: a European Union perspective
A Nicolás-Sánchez, FJ Castro-Toledo - Crime Science, 2024 - Springer
Abstract Background European Union (EU) research on cybersecurity is actively developing
more efficient digital steganalysis techniques aimed at uncovering hidden online illegal …
more efficient digital steganalysis techniques aimed at uncovering hidden online illegal …
Artificial Intelligence and the Internet of Things Forensics in a National Security Context
R Montasari - Countering Cyberterrorism: The Confluence of Artificial …, 2023 - Springer
In recent years, there has been an increasing number of cyber-attacks targeting
organisations both in the public and private sectors. With an increase in the number of such …
organisations both in the public and private sectors. With an increase in the number of such …
A discrete wavelet transform-based audio watermarking technique for digital security
V Prabhu, L Sundar, V Drishya… - International …, 2022 - inderscienceonline.com
This work proposes a model using discrete wavelet transform (DWT) to eliminate the attacks
on digital security. Semi-fragile watermarking techniques strive towards establishing the …
on digital security. Semi-fragile watermarking techniques strive towards establishing the …
Video Steganography in IoT: Information Embedding using OpenCV and 2LSB
After a review of many research study it is been concluded that various security techniques
are used for data transmission in Internet of Things (IoT) devices. Considerable progress …
are used for data transmission in Internet of Things (IoT) devices. Considerable progress …
Securing Data in the Internet of Things (IoT) using Metamorphic Cryptography-A Survey
MS Narayan, MC Trivedi… - … and Networking (CICTN), 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) involves connecting a wide range of devices to the internet,
allowing them to be controlled and monitored remotely. However, the transmission and …
allowing them to be controlled and monitored remotely. However, the transmission and …
[PDF][PDF] Lightweight Steganography Technique in The Internet of Things: A survey
HA Qasim, RS Mohammed - Al-Salam Journal for Engineering and …, 2024 - iasj.net
In the context of the Internet of Things (IoT), lightweight steganography provides a
revolutionary combination of technology and security, where data concealment meets the …
revolutionary combination of technology and security, where data concealment meets the …
Dual Method Cryptography and Steganography in Video Frames in IoT
RA Muhammed, AM Alabaichi - IRAQI JOURNAL OF COMPUTERS …, 2023 - iasj.net
Abstract The Internet of things (IoT) is one of those emerging technologies, which are going
to rule the world in the next few decades. The IoT environment not only enables Human to …
to rule the world in the next few decades. The IoT environment not only enables Human to …
A review paper on various image security techniques
M Bodke, P Tiwari, S Gurav, S Deshpande… - AIP Conference …, 2024 - pubs.aip.org
In the contemporary era, ensuring security is imperative for safeguarding information and
assets, preventing unauthorized access, data breaches, and maintaining the integrity and …
assets, preventing unauthorized access, data breaches, and maintaining the integrity and …
A Method of Cover Audio Selection for Embedding Based on Various Criteria
The main goal of an audio steganography method is to improve the capacity, im-
perceptibility, and robustness. Several methods of audio steganography have been …
perceptibility, and robustness. Several methods of audio steganography have been …