A new 3-bit hiding covert channel algorithm for public data and medical data security using format-based text steganography

R Gurunath, D Samanta - Journal of Database Management (JDM), 2023 - igi-global.com
The primary concern of every individual and organization is the security of sensitive
information generated via authorized activities; nonetheless, illicit data drawing and …

The adaptive multi-level phase coding method in audio steganography

AA Alsabhany, F Ridzuan, AH Azni - IEEE Access, 2019 - ieeexplore.ieee.org
Audio steganography allows and inspires many researchers to design methods for secure
communication. Based on the evaluation on the existing methods, it was found that most …

Securing IoT data using steganography: A practical implementation approach

F Djebbar - Electronics, 2021 - mdpi.com
Adding network connectivity to any “thing” can certainly provide great value, but it also
brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” …

Review on lightweight cryptography techniques and steganography techniques for IoT environment

S Supriya K, J Lovesum SP - International Journal of System Assurance …, 2024 - Springer
In the modern world, technology has connected to our day-to-day life in different forms. The
Internet of Things (IoT) has become an innovative criterion for mass implementations and a …

Fractional-order spatial steganography and blind steganalysis for printed matter: Anti-counterfeiting for product external packing in Internet-of-Things

YF Pu, N Zhang, H Wang - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
This paper advocates a novel conceptual formulation of the fractional-order spatial
steganography (FSS) and blind steganalysis for printed matter, which can be efficiently …

Multilevel Redundant Discrete Wavelet Transform (ML-RDWT) and optimal Red Deer algorithm (ORDA) centred approach to mitigate the effect of ICI, BER and CIR in …

K Nagarajan, S Sophia - Wireless Personal Communications, 2022 - Springer
Nowadays, there is a great demand for ultra-high data rate (UHDR) transmission on most
5th generation wireless networks. In this concern, the multiple-input multiple-output …

IoT Security Using Steganography

AM Ray, A Sarkar, AJ Obaid… - … Approach to Modern …, 2021 - igi-global.com
Internet of things (IoT) is one of those emerging technologies, which are going to rule the
world in the next few decades. Due to the advancement of low-cost computing systems and …

Securing data using audio steganography for the internet of things

A Gera, V Vyas - EAI Endorsed Transactions on Smart Cities, 2023 - eudl.eu
Abstract The Internet of Things (IoT) is prevalent in today's world and is part of our everyday
life. While the residential district gains in several respects, numerous problems are …

[PDF][PDF] Lightweight Steganography Technique in The Internet of Things: A survey

HA Qasim, RS Mohammed - Al-Salam Journal for Engineering and …, 2024 - iasj.net
In the context of the Internet of Things (IoT), lightweight steganography provides a
revolutionary combination of technology and security, where data concealment meets the …

Algorithm of information embedding into digital images based on the Chinese remainder theorem for data security

O Evsutin, K Dzhanashia - Cryptography, 2020 - mdpi.com
With the huge transfers of data involved in the modern world, it is both crucial and
challenging to maintain the security of data. This paper proposes a novel algorithm of …