Algorithmic method of security of the Internet of Things based on steganographic coding

被引:0
|
作者
Kabulov, Anvar [1 ]
Saymanov, Islambek [1 ]
Yarashov, Inomjon [1 ]
Muxammadiev, Firdays [1 ]
机构
[1] Natl Univ Uzbekistan, Dept Informat Secur, Tashkent, Uzbekistan
关键词
IoT; steganography; LSB; information security; grayscale metod; PSNR; stego image; histogram; RGB;
D O I
10.1109/IEMTRONICS52119.2021.9422588
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the Internet of Things, it is more important than ever to effectively address the problem of secure transmission based on steganographic substitution by synthesizing digital sensor data. In this case, the degree to which the grayscale message is obscured is a necessary issue. To ensure information security in IoT systems, various methods are used and information security problems are solved to one degree or another. The article proposes a method and algorithm for a computer image in grayscale, in which the value of each pixel is one sample, representing the amount of light, carrying only information about the intensity. The proposed method in grayscale using steganographic coding provides a secure implementation of data transmission in the IoT system. Study results were analyzed using PSNR (Peak Signal to Noise Ratio).
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [1] Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview
    Cirani, Simone
    Ferrari, Gianluigi
    Veltri, Luca
    ALGORITHMS, 2013, 6 (02) : 197 - 226
  • [2] A steganographic method based on optimized audio embedding technique for secure data communication in the internet of things
    Anguraj, S.
    Shantharajah, S. P.
    Emilyn, Jeba J.
    COMPUTATIONAL INTELLIGENCE, 2020, 36 (02) : 557 - 573
  • [3] The security storage method of dynamic data in internet of things based on blockchain
    Sun, Li
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2023, 16 (04) : 327 - 341
  • [4] Bioimmunological Method Based Security Technology of Ubiquitous Power Internet of Things
    Qu Z.
    Dong Y.
    Liu S.
    Shen Z.
    Yu J.
    Li Y.
    Dong, Yunchang (dongyunchang@sgepri.sgcc.com.cn), 1600, Automation of Electric Power Systems Press (44): : 1 - 12
  • [5] A Trust-Based Security Research Method for Internet of Things Terminal
    Liu, Zhe
    Zhao, Bo
    Li, Jiyang
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 267 - 280
  • [6] A Security Analysis Method for Industrial Internet of Things
    Mouratidis, Haralambos
    Diamantopoulou, Vasiliki
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) : 4093 - 4100
  • [7] Study on steganographic security in information hiding based on coding transition diagram
    Song, Hui
    Kong, Xiang-Wei
    You, Xin-Gang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2005, 33 (SUPPL.): : 2322 - 2326
  • [8] A novel unified coding analytical method for Internet of Things
    Sun Hong
    Zhang JianHong
    INTERNATIONAL SYMPOSIUM ON PHOTOELECTRONIC DETECTION AND IMAGING 2013: IMAGING SENSORS AND APPLICATIONS, 2013, 8908
  • [9] The security threat posed by steganographic content on the internet
    Goel, Rajni
    Garuba, Moses
    Liu, Chunmei
    Nguyen, Trang
    INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 794 - +
  • [10] Security of internet of things based on cryptographic algorithm
    Mittal, Sonam
    Singh, Soni
    Balakumaran, D.
    Hemalatha, K.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 28 - 39