A steganographic method based on optimized audio embedding technique for secure data communication in the internet of things

被引:5
|
作者
Anguraj, S. [1 ]
Shantharajah, S. P. [2 ]
Emilyn, Jeba J. [3 ]
机构
[1] KSR Coll Engn, Dept Informat Technol, Namakkal, India
[2] VIT, SITE, Vellore, Tamil Nadu, India
[3] Sona Coll Technol, Dept Informat Technol, Salem, India
关键词
audio steganography; embedding technique; internet of things; optimization; random bit selection; security; IOT;
D O I
10.1111/coin.12253
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid growth of the internet and the internet of things (IoT) refers to the next phase of information revolution whose context involves billions of smart devices and sensors interconnected to facilitate speedy information and data exchange under soft real-time constraints. Digital information revolution has caused significant changes in the data communication. This data communication may require private, secure, and sometimes malicious communication. Competent secrecy can be accomplished by applying novel and inventive audio steganography. This article focuses on the secret message followed by shuffled embedded bit substitution in original audio stream by adopting optimized audio embedding technique (OAET) from the technological observation. To hide the information in the deeper layer of the audio stream, this method uses a new elevated bit range least significant bit (LSB) audio steganography technique that decreases distortion and improves the robustness of the embedded audio stream. The proposed technique proves that the perceptual quality of audio steganography is better than the previous standard LSB technique. Experiment results proved that the cladding of the OAET provides high-level security to the universal cyber data. The interpretation of results shows that embedding data in audio enhances the level of security when used as IoT smart speakers, where the attackers could not distinguish between the original audio and the embedded audio streams.
引用
收藏
页码:557 / 573
页数:17
相关论文
共 50 条
  • [1] Steganographic Secure Data Communication
    Patil, Sangram Damodar
    Bhendwade, Pradip S.
    Patil, R. T.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [2] A Clustering Based Steganographic Approach for Secure Data Communication
    SaiKrishna, A.
    Parimi, Shankar
    Manikandan, G.
    Sriram, N.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [3] A steganographic method for the secure embedding of GIS data streams into aerial photography
    Hebbes, Luke
    Janjua, Faiza Younas
    Livingstone, David
    Orwell, James
    SYMPOTIC '06: JOINT 1ST WORKSHOP ON SENSOR NETWORKS & SYMPOSIUM ON TRENDS IN COMMUNICATIONS - PROCEEDINGS, 2006, : 97 - +
  • [4] Algorithmic method of security of the Internet of Things based on steganographic coding
    Kabulov, Anvar
    Saymanov, Islambek
    Yarashov, Inomjon
    Muxammadiev, Firdays
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 1 - 5
  • [5] An Authentication-Based Secure Data Aggregation Method in Internet of Things
    Maryam Ataei Nezhad
    Hamid Barati
    Ali Barati
    Journal of Grid Computing, 2022, 20
  • [6] An Authentication-Based Secure Data Aggregation Method in Internet of Things
    Ataei Nezhad, Maryam
    Barati, Hamid
    Barati, Ali
    JOURNAL OF GRID COMPUTING, 2022, 20 (03)
  • [7] Study on a Secure Wireless Data Communication in Internet of Things Applications
    Liu, Chibiao
    Qiu, Jinming
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (02): : 18 - 23
  • [8] An Efficient Secure Data Aggregation Technique for Internet of Things Network
    Sruthi, Sagi Sai
    Geethakumari, G.
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 599 - 603
  • [9] A dynamic trust based clustering method for secure data gathering in Internet of Things
    Naghibi, Maryam
    Barati, Hamid
    Barati, Ali
    COMPUTING, 2025, 107 (04)
  • [10] Secure data fusion method based on supervisory mechanism for Industrial Internet of Things
    Wang, Hao
    Li, Yu
    Mi, Mingrui
    Wang, Ping
    Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2013, 34 (04): : 817 - 824