Smart City Gnosys

Smart city article details

Title An Efficient Algorithm For Covert Contacting In Iot
ID_Doc 7785
Authors Abdulkadhim E.G.; Al-Shemarry M.S.; Alsaadi E.M.T.A.
Year 2024
Published AIP Conference Proceedings, 3097, 1
DOI http://dx.doi.org/10.1063/5.0209934
Abstract As the Internet of Things (IoT) becomes more widely used, the danger of information leakage, the danger of information leakage, data leakage and theft of the internet of things is continuous increasing, as the communication channel for data transfer is open to the public. A considerable portion of this data includes sensitive and personal information for the user and the company as well. Because of the openness, distributed nature, and lack of control over the entire IoT environment, the number of attack vectors for bad users is significant. End-users must trust the system for the IoT to become a viable service platform. Consequently, in critical infrastructures like smart home, smart city, smart healthcare, and smart industry, information security and privacy are the major concern in the Internet of Things. In this paper, we present an information concealment strategy using steganography to protect communication in critical IoT infrastructure. RGB photographs are employed as the information carrier. Deep layers of low-distortion image channels in the least significant bit (LSB) are used to hide the data to be used as a data marker. Both mathematically and experimentally, we evaluate our method. We display mathematically that the striker's analysis cannot expect the current information. The proposed strategy outperformed previous strategies in terms of imperceptibility and capacity, as well as resilience to steganalysis attacks like histogram analysis, as demonstrated experimentally. © 2024 AIP Publishing LLC.
Author Keywords Information Protection; Internet of Things; LSB; Steganographym


Similar Articles


Id Similarity Authors Title Published
34144 View0.892Mukherjee S.; Mukhopadhyay S.; Sarkar S.Iotsle: Securing Iot Systems In Low-Light Environments Through Finite Automata, Deep Learning And Dna Computing Based Image Steganographic ModelInternet of Things (Netherlands), 28 (2024)
41634 View0.87Calo A.-M.V.M.; Calanda F.B.; Medina R.P.Performance Analysis Of A Hybrid Self-Sufficient Coverless Video Steganography Method For Iot ApplicationsITCC 2024 - 2024 6th International Conference on Information Technology and Computer Communications, ITCC 2024 (2025)
6680 View0.867Biswas S.; Goswami R.S.; Reddy K.H.K.Advancing Quantum Steganography: A Secure Iot Communication With Reversible Decoding And Customized Encryption Technique For Smart CitiesCluster Computing, 27, 7 (2024)
2997 View0.858Al Hindawi N.A.; Rabie T.; Kamel I.A New Data Hiding Technique For Surveillance Applications2020 Advances in Science and Engineering Technology International Conferences, ASET 2020 (2020)