Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special Section: Intelligent, Smart and Scalable Cyber-Physical Systems
Guest editors: V. Vijayakumar, V. Subramaniyaswamy, Jemal Abawajy and Longzhi Yang
Article type: Research Article
Authors: Arunkumar, S. | Vairavasundaram, Subramaniyaswamy*; | Ravichandran, K.S. | Ravi, Logesh
Affiliations: School of Computing, Shanmugha Arts Science Technology and Research Academy, Thanjavur, India
Correspondence: [*] Corresponding author. Subramaniyaswamy Vairavasundaram, School of Computing, Shanmugha Arts Science Technology and Research Academy, Thanjavur, India. E-mail: swamy@cse.sastra.ac.in.
Abstract: The development of the Internet of Things (IoT) can be attributed to the sudden rise in miniature electronic devices, as well as their computing power and ability to make interconnections. These devices exchange large volumes of confidential information from diverse locations. Similar to the Internet, the IoT has also encountered various issues with information security. Due to limited computing and energy resources in the field of IoT, it is necessary to develop a scheme to ensure feasible and more effective concealment and security properties. This paper proposes a unique methodology that captures an image using IoT sensors, which are subjected to lighter cryptographic operations for conversion into a cipher image, and is then sent to a home server. At the home server, a combined cryptography and steganography approach is employed to conceal the cipher image in a cover image, camouflaging the presence of the secret image, which is then sent to the IoT-Cloud server for storage. During the embedding process, QR decomposition is performed on the RIWT transformed secret image and RIWT - DCT transformed cover image. Modification performed on the R matrix of QR decomposition does not affect the structural properties of the cover image. A block selection algorithm is used to select optimal blocks with high contrast areas to embed the secret image. The experimental results indicate that our scheme enhances imperceptibility, robustness, and resistance to steganalysis attacks.
Keywords: Image steganography, RIWT, DCT, security in cloud, block selection algorithm, QR decomposition, IoT
DOI: 10.3233/JIFS-169984
Journal: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4265-4276, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl