Steganography in IoT: Information Hiding with Joystick and Touch Sensors

被引:4
|
作者
Koptyra, Katarzyna [1 ]
Ogiela, Marek R. R. [1 ]
机构
[1] AGH Univ Sci & Technol, Cryptog & Cognit Informat Lab, PL-30059 Krakow, Poland
关键词
steganography; IoT; sensor; touch; joystick; VIDEO;
D O I
10.3390/s23063288
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper describes a multi-secret steganographic system for the Internet-of-Things. It uses two user-friendly sensors for data input: thumb joystick and touch sensor. These devices are not only easy to use, but also allow hidden data entry. The system conceals multiple messages into the same container, but with different algorithms. The embedding is realized with two methods of video steganography that work on mp4 files, namely, videostego and metastego. These methods were chosen because of their low complexity so that they may operate smoothly in environments with limited resources. It is possible to replace the suggested sensors with others that offer similar functionality.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Steganography in IoT: Information Hiding with APDS-9960 Proximity and Gestures Sensor
    Koptyra, Katarzyna
    Ogiela, Marek R.
    SENSORS, 2022, 22 (07)
  • [2] Information Hiding using Bucket Steganography
    Koptyra, Katarzyna
    Ogiela, Marek R.
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 292 - 293
  • [3] Linguistic Steganography: Hiding Information in Syntax Space
    Xiang, Lingyun
    Ou, Chengfu
    Zeng, Daojian
    IEEE SIGNAL PROCESSING LETTERS, 2024, 31 : 261 - 265
  • [4] An Efficient Steganography Method for Hiding Patient Confidential Information
    Al-Dmour, Hayat
    Al-Ani, Ahmed
    Hung Nguyen
    2014 36TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2014, : 222 - 225
  • [5] Hiding Secret Information Using LSB Based Audio Steganography
    Binny, Anu
    Koilakuntla, Maddulety
    2014 INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE ISCMI 2014, 2014, : 56 - 59
  • [6] Quantifying the impact of adversarial attacks on information hiding security with steganography
    Mohammad Ubaidullah Bokhari
    Basil Gulfam
    undefined Hanafi
    International Journal of Information Technology, 2025, 17 (1) : 409 - 422
  • [7] Steganography in QR Codes-Information Hiding with Suboptimal Segmentation
    Koptyra, Katarzyna
    Ogiela, Marek R.
    ELECTRONICS, 2024, 13 (13)
  • [8] An improved hiding information by modifying selected DWT coefficients in video steganography
    Ferda Ernawan
    Multimedia Tools and Applications, 2024, 83 : 34629 - 34645
  • [9] Information Hiding Into OBJ Format File Using Vector Steganography Techniques
    Mados, Branislav
    Balaz, Anton
    Adam, Norbert
    Hurtuk, Jan
    2018 IEEE 12TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2018, : 91 - 95
  • [10] Data hiding technique in steganography for information security using number theory
    Rehman, Amjad
    Saba, Tanzila
    Mahmood, Toqeer
    Mehmood, Zahid
    Shah, Mohsin
    Anjum, Adeel
    JOURNAL OF INFORMATION SCIENCE, 2019, 45 (06) : 767 - 778