Steganography in IoT: Information Hiding with Joystick and Touch Sensors

被引:4
作者
Koptyra, Katarzyna [1 ]
Ogiela, Marek R. R. [1 ]
机构
[1] AGH Univ Sci & Technol, Cryptog & Cognit Informat Lab, PL-30059 Krakow, Poland
关键词
steganography; IoT; sensor; touch; joystick; VIDEO;
D O I
10.3390/s23063288
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper describes a multi-secret steganographic system for the Internet-of-Things. It uses two user-friendly sensors for data input: thumb joystick and touch sensor. These devices are not only easy to use, but also allow hidden data entry. The system conceals multiple messages into the same container, but with different algorithms. The embedding is realized with two methods of video steganography that work on mp4 files, namely, videostego and metastego. These methods were chosen because of their low complexity so that they may operate smoothly in environments with limited resources. It is possible to replace the suggested sensors with others that offer similar functionality.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Data hiding on web using combination of Steganography and Cryptography
    Kothari, Lipi
    Thakkar, Rikin
    Khara, Satvik
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 448 - 452
  • [32] Steganography over Video File using Random Byte Hiding and LSB Technique
    Bhole, Ashish T.
    Patel, Rachna
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 189 - 194
  • [33] A STEGANOGRAPHY STRATEGY BASED ON EQUIVALENCE PARTITIONS OF HIDING UNITS
    Liu, Shaohui
    Yao, Hongxun
    Zhang, Shengping
    Gao, Wen
    2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 1299 - 1304
  • [34] A new method for locating data hiding in image steganography
    Sabyasachi Pramanik
    Multimedia Tools and Applications, 2024, 83 : 34323 - 34349
  • [35] A reversible and secure patient information hiding system for IoT driven e-health
    Kaw, Javaid A.
    Loan, Nazir A.
    Parah, Shabir A.
    Muhammad, K.
    Sheikh, Javaid A.
    Bhat, G. M.
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2019, 45 : 262 - 275
  • [36] Secure Image Steganography Approach for Hiding Compressed Data
    Abdul-Zaher, Khadija M.
    Sewesy, Adel Abo El-Magd
    Mohamed, Marghany Hassan
    SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 575 - 595
  • [37] Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment
    Zhou, Zhili
    Su, Yuecheng
    Zhang, Yulan
    Xia, Zhihua
    Du, Shan
    Gupta, Brij B.
    Qi, Lianyong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9332 - 9341
  • [38] Hiding Secret Message using Visual Cryptography in Steganography
    Meghrajani, Yogesh K.
    Mazumdar, Himanshu S.
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [39] A new method for locating data hiding in image steganography
    Pramanik, Sabyasachi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (12) : 34323 - 34349
  • [40] Hiding Data in Video Sequences Using Steganography Algorithms
    Kelash, Hamdy M.
    Wahab, Osama F. Abdel
    Elshakankiry, Osama A.
    El-sayed, Hala S.
    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 353 - 358