Steganography in IoT: Information Hiding with Joystick and Touch Sensors

被引:4
作者
Koptyra, Katarzyna [1 ]
Ogiela, Marek R. R. [1 ]
机构
[1] AGH Univ Sci & Technol, Cryptog & Cognit Informat Lab, PL-30059 Krakow, Poland
关键词
steganography; IoT; sensor; touch; joystick; VIDEO;
D O I
10.3390/s23063288
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper describes a multi-secret steganographic system for the Internet-of-Things. It uses two user-friendly sensors for data input: thumb joystick and touch sensor. These devices are not only easy to use, but also allow hidden data entry. The system conceals multiple messages into the same container, but with different algorithms. The embedding is realized with two methods of video steganography that work on mp4 files, namely, videostego and metastego. These methods were chosen because of their low complexity so that they may operate smoothly in environments with limited resources. It is possible to replace the suggested sensors with others that offer similar functionality.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Modified BCH data hiding scheme for JPEG steganography
    Sachnev, Vasily
    Kim, Hyoung Joong
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2012,
  • [42] Data Hiding in Still Images Based on Blind Algorithm of Steganography
    Bugar, Gabriel
    Banoci, Vladimir
    Broda, Martin
    Levicky, Dusan
    Dupak, Denis
    2014 24TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2014), 2014,
  • [43] Aggrandize Text Security and Hiding Data through Text Steganography
    Chaudhary, Sunita
    Dave, Meenu
    Sanghi, Amith
    2016 IEEE 7TH POWER INDIA INTERNATIONAL CONFERENCE (PIICON), 2016,
  • [44] Dual Steganography for Hiding Text in Video by Linked List Method
    Selvigrija, P.
    Ramya, E.
    2015 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICETECH), 2015, : 20 - 24
  • [45] Novel Ransomware Hiding Model Using HEVC Steganography Approach
    Almomani, Iman
    AlKhayer, Aala
    El-Shafai, Walid
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 1209 - 1228
  • [46] Coverless Data Hiding in VoIP based on DNA Steganography with Authentication
    Soundararajan, Deepikaa
    Ramakrishnan, Saravanan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (02) : 190 - 198
  • [47] An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms
    Wazirali, Ranyiah
    Alasmary, Waleed
    Mahmoud, Mohamed M. E. A.
    Alhindi, Ahmad
    IEEE ACCESS, 2019, 7 : 133496 - 133508
  • [48] Analysis of Data Hiding with Multi-bit Image Steganography
    Qu, Junfeng
    Song, Yinglei
    Wei, Yong
    Song, Jia
    2018 8TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2018, : 59 - 62
  • [49] Enhanced Data Hiding Audio Steganography Using Signal Ramping
    Choudhury, Somenath Nag
    2018 FOURTH IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2018, : 258 - 263
  • [50] An Improved Method for Reversible Data Hiding Steganography Combined with Cryptography
    Rashmi, N.
    Jyothi, K.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 81 - 84