A steganographic method based on optimized audio embedding technique for secure data communication in the internet of things

被引:5
作者
Anguraj, S. [1 ]
Shantharajah, S. P. [2 ]
Emilyn, Jeba J. [3 ]
机构
[1] KSR Coll Engn, Dept Informat Technol, Namakkal, India
[2] VIT, SITE, Vellore, Tamil Nadu, India
[3] Sona Coll Technol, Dept Informat Technol, Salem, India
关键词
audio steganography; embedding technique; internet of things; optimization; random bit selection; security; IOT;
D O I
10.1111/coin.12253
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid growth of the internet and the internet of things (IoT) refers to the next phase of information revolution whose context involves billions of smart devices and sensors interconnected to facilitate speedy information and data exchange under soft real-time constraints. Digital information revolution has caused significant changes in the data communication. This data communication may require private, secure, and sometimes malicious communication. Competent secrecy can be accomplished by applying novel and inventive audio steganography. This article focuses on the secret message followed by shuffled embedded bit substitution in original audio stream by adopting optimized audio embedding technique (OAET) from the technological observation. To hide the information in the deeper layer of the audio stream, this method uses a new elevated bit range least significant bit (LSB) audio steganography technique that decreases distortion and improves the robustness of the embedded audio stream. The proposed technique proves that the perceptual quality of audio steganography is better than the previous standard LSB technique. Experiment results proved that the cladding of the OAET provides high-level security to the universal cyber data. The interpretation of results shows that embedding data in audio enhances the level of security when used as IoT smart speakers, where the attackers could not distinguish between the original audio and the embedded audio streams.
引用
收藏
页码:557 / 573
页数:17
相关论文
共 32 条
  • [1] Adaptive context aware decision computing paradigm for intensive health care delivery in smart cities-A case analysis
    Aborokbah, Majed M.
    Al-Mutairi, Saad
    Sangaiah, Arun Kumar
    Samuel, Oluwarotimi Williams
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2018, 41 : 919 - 924
  • [2] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [3] Anguraj S., 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT 2011), P205, DOI 10.1109/ICRTIT.2011.5972254
  • [4] [Anonymous], CONCURRENCY COMPUTAT
  • [5] Bandyopadhyay Samir Kumar, 2011, International Journal of Advanced Computer Science and Applications, V2, P129
  • [6] Bansal T, 2013, INT J ADV RES COMPUT, V3, P26
  • [7] A View on LSB Based Audio Steganography
    Chowdhury, Ratul
    Bhattacharyya, Debnath
    Bandyopadhyay, Samir Kumar
    Kim, Tai-hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 51 - 62
  • [8] Das R, 2016, 2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), P296, DOI 10.1109/ICRCICN.2016.7813674
  • [9] Deogirikar J, 2017, 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), P32, DOI 10.1109/I-SMAC.2017.8058363
  • [10] Di Laura C, 2016, INT J DIGITAL MULTIM, V2016, P9