Biometric Based on Steganography Image Security in Wireless Sensor Networks

被引:3
|
作者
Karthika, P. [1 ]
Babu, R. Ganesh [2 ]
Jayaram, K. [3 ]
机构
[1] Kalasalingam Acad Res & Educ, Dept Comp Applicat, Virudunagar 626126, TN, India
[2] Rajalakshmi Inst Technol, Dept ECE, Chennai 600124, Tamil Nadu, India
[3] Sri Ranganathar Inst Engn & Technol, Dept ECE, Coimbatore 641110, Tamil Nadu, India
来源
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE | 2020年 / 167卷
关键词
Wirelss Sensor Network; Steganography; Biometric; MANET; Remote Sensor;
D O I
10.1016/j.procs.2020.03.445
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Network (WSN) is a rising the innovation that demonstrates incredible guarantees for the different complex applications for both mass open and the military. The detecting for innovation attached with the preparing energy and the remote correspondence the security of biometric data might be compromised by system assaults, showing person's data without an appropriate insurance isn't reasonable for approval. The concern of the remote correspondence of the innovation additionally causes different kind of security and dangers in the MANET. The expectation of this paper to examine of the security connected issues and difficulties in the remote sensor organizations utilizing MANET. It is distinguish the security and dangers of survey arranged security instruments for the remote sensor organization. Notwithstanding, encryption and decoding calculations are moderate and contain tedious activities for moving information in system. In this section, by considering remote sensor arranges and confirming server is present another idea called "review" and manages its productivity in managing the security issue in MANET. A "digest" can be gotten from any sort of data attribute through which no one can catch any data of essential biometric qualities. Here demonstrate that this idea prompts the expansion of the precision and availability of a biometric framework. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1291 / 1299
页数:9
相关论文
共 50 条
  • [1] Cryptographic image-based data security strategies in wireless sensor networks
    Gowda, V. Dankan
    Palanikkumar, D.
    Suneel, Sajja
    Dekka, Satish
    Thiruvenkadam, T.
    Prasad, K. D. V.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A) : 293 - 304
  • [2] Wireless Sensor Networks - A Security Perspective
    Tahir, Hasan
    Shah, Syed Asim Ali
    INMIC: 2008 INTERNATIONAL MULTITOPIC CONFERENCE, 2008, : 189 - 193
  • [3] Security using ECC Based on Fuzzy Clustering in Wireless Sensor Networks
    Basith, K. Abdul
    Shankar, T. N.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (11): : 30 - 38
  • [4] Secure localisation of wireless devices with application to sensor networks using steganography
    Tondwalkar, Ankita
    Vinayakray-Jani, Preetida
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 610 - 616
  • [5] Lip biometric template security framework using spatial steganography
    Das, Srijan
    Muhammad, Khan
    Bakshi, Sambit
    Mukherjee, Imon
    Sa, Pankaj K.
    Sangaiah, Arun Kumar
    Bruno, Andrea
    PATTERN RECOGNITION LETTERS, 2019, 126 : 102 - 110
  • [6] Lossless Image Steganography Based on Invertible Neural Networks
    Liu, Lianshan
    Tang, Li
    Zheng, Weimin
    ENTROPY, 2022, 24 (12)
  • [7] On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security
    Al-Sharif, Rola
    Guyeux, Christophe
    Fadil, Yousra Ahmed
    Makhoul, Abdallah
    Jaber, Ali
    AD HOC NETWORKS, ADHOCNETS 2014, 2014, 140 : 51 - 62
  • [8] Security Improvisation in Image Steganography using DES
    Ramaiya, Manoj Kumar
    Hemrajani, Naveen
    Saxena, Anil Kishore
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1094 - 1099
  • [9] Enhancing the security of image steganography via multiple adversarial networks and channel attention modules
    Ma, Bin
    Li, Kun
    Xu, Jian
    Wang, Chunpeng
    Li, Jian
    Zhang, Liwei
    DIGITAL SIGNAL PROCESSING, 2023, 141
  • [10] Chaotic System Based Image Encryption Of Biometric Characteristics For Enhanced Security
    Gayathri, S. P.
    Sajeer, M.
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,