Biometric Based on Steganography Image Security in Wireless Sensor Networks

被引:3
|
作者
Karthika, P. [1 ]
Babu, R. Ganesh [2 ]
Jayaram, K. [3 ]
机构
[1] Kalasalingam Acad Res & Educ, Dept Comp Applicat, Virudunagar 626126, TN, India
[2] Rajalakshmi Inst Technol, Dept ECE, Chennai 600124, Tamil Nadu, India
[3] Sri Ranganathar Inst Engn & Technol, Dept ECE, Coimbatore 641110, Tamil Nadu, India
来源
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE | 2020年 / 167卷
关键词
Wirelss Sensor Network; Steganography; Biometric; MANET; Remote Sensor;
D O I
10.1016/j.procs.2020.03.445
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Network (WSN) is a rising the innovation that demonstrates incredible guarantees for the different complex applications for both mass open and the military. The detecting for innovation attached with the preparing energy and the remote correspondence the security of biometric data might be compromised by system assaults, showing person's data without an appropriate insurance isn't reasonable for approval. The concern of the remote correspondence of the innovation additionally causes different kind of security and dangers in the MANET. The expectation of this paper to examine of the security connected issues and difficulties in the remote sensor organizations utilizing MANET. It is distinguish the security and dangers of survey arranged security instruments for the remote sensor organization. Notwithstanding, encryption and decoding calculations are moderate and contain tedious activities for moving information in system. In this section, by considering remote sensor arranges and confirming server is present another idea called "review" and manages its productivity in managing the security issue in MANET. A "digest" can be gotten from any sort of data attribute through which no one can catch any data of essential biometric qualities. Here demonstrate that this idea prompts the expansion of the precision and availability of a biometric framework. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1291 / 1299
页数:9
相关论文
共 50 条
  • [11] Optimizing Cryptographically based Security in Wireless Networks
    Jacobs, Stuart
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 39 - 45
  • [12] GAN-based adaptive cost learning for enhanced image steganography security
    Wang, Dewang
    Yang, Gaobo
    Chen, Jiyou
    Ding, Xiangling
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [13] Performance analysis of medical image security using steganography based on fuzzy logic
    Yuvaraja, T.
    Sabeenian, R. S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S3285 - S3291
  • [14] Performance analysis of medical image security using steganography based on fuzzy logic
    T. Yuvaraja
    R. S. Sabeenian
    Cluster Computing, 2019, 22 : 3285 - 3291
  • [15] On Security Enhancement of Steganography via Generative Adversarial Image
    Zhou, Lingchen
    Feng, Guorui
    Shen, Liquan
    Zhang, Xinpeng
    IEEE SIGNAL PROCESSING LETTERS, 2020, 27 : 166 - 170
  • [16] Data Link Layer Security Protocols in Wireless Sensor Networks: A Survey
    AlMheiri, Saleha Mubarak
    AlQamzi, Hend Saeed
    2013 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2013, : 312 - 317
  • [17] A Hybrid Approach for Image Security by Combining Encryption and Steganography
    Saini, Jaspal Kaur
    Verma, Harsh K.
    2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 607 - 611
  • [18] Substitution Steganography with Security Improved by Chaotic Image Encryption
    Oravec, Jakub
    Turan, Jan
    2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 284 - 288
  • [19] An adversarial learning based image steganography with security improvement against neural network steganalysis
    Kholdinasab, Nayereh
    Amirmazlaghani, Maryam
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [20] AdvSGAN: Adversarial image Steganography with adversarial networks
    Lin Li
    Mingyu Fan
    Defu Liu
    Multimedia Tools and Applications, 2021, 80 : 25539 - 25555