Biometric Based on Steganography Image Security in Wireless Sensor Networks

被引:3
|
作者
Karthika, P. [1 ]
Babu, R. Ganesh [2 ]
Jayaram, K. [3 ]
机构
[1] Kalasalingam Acad Res & Educ, Dept Comp Applicat, Virudunagar 626126, TN, India
[2] Rajalakshmi Inst Technol, Dept ECE, Chennai 600124, Tamil Nadu, India
[3] Sri Ranganathar Inst Engn & Technol, Dept ECE, Coimbatore 641110, Tamil Nadu, India
来源
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE | 2020年 / 167卷
关键词
Wirelss Sensor Network; Steganography; Biometric; MANET; Remote Sensor;
D O I
10.1016/j.procs.2020.03.445
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Network (WSN) is a rising the innovation that demonstrates incredible guarantees for the different complex applications for both mass open and the military. The detecting for innovation attached with the preparing energy and the remote correspondence the security of biometric data might be compromised by system assaults, showing person's data without an appropriate insurance isn't reasonable for approval. The concern of the remote correspondence of the innovation additionally causes different kind of security and dangers in the MANET. The expectation of this paper to examine of the security connected issues and difficulties in the remote sensor organizations utilizing MANET. It is distinguish the security and dangers of survey arranged security instruments for the remote sensor organization. Notwithstanding, encryption and decoding calculations are moderate and contain tedious activities for moving information in system. In this section, by considering remote sensor arranges and confirming server is present another idea called "review" and manages its productivity in managing the security issue in MANET. A "digest" can be gotten from any sort of data attribute through which no one can catch any data of essential biometric qualities. Here demonstrate that this idea prompts the expansion of the precision and availability of a biometric framework. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1291 / 1299
页数:9
相关论文
共 50 条
  • [31] High Security Image Steganography Using IWT and Graph Theory
    Thanikaiselvan, V
    Arulmozhivarman, P.
    2013 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING APPLICATIONS (IEEE ICSIPA 2013), 2013, : 337 - 342
  • [32] An Efficient Image Steganography Approach over Wireless Communication System
    Eyssa, Asmaa Abdelmonem
    Abdelsamie, Fathi Elsaid
    Abdelnaiem, Abdelaziz Elsaid
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) : 321 - 337
  • [33] Dual-layer security of image steganography based on IDEA and LSBG algorithm in the cloud environment
    R SHANTHAKUMARI
    S MALLIGA
    Sādhanā, 2019, 44
  • [34] DWT Based Mosaic Image Steganography
    Patil, Ashvini Sandip
    Patil, Rupali M.
    Shinde, Milind M.
    TECHNO-SOCIETAL 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SOCIETAL APPLICATIONS - VOL 1, 2020, : 95 - 107
  • [35] Dual-layer security of image steganography based on IDEA and LSBG algorithm in the cloud environment
    Shanthakumari, R.
    Malliga, S.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (05):
  • [36] An evaluation of image based steganography methods
    Bailey K.
    Curran K.
    Multimedia Tools Appl, 2006, 1 (55-88): : 55 - 88
  • [37] Security analysis of DNA based steganography techniques
    Al-Harbi, Omnia Abdullah
    Alahmadi, Walaa Essa
    Aljahdali, Asia Othman
    SN APPLIED SCIENCES, 2020, 2 (02):
  • [38] Image steganography for authenticity of visual contents in social networks
    Khan Muhammad
    Jamil Ahmad
    Seungmin Rho
    Sung Wook Baik
    Multimedia Tools and Applications, 2017, 76 : 18985 - 19004
  • [39] Channel Attention Image Steganography With Generative Adversarial Networks
    Tan, Jingxuan
    Liao, Xin
    Liu, Jiate
    Cao, Yun
    Jiang, Hongbo
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (02): : 888 - 903
  • [40] Gabor Transform based Image Steganography
    Mythreyi, S.
    Vaidehi, V.
    IETE JOURNAL OF RESEARCH, 2007, 53 (02) : 103 - 112