Redirigiendo al acceso original de articulo en 23 segundos...
ARTÍCULO
TITULO

Encryption System for Hiding Information Based on Internet of Things

Hala A. Naman    
Naseer Ali Hussien    
Mohand Lokman Al-dabag    
Haider Th.Salim Alrikabi    

Resumen

One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure 4 below shows the method of encryption and dealing with the Internet of things system..

 Artículos similares

       
 
Yi-Wei Wang and Ja-Ling Wu    
This work presents an efficient and effective system allowing hospitals to share patients? private information while ensuring that each hospital database?s medical records will not be leaked; moreover, the privacy of patients who access the data will als... ver más
Revista: Algorithms

 
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom    
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system... ver más

 
Huifeng Fan, Ruwei Huang and Fengting Luo    
Aiming at the problem that the fully homomorphic encryption scheme based on single identity cannot satisfy the homomorphic operation of ciphertext under different identities, as well as the inefficiency of trapdoor function and the complexity of sampling... ver más
Revista: Applied Sciences

 
Vangelis Malamas, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester and Dimitris Glynos    
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open... ver más
Revista: Applied Sciences

 
Giriraj Sharma, Amit M. Joshi and Saraju P. Mohanty    
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device security plays a pivotal role in smart grids since they are vulnerable to var... ver más
Revista: Information