Steganography in IoT: Information Hiding with Joystick and Touch Sensors

被引:4
|
作者
Koptyra, Katarzyna [1 ]
Ogiela, Marek R. R. [1 ]
机构
[1] AGH Univ Sci & Technol, Cryptog & Cognit Informat Lab, PL-30059 Krakow, Poland
关键词
steganography; IoT; sensor; touch; joystick; VIDEO;
D O I
10.3390/s23063288
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper describes a multi-secret steganographic system for the Internet-of-Things. It uses two user-friendly sensors for data input: thumb joystick and touch sensor. These devices are not only easy to use, but also allow hidden data entry. The system conceals multiple messages into the same container, but with different algorithms. The embedding is realized with two methods of video steganography that work on mp4 files, namely, videostego and metastego. These methods were chosen because of their low complexity so that they may operate smoothly in environments with limited resources. It is possible to replace the suggested sensors with others that offer similar functionality.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Perturbation Hiding and the Batch Steganography Problem
    Ker, Andrew D.
    INFORMATION HIDING, 2008, 5284 : 45 - 59
  • [42] A Proposed Novel Architecture for Information Hiding in Image Steganography by using Genetic Algorithm and Cryptography
    Sethi, Pratiksha
    Kapoor, V.
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 61 - 66
  • [43] Data hiding using video steganography
    Ravichandran, C.
    Vajravelu, Ashok
    Panda, Sankarsan
    Degadwala, Sheshang Dipakkumar
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 112 - 123
  • [44] Hiding information hiding
    Young, Adam
    Yung, Moti
    INFORMATION HIDING, 2007, 4437 : 161 - 171
  • [45] On Hiding Secret Information in Medium Frequency DCT Components Using Least Significant Bits Steganography
    Khan, Sahib
    Irfan, M. A.
    Arif, Arslan
    Rizvi, Syed Tahir Hussain
    Gul, Asma
    Naeem, Muhammad
    Ahmad, Nasir
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2019, 118 (03): : 529 - 546
  • [46] STEGANOGRAPHY ALGORITHM FOR INFORMATION HIDING BASED ON SPATIAL DEFORMATION OF FULL-COLOR IMAGE FRAGMENTS
    Dryuchenko, M. A.
    Sirota, A. A.
    COMPUTER OPTICS, 2014, 38 (04) : 833 - 842
  • [47] Reversible Steganography: Data Hiding for Covert Storage
    Zhang, Zhuo
    Zhang, Weiming
    2015 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2015, : 753 - 756
  • [48] Data Hiding on the Internet: Steganalysis against Steganography
    Margarov, Gevorg
    TERRORISM AND THE INTERNET: THREATS - TARGET GROUPS - DERADICALISATION STRATEGIES, 2010, 67 : 167 - 182
  • [49] PIXINWAV: RESIDUAL STEGANOGRAPHY FOR HIDING PIXELS IN AUDIO
    Geleta, Margarita
    Punti, Cristina
    McGuinness, Kevin
    Pons, Jordi
    Canton, Cristian
    Giro-I-Nieto, Xavier
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 2485 - 2489
  • [50] Analysis of Data Hiding Methods in Image Steganography
    Akshay, K. C.
    Muniyal, Balachandra
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 2023 - 2027