Securing Data using Audio Steganography for the Internet of Things

Authors

  • Anju Gera Banasthali University, GLBITM, Greater Noida, India
  • Dr. Vaibhav Vyas Banasthali University, Jaipur, India

DOI:

https://doi.org/10.4108/eetsc.v6i4.1775

Keywords:

IoT, IoT protection, disclosure of details, Audio steganography

Abstract

The Internet of Things (IoT) is prevalent in today's world and is part of our everyday life. While the residential district gains in several respects, numerous problems are developed, such as data confidentiality and privacy. The community is worried, in reality, about what information might leak through IoT. Therefore, the need for a protected environment is necessary if data transmission from devices across the network is to be protected. As a consequence, this paper proposes a secure scheme for using audio steganography to secure data from Laptop, which is distributed as an IoT device to other devices, or on LAN or WAN networks, as an alternative protection strategy along with a home server. The outcome of the developed system shows that the amount of distortion exposed by the Signal to Noise Ratio (SNR) is low.

 

Downloads

Download data is not yet available.

References

F. Djebbar, “Lightweight Noise Resilient Steganography Scheme for Internet of Things,” 2017. DOI: https://doi.org/10.1109/GLOCOM.2017.8255039

U. Khadam, M. M. Iqbal, M. Alruily, M. A. Al Ghamdi, M. Ramzan, and S. H. Almotiri, “Text Data Security and Privacy in the Internet of Things : Threats , Challenges , and Future Directions,” vol. 2020, 2020. DOI: https://doi.org/10.1155/2020/7105625

H. A.Abdullah, A. A. Abdulameer, and I. F. Hussein, “Audio Steganography and Security by using Cryptography,” i-manager’s J. Inf. Technol., vol. 4, no. 4, pp. 17–24, 2015, doi: 10.26634/jit.4.4.3644. DOI: https://doi.org/10.26634/jit.4.4.3644

F. Djebbar, B. Ayad, H. Hamam, and K. Abed-Meraim, “A view on latest audio steganography techniques,” 2011 Int. Conf. Innov. Inf. Technol. IIT 2011, pp. 409–414, 2011, doi: 10.1109/INNOVATIONS.2011.5893859. DOI: https://doi.org/10.1109/INNOVATIONS.2011.5893859

A. Jurcut, T. Niculcea, P. Ranaweera, N. An, and L. Khac, “Security Considerations for Internet of Things : A Survey,” SN Comput. Sci., vol. 1, no. 4, pp. 1–19, 2020, doi: 10.1007/s42979-020-00201-3. DOI: https://doi.org/10.1007/s42979-020-00201-3

C. T. Jian, C. C. Wen, N. H. Binti Ab Rahman, and I. R. B. A. Hamid, “Audio Steganography with Embedded Text,” IOP Conf. Ser. Mater. Sci. Eng., vol. 226, no. 1, 2017, doi: 10.1088/1757-899X/226/1/012084. DOI: https://doi.org/10.1088/1757-899X/226/1/012084

Mohsen Bazyar, Rubita Sudhirman, “A New Method to Increase the capacity of Audio Steganography Based on the LSB algorithm”, Journal Teknologi Science and Engineering, 74:6 (2015), 49-53. DOI: https://doi.org/10.11113/jt.v74.4667

K.Sakthisudhan,P.Prabu and Dr.C.M.Marimuthu,”Dual Steganograpghy Approach for Secure Data Communication”, ELSEVIER International Conference on Modelling, Optimization and Computing,2012. DOI: https://doi.org/10.1016/j.proeng.2012.06.051

Mengyu Qiao, Andrew H. Sung, Qingzhong Liu, “MP3 audio Steganalysis”, Information sciences, vol. 231, pp. 123-134, May 2013. DOI: https://doi.org/10.1016/j.ins.2012.10.013

Rostam, H. E., Motameni, H., & Enayatifar, R. (2022). Privacy-preserving in the Internet of Things based on steganography and chaotic functions. Optik, 258, 168864. DOI: https://doi.org/10.1016/j.ijleo.2022.168864

Gera, A., & Vyas, V. (2022). Hiding Capacity and Audio Steganography Model Based on LSB in Temporal Domain. Recent Patents on Engineering, 16(2), 65-74. DOI: https://doi.org/10.2174/1872212115666210709170455

Gera, A., & Vyas, V. (2022). Message Security Enhanced By Bit Cycling Encryption and Bi-LSB Technique. DOI: https://doi.org/10.5109/4843115

Downloads

Published

04-01-2023

How to Cite

[1]
A. Gera and Dr. Vaibhav Vyas, “Securing Data using Audio Steganography for the Internet of Things”, EAI Endorsed Trans Smart Cities, vol. 6, no. 4, p. e5, Jan. 2023.