Securing Data using Audio Steganography for the Internet of Things
Keywords:IoT, IoT protection, disclosure of details, Audio steganography
The Internet of Things (IoT) is prevalent in today's world and is part of our everyday life. While the residential district gains in several respects, numerous problems are developed, such as data confidentiality and privacy. The community is worried, in reality, about what information might leak through IoT. Therefore, the need for a protected environment is necessary if data transmission from devices across the network is to be protected. As a consequence, this paper proposes a secure scheme for using audio steganography to secure data from Laptop, which is distributed as an IoT device to other devices, or on LAN or WAN networks, as an alternative protection strategy along with a home server. The outcome of the developed system shows that the amount of distortion exposed by the Signal to Noise Ratio (SNR) is low.
F. Djebbar, “Lightweight Noise Resilient Steganography Scheme for Internet of Things,” 2017.
U. Khadam, M. M. Iqbal, M. Alruily, M. A. Al Ghamdi, M. Ramzan, and S. H. Almotiri, “Text Data Security and Privacy in the Internet of Things : Threats , Challenges , and Future Directions,” vol. 2020, 2020.
H. A.Abdullah, A. A. Abdulameer, and I. F. Hussein, “Audio Steganography and Security by using Cryptography,” i-manager’s J. Inf. Technol., vol. 4, no. 4, pp. 17–24, 2015, doi: 10.26634/jit.4.4.3644.
F. Djebbar, B. Ayad, H. Hamam, and K. Abed-Meraim, “A view on latest audio steganography techniques,” 2011 Int. Conf. Innov. Inf. Technol. IIT 2011, pp. 409–414, 2011, doi: 10.1109/INNOVATIONS.2011.5893859.
A. Jurcut, T. Niculcea, P. Ranaweera, N. An, and L. Khac, “Security Considerations for Internet of Things : A Survey,” SN Comput. Sci., vol. 1, no. 4, pp. 1–19, 2020, doi: 10.1007/s42979-020-00201-3.
C. T. Jian, C. C. Wen, N. H. Binti Ab Rahman, and I. R. B. A. Hamid, “Audio Steganography with Embedded Text,” IOP Conf. Ser. Mater. Sci. Eng., vol. 226, no. 1, 2017, doi: 10.1088/1757-899X/226/1/012084.
Mohsen Bazyar, Rubita Sudhirman, “A New Method to Increase the capacity of Audio Steganography Based on the LSB algorithm”, Journal Teknologi Science and Engineering, 74:6 (2015), 49-53.
K.Sakthisudhan,P.Prabu and Dr.C.M.Marimuthu,”Dual Steganograpghy Approach for Secure Data Communication”, ELSEVIER International Conference on Modelling, Optimization and Computing,2012.
Mengyu Qiao, Andrew H. Sung, Qingzhong Liu, “MP3 audio Steganalysis”, Information sciences, vol. 231, pp. 123-134, May 2013.
Rostam, H. E., Motameni, H., & Enayatifar, R. (2022). Privacy-preserving in the Internet of Things based on steganography and chaotic functions. Optik, 258, 168864.
Gera, A., & Vyas, V. (2022). Hiding Capacity and Audio Steganography Model Based on LSB in Temporal Domain. Recent Patents on Engineering, 16(2), 65-74.
Gera, A., & Vyas, V. (2022). Message Security Enhanced By Bit Cycling Encryption and Bi-LSB Technique.
How to Cite
Copyright (c) 2023 Anju Gera, Dr. Vaibhav Vyas
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.