Data Security in WSN Research Papers (original) (raw)
Nowadays, the Internet is an indispensable communication channel of today's life. In wide systems, information should be transferred via safe communication channels including data security, copyright safety, human privacy, etc. Some... more
Nowadays, the Internet is an indispensable communication channel of today's life. In wide systems, information should be transferred via safe communication channels including data security, copyright safety, human privacy, etc. Some potential problems, however, have resulted from the improving Internet, such as the copy and corruption of digital information. Therefore, the information security is considered as one immediate topic. Technologies for information and communication security have brought forth powerful tools to make this vision come true, despite many different kinds of adverse circumstances. Cryptography and steganography are the most widely used techniques to defeat this threat. Cryptography involves converting a message text into a scribbled cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both the techniques provide some security of data, neither of them is individually secure enough for sharing information over a...
- by
- •
Identity-Based Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing construction of an efficient scheme for distributed cloud storage to support the scalability of service and data... more
Identity-Based Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing construction of an efficient scheme for distributed cloud storage to support the scalability of service and data migration, in which of multiple cloud service providers to cooperatively store and maintain the clients’ data. Cloud computing has become an important thing in computer field. Cloud computing takes information processing as a service, such as storage and computing. Data integrity is important thing in cloud storage. In certain situations, clients should store their data such as image or text in multi cloud. When the client stores his/her data on multicloud servers, the distributed storage and integrity checking is very important. Here we propose an Identity Based Distributed Provable Data Possession (ID-DPDP) protocol for multi-cloud storage. Remote data integrity checking is important in cloud storage. It can make the clients verify whether their data is...
- by gurram subbarao
- •
Data security is one of the most important sciences nowadays. There is a huge amount of data transferred over the internet each moment and this data should be secured. Steganography is a type data security techniques that is used to hide... more
Data security is one of the most important sciences nowadays. There is a huge amount of data transferred over the internet each moment and this data should be secured. Steganography is a type data security techniques that is used to hide the secret message into a cover object. Image steganography is the technique that hides an image in another image. This paper proposed a technique that depends on Lower-Upper (LU) decomposition. In the proposed technique LU decomposition is applied for both cover and secret images. The proposed method was tested using some gray and color images. The proposed technique achieved high results with reference to Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM), and Normalized Cross-Correlation (NCC). The PSNR for the cover image is ranging from 36 to 44 dB. The similarity between the secret image and the extracted image is 100% and the NCC is 1.
Wireless Sensor Networks (WSNs) are emerging networks that are being utilized in a variety of applications, such as remote sensing images, military, healthcare, and traffic monitoring. Those critical applications require different levels... more
Wireless Sensor Networks (WSNs) are emerging networks that are being utilized in a variety of applications, such as remote sensing images, military, healthcare, and traffic monitoring. Those critical applications require different levels of security; however, due to the limitation of the sensor networks, security is a challenge where traditional algorithms cannot be used. In addition, sensor networks are considered as the core of the Internet of Things (IoT) and smart cities, where security became one of the most significant problems with IoT and smart cities applications. Therefore, this paper proposes a novel and light trust algorithm to satisfy the security requirements of WSNs. It considers sensor nodes’ limitations and cross-layer information for efficient secure routing in WSNs. It proposes a Tow-ACKs Trust (TAT) Routing protocol for secure routing in WSNs. TAT computes the trust values based on direct and indirect observation of the nodes. TAT uses the first-hand and second-h...
Due to rapid growth of digital communication attributed to advancement of Internet technologies, at every time instant huge amount of multimedia information is created and transmitted on the Internet. However, ownership identification,... more
Due to rapid growth of digital communication attributed to advancement of Internet technologies, at every time instant huge amount of multimedia information is created and transmitted on the Internet. However, ownership identification, copyright violation, and identity theft are proving as the serious concerns because of the malicious attacks or hacking of open information. Attackers can alter or delete the information, and claim the ownership or prevent the receiver to get the data. Hence, researchers try to address such challenges. One such effort is concerned with multimedia data hiding through Steganography. In this article, a polynomial sequence generator called Lah Transform (LhT) is applied for developing a Steganography method. LhT generates an integer polynomial sequence in coefficient form by evaluating the pixel values using addition and multiplication. Initially, the cover image is partitioned into nonoverlapping b-pixel groups (where, b = 3 or 4) which in succession are converted into transform domain using LhT in row-major order. Secret bits are embedded into the LhT coefficients in varying proportions to achieve variable payload. Coefficient adjustment followed by the embedding process ensures minimum quality distortion. Inverse LhT is applied to regenerate b-pixel groups in the spatial domain. Results assure that incongruity between the cover pixels and stego-pixels rises as the value of b increases. Hence, to achieve a high payload, smaller values of b are chosen. The proposed method yields higher peak signal to noise ratio values and payload compared to some recent methods found in the literature. Code of our method is available here.
Cloud computing is one of the today's most exciting technologies due to its abilities like ensuring scalable services, reducing the burden of local hardware and software management associated with computing while increasing flexibility... more
Cloud computing is one of the today's most exciting technologies due to its abilities like ensuring scalable services, reducing the burden of local hardware and software management associated with computing while increasing flexibility and scalability. A major feature of the cloud services is that user's data are usually processed remotely in unknown machines. Though there are many conveniences brought by this new technology, there are some issues such as cloud computing servers can be easily compromised, data is no longer under the control of the data owner and cloud computing is not responsible for the access control of outsourced data desired by the data owner. To address these problems, we propose a new framework known as Secure Flexible Framework (SFF). This proposed framework allows data owner to achieve cloud data integrity, actual data usage tracking and fine grained access control of outsourced data. Through this paper, we strengthen the correctness and user's control of their own data in the cloud along with scalable, flexible and fine grained access control of outsourced data.
Due to rapid growth of digital communication attributed to advancement of Internet technologies, at every time instant huge amount of multimedia information is created and transmitted on the Internet. However, ownership identification,... more
Due to rapid growth of digital communication attributed to advancement of Internet technologies, at every time instant huge amount of multimedia information is created and transmitted on the Internet. However, ownership identification, copyright violation, and identity theft are proving as the serious concerns because of the malicious attacks or hacking of open information. Attackers can alter or delete the information, and claim the ownership or prevent the receiver to get the data. Hence, researchers try to address such challenges. One such effort is concerned with multimedia data hiding through Steganography. In this article, a polynomial sequence generator called Lah Transform (LhT) is applied for developing a Steganography method. LhT generates an integer polynomial sequence in coefficient form by evaluating the pixel values using addition and multiplication. Initially, the cover image is partitioned into nonoverlapping b-pixel groups (where, b = 3 or 4) which in succession are converted into transform domain using LhT in row-major order. Secret bits are embedded into the LhT coefficients in varying proportions to achieve variable payload. Coefficient adjustment followed by the embedding process ensures minimum quality distortion. Inverse LhT is applied to regenerate b-pixel groups in the spatial domain. Results assure that incongruity between the cover pixels and stego-pixels rises as the value of b increases. Hence, to achieve a high payload, smaller values of b are chosen. The proposed method yields higher peak signal to noise ratio values and payload compared to some recent methods found in the literature. Code of our method is available here.
Unique Provable information ownership (PDP) is a system for guaranteeing the Integrity of information away outsourcing. In this paper, we address the development of a productive PDP plan for disseminated distributed storage to backing the... more
Unique Provable information ownership (PDP) is a system for guaranteeing the Integrity of information away outsourcing. In this paper, we address the development of a productive PDP plan for disseminated distributed storage to backing the adaptability of administration and information relocation, in which we consider the presence of various cloud administration suppliers to helpfully store and keep up the customers' information. We display a helpful PDP (CPDP) plan in view of homomorphic unquestionable reaction and hash list chain of command. We demonstrate the security of our plan in light of multi-prover zero-learning verification framework, which can fulfil culmination, information soundness, and zero-learning properties. Furthermore, we verbalize execution advancement instruments for our plan, and specifically display a productive system for selecting ideal parameter qualities to minimize the calculation expenses of customers and capacity administration suppliers. Our analys...
Heterogeneous Wireless sensor network (HWSN) is group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment. Heterogeneous Wireless Sensor Networks (HWSNs) are used for... more
Heterogeneous Wireless sensor network (HWSN) is group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment. Heterogeneous Wireless Sensor Networks (HWSNs) are used for various applications such as habitat monitoring, automation, agriculture, and security. Wireless sensor network consists of large number of small nodes. The nodes then sense environmental changes and report them to other nodes over flexible network architecture. Heterogeneous WSNs are deployed in an unattended environment in which energy replenishment is very difficult. Due to limited resources, a Heterogeneous WSN must not only satisfy the application specific Quality of service (QOS) requirements such as reliability, timeliness and security, but also minimize energy consumption to prolong the system useful lifetime. The tradeoff issue between energy consumption vs. QOS gain becomes much more complicated when inside attackers or intruders are present in ...
- by Ansar Basha
- •
In recent days, applications are becoming highly pervasive and enrich end user devices with various functionalities. The resource constraints at client side restrict the usage of many applications which need high storage and intensive... more
In recent days, applications are becoming highly pervasive and enrich end user devices with various functionalities. The resource constraints at client side restrict the usage of many applications which need high storage and intensive computation. Cloud computing simplifies the deployment of large-scale distributed systems and enables advanced computational power with improved storage capabilities. Its evolution can be used for outsourcing data storage and processing. In spite of the relief, the clients no longer have control over their outsourced data which demands the purpose of ensuring the data intactness maintained by the Cloud Storage Server. For the verification of data correctness a third party trusted verifier is introduced in the proposed work which maintains dynamic metadata stored locally for the verification process. Bilinear mapping is used to ensure verification without retrieving the original data called blockless process. The verification proof generated using the proposed method is a small signature, which reduces the auditing overhead at the client side compared to existing solution. The proposed privacy preserving data auditing protocol relaxes the end users by reducing the computational overhead and achieves the verification of storage service.
In digital image processing and steganography, images are often described using edges and local binary pattern (LBP) codes. By combining these two properties, a novel hybrid image steganography method of secret embedding is proposed in... more
In digital image processing and steganography, images are often described using edges and local binary pattern (LBP) codes. By combining these two properties, a novel hybrid image steganography method of secret embedding is proposed in this paper. This method only employs edge pixels that influence how well the novel approach embeds data. To increase the quantity of computed edge pixels, several edge detectors are applied and hybridized using a logical OR operation. A morphological dilation procedure in the hybridized edge image is employed to this purpose. The least significant bits (LSB) and all LBP codes are calculated for edge pixels. Afterward, these LBP codes, LSBs, and secret bits using an exclusive-OR operation are merged. These resulting implanted bits are delivered to edge pixels’ LSBs. The experimental results show that the suggested approach outperforms current strategies in terms of measuring perceptual transparency, such as peak signal-to-noise ratio (PSNR) and structu...
Your article is protected by copyright and all rights are held exclusively by Springer Science +Business Media New York. This e-offprint is for personal use only and shall not be selfarchived in electronic repositories. If you wish to... more
Your article is protected by copyright and all rights are held exclusively by Springer Science +Business Media New York. This e-offprint is for personal use only and shall not be selfarchived in electronic repositories. If you wish to self-archive your article, please use the accepted manuscript version for posting on your own website. You may further deposit the accepted manuscript version in any repository, provided it is only made publicly available 12 months after official publication or later and provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at link.springer.com".
h i g h l i g h t s • A secure framework for ensuring the security of visual contents in online social networks. • Image scrambling using a light-weighted image scrambler before data embedding. • Encryption of sensitive contents using... more
h i g h l i g h t s • A secure framework for ensuring the security of visual contents in online social networks. • Image scrambling using a light-weighted image scrambler before data embedding. • Encryption of sensitive contents using iterative magic matrix-based encryption algorithm. • Data hiding using an adaptive LSB substitution method.
Image steganography is the art of concealing sensitive information inside cover images. Most of the existing steganographic algorithms use correlated color space such as RGB, where changes to one channel degrade the quality of stegoimages... more
Image steganography is the art of concealing sensitive information inside cover images. Most of the existing steganographic algorithms use correlated color space such as RGB, where changes to one channel degrade the quality of stegoimages due to its strong correlation, thereby making them less suitable for steganography. In this paper, we investigate the suitability of both correlated and uncorrelated color spaces for steganography considering time complexity and image quality. Based on this evaluation criteria, we suggest HSV as the most suitable color space for steganography among the four color models including RGB, YCbCr, HSI, and Lab. Furthermore, we propose an imperceptible steganographic method using the chosen color space based on block-wise magic least significant bit substitution which achieves balance between the time complexity and image quality. Our preliminary experimental results not only validate the superiority of the proposed method in terms of computational complexity and image quality but also suggest its potential application for secure transmission of key frames generated during wireless capsule endoscopy.
Your article is protected by copyright and all rights are held exclusively by Springer Science +Business Media New York. This e-offprint is for personal use only and shall not be selfarchived in electronic repositories. If you wish to... more
Your article is protected by copyright and all rights are held exclusively by Springer Science +Business Media New York. This e-offprint is for personal use only and shall not be selfarchived in electronic repositories. If you wish to self-archive your article, please use the accepted manuscript version for posting on your own website. You may further deposit the accepted manuscript version in any repository, provided it is only made publicly available 12 months after official publication or later and provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at link.springer.com".
Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. This paper proposes a novel magic least... more
Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. This paper proposes a novel magic least significant bit substitution method (M-LSB-SM) for RGB images. The proposed method is based on the achromatic component (Iplane) of the hue-saturation-intensity (HSI) color model and multi-level encryption (MLE) in the spatial domain. The input image is transposed and converted into an HSI color space. The Iplane is divided into four sub-images of equal size, rotating each sub-image with a different angle using a secret key. The secret information is divided into four blocks, which are then encrypted using an MLE algorithm (MLEA). Each sub-block of the message is embedded into one of the rotated sub-images based on a specific pattern using magic LSB substitution. Experimental results validate that the proposed method not only enhances the visual quality of stego images but also provides good imperceptibility and multiple security levels as compared to several existing prominent methods.
Wireless sensor networks (WSNs) are envisioned to be used in a wide variety of applications for deep monitoring of the surroundings. Their deployment in hostile environments, however, faces many security challenges. Wireless communication... more
Wireless sensor networks (WSNs) are envisioned to be used in a wide variety of applications for deep monitoring of the surroundings. Their deployment in hostile environments, however, faces many security challenges. Wireless communication is inherently broadcast and insecure. If WSNs are deployed in unregulated environments, an adversary can easily tamper with them or compromise some nodes. Sensor nodes are severely resource constrained in terms of power, memory and processing abilities. Achieving security for these networks is thus a challenging task. Sensor networks typically follow specific communication patterns. Effective security primitives can thus be provided by taking the application specific nature of WSNs into consideration. In this paper we propose a simple, lightweight and scalable protocol, Information Authentication in Sensor Networks (IASN) that can aid in providing information (high level data) authentication. IASN is able to detect and filter a significant number of forged packets at low cost. I.
As wireless sensor network's (WSN's) consists of large number of nodes which are deployed in unattended/hostile environments and are exposed to different types of attacks due to compromisation of node or group of nodes. Usually, security... more
As wireless sensor network's (WSN's) consists of large number of nodes which are deployed in unattended/hostile environments and are exposed to different types of attacks due to compromisation of node or group of nodes. Usually, security designs provide a hop-by-hop security paradigm and are vulnerable to many types of Denial of Service (DoS) attacks, such as report disruption and selective forwarding, puts data availability at stake. In this paper, we overcome these vulnerabilities for large-scale static WSN's by using Location aware multifunctional key management framework. Sensors will be deployed in some area in a grid type model and knows its position based on X and Y coordinates in the grid. Further, embed the
The Mobile Adhoc Network ( MANET) is not only limited to the temporary rescue operations rather it has been conceptualized to be adopted into many civil society comfort and safety applications including a specific domain called Vehicular... more
The Mobile Adhoc Network ( MANET) is not only limited to the temporary rescue operations rather it has been conceptualized to be adopted into many civil society comfort and safety applications including a specific domain called Vehicular adhoc network( VANET). The self-configurability of MANET’s node is the root cause of vulnerability and security threats, thus there is a need of light weight protocols which can ensure optimal Quality of Service (QoS) in secure way of routing. This paper illustrates a model of such secure routing in MANET called DTASR i.e. Dual Threshold-based Authentication for Secure Routing. It uses resource-based threshold scheme as well as trust-based authentication scheme to ensure higher degree of resiliency against adversaries as well as enhanced ability of communication performance when compared to conventional secure routing schemes.
SummaryOutsourcing datum to the cloud servers is more and more popular for most data owners and enterprises. However, how to ensure the outsourced datum to be kept secure is very important. Especially, how to check the outsourced... more
SummaryOutsourcing datum to the cloud servers is more and more popular for most data owners and enterprises. However, how to ensure the outsourced datum to be kept secure is very important. Especially, how to check the outsourced datum's integrity is a very challenge problem. Until now, there are many cryptographic protocols proposed to solve this problem, such as (dynamic) provable data position protocol, (dynamic) proof of retrievability protocol, etc. Recently, Tian et al proposed a dynamic‐hash‐table‐based public auditing scheme for secure cloud storage, which aims at simultaneously supporting secure dynamic data updating and secure public auditing for cloud storage. However, we find a security flaw in this protocol; concretely, the signature algorithm for the data blocks in their protocol is not secure; the cloud servers can easily modify the outsourced data blocks without detecting. Finally, we give a new protocol by using homomorphic tags based on their protocol and rough...
h i g h l i g h t s • A secure framework for ensuring the security of visual contents in online social networks. • Image scrambling using a light-weighted image scrambler before data embedding. • Encryption of sensitive contents using... more
h i g h l i g h t s • A secure framework for ensuring the security of visual contents in online social networks. • Image scrambling using a light-weighted image scrambler before data embedding. • Encryption of sensitive contents using iterative magic matrix-based encryption algorithm. • Data hiding using an adaptive LSB substitution method.
Wireless Sensor Networks comprises of thousands of sensor nodes that are low power and low cost. WSNs have gained wide applicability recently. Also, the major part of applications are real time and critical like Military, environmental... more
Wireless Sensor Networks comprises of thousands of sensor nodes that are low power and low cost. WSNs have gained wide applicability recently. Also, the major part of applications are real time and critical like Military, environmental monitoring etc. Thus, WSNs are highly susceptible to vulnerabilities. Hence, security of data is a very important issue. Every layer of the network is subjected to security threat. This paper concentrates on the network layer security. This paper presents a node disjoint multipath routing protocol which is not only energy efficient but also trust based. Energy efficiency is observed by using multipath routing. Also security is imparted by selecting the best path among multipaths based on maximum residual energy and trust among the nodes. Then, public crypto system is applied over the data and it is forwarded through the best path.
- by simran khiani
- •
Unique Provable information ownership (PDP) is a system for guaranteeing the Integrity of information away outsourcing. In this paper, we address the development of a productive PDP plan for disseminated distributed storage to backing the... more
Unique Provable information ownership (PDP) is a system for guaranteeing the Integrity of information away outsourcing. In this paper, we address the development of a productive PDP plan for disseminated distributed storage to backing the adaptability of administration and information relocation, in which we consider the presence of various cloud administration suppliers to helpfully store and keep up the customers' information. We display a helpful PDP (CPDP) plan in view of homomorphic unquestionable reaction and hash list chain of command. We demonstrate the security of our plan in light of multi-prover zero-learning verification framework, which can fulfil culmination, information soundness, and zero-learning properties. Furthermore, we verbalize execution advancement instruments for our plan, and specifically display a productive system for selecting ideal parameter qualities to minimize the calculation expenses of customers and capacity administration suppliers. Our analys...
To increase the life span of wireless sensor network, energy consumption must be minimized while satisfying given throughput and delay requirement. In this paper, we described an energy model based on cooperative MIMO scheme considering... more
To increase the life span of wireless sensor network, energy consumption must be minimized while satisfying given throughput and delay requirement. In this paper, we described an energy model based on cooperative MIMO scheme considering of both transmission and data aggregation energy is proposed for wireless sensor network. Based on this consequence, jointly considering both cooperative MIMO and data aggregation techniques which shows performance enhancement over conventional SISO system for same signalto-noise ratio. Moreover, at critical distance value MIMO system outperforms SISO system is compared. The results show that MQAM is the best modulation technique is proved by simulations and suitable diversity technique for energy miniaturization to send a given number of bits are analyzed.
Your article is protected by copyright and all rights are held exclusively by Springer Science +Business Media New York. This e-offprint is for personal use only and shall not be selfarchived in electronic repositories. If you wish to... more
Your article is protected by copyright and all rights are held exclusively by Springer Science +Business Media New York. This e-offprint is for personal use only and shall not be selfarchived in electronic repositories. If you wish to self-archive your article, please use the accepted manuscript version for posting on your own website. You may further deposit the accepted manuscript version in any repository, provided it is only made publicly available 12 months after official publication or later and provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at link.springer.com".
Automatic image / video labeling and indexing is an enthusiastic research area where visual contents are described using low-and high-level features such as shape, color, texture, and visual saliency. Researchers have proposed different... more
Automatic image / video labeling and indexing is an enthusiastic research area where visual contents are described using low-and high-level features such as shape, color, texture, and visual saliency. Researchers have proposed different techniques for automatic labeling of imaging data, enhancing the performance of content-based image retrieval systems. However, the complex and diverse nature of visual contents make automatic labelling very challenging. Furthermore, traditional labeling methods do not consider security issues, making third party to easily manipulate and retrieve personal records. In this context, we propose an efficient framework for secure data labeling using multi-algorithmic image steganography, where the description of every image is embedded as a secret information inside it, resulting in stego images. At the time of required image retrieval from huge visual data, the hidden description is decrypted from the stego image, extracting semantically relevant content...
Nowadays storage of data is big problem because the huge generation of multimedia data likes images, audio, video etc. whose size is very large. For storing of these data size of conventional storage is not sufficient so we need remote... more
Nowadays storage of data is big problem because the huge generation of multimedia data likes images, audio, video etc. whose size is very large. For storing of these data size of conventional storage is not sufficient so we need remote storage such as cloud which is resilient infrastructure, reliable and high quality performance for the cloud users. In the cloud there is no direct physical control over the records because the cloud uses its resource pool for storing. Consequently data reliability fortification and auditing is not a modest task. The user prerequisites to depend on a Third Party Auditor (TPA) who is working as a public auditor for authenticating the data integrity and privacy. This paper presents the various auditing techniques of cloud computing for improving security and then future research challenges which need to be adopt by researchers to make system obvious.
There has always been a trade-off between embedding capacity and stego quality, and due to this, current research in image steganography suffers either from low embedding capacity in order to preserve high stego image quality, or from... more
There has always been a trade-off between embedding capacity and stego quality, and due to this, current research in image steganography suffers either from low embedding capacity in order to preserve high stego image quality, or from sacrificing the stego quality for higher capacity. This paper proposes a steganography scheme that aims to achieve high embedding capacity while preserving stego image quality. The proposed approach utilizes a quad-tree segmentation process to partition the spatial domain of the cover image into high correlation and low correlation adaptive-size blocks. Embedding takes place in the high frequency regions of the discrete cosine transform domain of the highly correlated cover image blocks. Moreover, the L*a*b* color space is utilized for improving the stego image quality. Comparative results demonstrate how the proposed steganography scheme exceeds similar techniques in terms of payload capacity and stego quality using several performance measures.
There has always been a trade-off between embedding capacity and stego quality, and due to this, current research in image steganography suffers either from low embedding capacity in order to preserve high stego image quality, or from... more
There has always been a trade-off between embedding capacity and stego quality, and due to this, current research in image steganography suffers either from low embedding capacity in order to preserve high stego image quality, or from sacrificing the stego quality for higher capacity. This paper proposes a steganography scheme that aims to achieve high embedding capacity while preserving stego image quality. The proposed approach utilizes a quad-tree segmentation process to partition the spatial domain of the cover image into high correlation and low correlation adaptive-size blocks. Embedding takes place in the high frequency regions of the discrete cosine transform domain of the highly correlated cover image blocks. Moreover, the L*a*b* color space is utilized for improving the stego image quality. Comparative results demonstrate how the proposed steganography scheme exceeds similar techniques in terms of payload capacity and stego quality using several performance measures.
Your article is protected by copyright and all rights are held exclusively by Springer Science +Business Media New York. This e-offprint is for personal use only and shall not be selfarchived in electronic repositories. If you wish to... more
Your article is protected by copyright and all rights are held exclusively by Springer Science +Business Media New York. This e-offprint is for personal use only and shall not be selfarchived in electronic repositories. If you wish to self-archive your article, please use the accepted manuscript version for posting on your own website. You may further deposit the accepted manuscript version in any repository, provided it is only made publicly available 12 months after official publication or later and provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at link.springer.com".
Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. This paper proposes a novel magic least... more
Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. This paper proposes a novel magic least significant bit substitution method (M-LSB-SM) for RGB images. The proposed method is based on the achromatic component (Iplane) of the hue-saturation-intensity (HSI) color model and multi-level encryption (MLE) in the spatial domain. The input image is transposed and converted into an HSI color space. The Iplane is divided into four sub-images of equal size, rotating each sub-image with a different angle using a secret key. The secret information is divided into four blocks, which are then encrypted using an MLE algorithm (MLEA). Each sub-block of the message is embedded into one of the rotated sub-images based on a specific pattern using magic LSB substitution. Experimental results validate that the proposed method not only enhances the visual quality of stego images but also provides good imperceptibility and multiple security levels as compared to several existing prominent methods.
Security has become a key issue for any huge deployment of Wireless Sensor Network (WSN). Moreover, data reliability combined with energy loss minimization is really a challenging task, particularly to maintain survivability of the WSN... more
Security has become a key issue for any huge deployment of Wireless Sensor Network (WSN). Moreover, data reliability combined with energy loss minimization is really a challenging task, particularly to maintain survivability of the WSN under attacks such as sinkhole. Therefore, new security mechnisms must be in accordance with energy consumption constraint. This paper proposes to address this task using our Security Adaptation Reference Monitor (SARM) which is an efficient Framework capable of trading-off between security and energy optimization. SARM is based on an autonomic computing security looped system, which fine-tunes security means based on the monitoring of the context including energy consumption aspects. We evaluate SARM in the context of WSN through a simulation tool to verify the performance of overall reliability and energy loss in the presence of sinkhole attackers. The results clearly show that SARM is efficient in terms of reliability, overall network utilization and power consumption.
This paper proposes an adaptive dual-image-based reversible information hiding scheme. First, for a pixel pair in the original image, an associated square lattice is selected to determine the maximum distortion that will be induced by... more
This paper proposes an adaptive dual-image-based reversible information hiding scheme. First, for a pixel pair in the original image, an associated square lattice is selected to determine the maximum distortion that will be induced by hiding information. Then, an embedding rule, which combines the selected square lattice with integer rounding, is constructed. In addition, a novel histogram shifting mechanism to solve the problems of overflow and underflow is designed to decrease the distortions that are caused by the shifting of a large number of pixels. In our approach, both the original image and the secret messages can be recovered losslessly. Our experimental results show that the proposed scheme achieved performance that was superior to the state-of-the-art schemes, resulting in embedding rates up to 1.40 bpp and average PSNRs of approximately 47.60 dB. The proposed scheme also can be used in realtime systems due to the simplicity of its computations.
Upload the data streams to the cloud servers for the product evaluation; it is an important to many popular stream applications. And it is applying to many organizations. But at the same time, it is difficult to verify the result on the... more
Upload the data streams to the cloud servers for the product evaluation; it is an important to many popular stream applications. And it is applying to many organizations. But at the same time, it is difficult to verify the result on the cloud computation, it leads to the issues of trust. Since the outsourced data streams are retrieved from various resources. In the existing system, each originator has a unique secret key. But when the multiple users tend to download the same file, it leads to some misconceptions. Hence, it extends to the multiple-key settings, whereas it doesn’t use any specific algorithm for encryption. In this paper, we mainly focus on the security. We propose an Advance Encryption Standard (AES) for the encryption. And also we implement an extra proxy server for the data reliability. Hence, in this project, we introduce the novel homomorphic verifying tag technique. For verify the inner product evaluation on the multiple dynamic data streams and then it extends t...
Measurements collected in a wireless sensor network (WSN) can be maliciously compromised through several attacks, but anomaly detection algorithms may provide resilience by detecting inconsistencies in the data. Anomaly detection can... more
Measurements collected in a wireless sensor network (WSN) can be maliciously compromised through several attacks, but anomaly detection algorithms may provide resilience by detecting inconsistencies in the data. Anomaly detection can identify severe threats to WSN applications, provided that there is a sufficient amount of genuine information. This article presents a novel method to calculate an assurance measure for the network by estimating the maximum number of malicious measurements that can be tolerated. In previous work, the resilience of anomaly detection to malicious measurements has been tested only against arbitrary attacks, which are not necessarily sophisticated. The novel method presented here is based on an optimization algorithm, which maximizes the attack’s chance of staying undetected while causing damage to the application, thus seeking the worst-case scenario for the anomaly detection algorithm. The algorithm is tested on a wildfire monitoring WSN to estimate the ...
In this paper, we present Modify Deep Hiding Extraction Algorithm (MDHEA) that is a steganography algorithm with Multi-Level Steganography (MLS) and color image segmentation. Through experimental results, MDHEA shows improvement in the... more
In this paper, we present Modify Deep Hiding Extraction Algorithm (MDHEA) that is a steganography algorithm with Multi-Level Steganography (MLS) and color image segmentation. Through experimental results, MDHEA shows improvement in the results of previous works by securing encrypted secret data against attacks. We use segmentation to choose the appropriate segment, pass it on the cover image, calculate the value of the change at the pixel of the segment and select the best segment and its location in the cover image based on the least effect. MDHEA applies multi-level steganography to hide the confidential data in color images to ensure the integrity of the hidden data and obtain the largest volume of hidden data without distorting the image of the stego image. To reduce distortion in the cover image due to hiding a large amount of secret data and obtaining a high-quality stego image after hiding the secret data, we implement the Blue Smoothing Algorithm (BSA) to achieve smoothing t...
There has always been a trade-off between embedding capacity and stego quality, and due to this, current research in image steganography suffers either from low embedding capacity in order to preserve high stego image quality, or from... more
There has always been a trade-off between embedding capacity and stego quality, and due to this, current research in image steganography suffers either from low embedding capacity in order to preserve high stego image quality, or from sacrificing the stego quality for higher capacity. This paper proposes a steganography scheme that aims to achieve high embedding capacity while preserving stego image quality. The proposed approach utilizes a quad-tree segmentation process to partition the spatial domain of the cover image into high correlation and low correlation adaptive-size blocks. Embedding takes place in the high frequency regions of the discrete cosine transform domain of the highly correlated cover image blocks. Moreover, the L*a*b* color space is utilized for improving the stego image quality. Comparative results demonstrate how the proposed steganography scheme exceeds similar techniques in terms of payload capacity and stego quality using several performance measures.
Due to rapid growth of digital communication attributed to advancement of Internet technologies, at every time instant huge amount of multimedia information is created and transmitted on the Internet. However, ownership identification,... more
Due to rapid growth of digital communication attributed to advancement of Internet technologies, at every time instant huge amount of multimedia information is created and transmitted on the Internet. However, ownership identification, copyright violation, and identity theft are proving as the serious concerns because of the malicious attacks or hacking of open information. Attackers can alter or delete the information, and claim the ownership or prevent the receiver to get the data. Hence, researchers try to address such challenges. One such effort is concerned with multimedia data hiding through Steganography. In this article, a polynomial sequence generator called Lah Transform (LhT) is applied for developing a Steganography method. LhT generates an integer polynomial sequence in coefficient form by evaluating the pixel values using addition and multiplication. Initially, the cover image is partitioned into nonoverlapping b-pixel groups (where, b = 3 or 4) which in succession are converted into transform domain using LhT in row-major order. Secret bits are embedded into the LhT coefficients in varying proportions to achieve variable payload. Coefficient adjustment followed by the embedding process ensures minimum quality distortion. Inverse LhT is applied to regenerate b-pixel groups in the spatial domain. Results assure that incongruity between the cover pixels and stego-pixels rises as the value of b increases. Hence, to achieve a high payload, smaller values of b are chosen. The proposed method yields higher peak signal to noise ratio values and payload compared to some recent methods found in the literature. Code of our method is available here.
In this paper, we investigate the security performance of the SPREAD scheme, which we proposed as a complementary mechanism to enhance data confidentiality in a mobile ad hoc network (MANET). SPREAD is based on two principles, secret... more
In this paper, we investigate the security performance of the SPREAD scheme, which we proposed as a complementary mechanism to enhance data confidentiality in a mobile ad hoc network (MANET). SPREAD is based on two principles, secret sharing and multipath routing. By a secret sharing scheme, a secret message can be divided into multiple shares; then by multipath routing, the shares can be delivered to the destination via multiple paths. Improved security is expected because an adversary (adversaries) will have more difficulty in collecting enough shares to compromise the secret message. As the broadcast wireless channel of a MANET has a significant impact on the performance of multipath routing, we examine the performance of SPREAD based on the shared single wireless channel model by simulation. Our results show that SPREAD scheme is effective in reducing the message compromising and eavesdropping probability. The impacts of node mobility and different share allocations on the performance of SPREAD are also investigated.
Wireless sensor networks (WSNs) have become one of the current research areas, and it proves to be a very supportive technology for various applications such as environmental-, military-, health-, home-, and office-based applications. WSN... more
Wireless sensor networks (WSNs) have become one of the current research areas, and it proves to be a very supportive technology for various applications such as environmental-, military-, health-, home-, and office-based applications. WSN can either be mobile wireless sensor network (MWSN) or static wireless sensor network (SWSN). MWSN is a specialized wireless network consisting of considerable number of mobile sensors, however the instability of its topology introduces several performance issues during data routing. SWSNs consisting of static nodes with static topology also share some of the security challenges of MWSNs due to some constraints associated with the sensor nodes. Security, privacy, computation and energy constraints, and reliability issues are the major challenges facing WSNs, especially during routing. To solve these challenges, WSN routing protocols must ensure confidentiality, integrity, privacy preservation, and reliability in the network. Thus, efficient and energy-aware countermeasures have to be designed to prevent intrusion in the network. In this chapter, we describe different forms of WSNs, challenges, solutions, and a point-to-point multi-hop-based secure solution for effective routing in WSNs.
Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In... more
Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small data embedding. Detecting such local modifications is comparatively easier for a steganalyzer. As a result, it is preferable to distribute bits evenly across the image. Again, the schemes struggle to hide large messages in a cover image due to the algorithmic approach of hiding a fixed number of bits per pixel. In this research, we have overcome that problem by employing multiple edge detectors in generating a resultant edge image. Depending on the embedding needs, we have checked whether a single edge detector is sufficient to help in conceiving all bits or not. If it is not possible for a single-edge detector, we have hybridized them. Hybridization of edge images is performed either by logical AND, OR or OR with dilation. When the message size is very small, we have generated the resultant edge image by doing a logical AND operation among the edge images. That strategy have reduced the number of edge pixels as well as helped in distributing the to-be-embedded bits over the image in a more evenly manner. Similarly, to meet a larger embedding demand, we have performed a logical OR operation among the same edge images to increase the number of edge pixels. Even, to meet more embedding demand, we have dilated the OR-resultant image. These processes were carried out dynamically in the research according to an embedding demand. The experimental results deduce that this scheme embeds 92.37%, 73.92%, 74.78%, and 9.60% more bits than four competing methods. Similarly, for small embedding demand, the proposed scheme demonstrates 37.45%, 46.87%, 44.21%, and 55.56% higher PSNR values than the others. Moreover, statistical analyses state that this scheme demonstrates stronger security against attacks.
- by Habiba Sultana
- •
- Embedding, Detector
With the development of Internet communications, the security of message sending on the Internet has become very important. This article proposes a new adaptive data hiding method with a large data-embedding capacity for gray-scale images... more
With the development of Internet communications, the security of message sending on the Internet has become very important. This article proposes a new adaptive data hiding method with a large data-embedding capacity for gray-scale images to raise the security of sending a message between sender and receiver in networks. At first, the image is divided into some blocks consisting of two consecutive pixels. If the values of both pixels are small, fewer secret bits will be embedded within the two pixels, otherwise, the difference value of two pixels is calculated, and according to the obtained difference value, the method will estimate the number of embedding bits into LSBs of two pixels. This number is adaptive and depends on the range to which the difference value belongs. A readjusting phase is presented to keep the difference of value pixels in the same range before and after embedding. Experimental results show that our method has increased the capacity of embedding bits in comparison with the several other methods.
The architecture of two-tiered sensor networks, consist of three types of nodes: Sensor, Storage node and a sink, where storage nodes serve as an middle layer between sensors and a sink for storing data and for processing queries, this... more
The architecture of two-tiered sensor networks, consist of three types of nodes: Sensor, Storage node and a sink, where storage nodes serve as an middle layer between sensors and a sink for storing data and for processing queries, this has been widely used and adopted because of the power and storage saving benefits for sensors as well as the efficiency of query processing. In this paper, we have discussed about the different mechanisms and algorithms through which the security and integrity has been provided to the Wireless Sensor Networks, and also discussed about the drawbacks in the existing system, along with the additional mechanism to provide the Privacy to the network. To preserve the Privacy and Integrity we have mainly considered a SafeQ protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. To preserve privacy, SafeQ uses a novel te...
In cloud computing environment, data owners usually host huge data on the cloud servers where clients access the data without knowing actual location. Due to this data outsourcing on un-trusted servers, efficient and reliable verification... more
In cloud computing environment, data owners usually host huge data on the cloud servers where clients access the data without knowing actual location. Due to this data outsourcing on un-trusted servers, efficient and reliable verification of the outsourced data becomes an open challenge in data security of Cloud Storage. Additionally, the integrity checking protocol must be efficient in order to save the verifier’s cost. This triggered huge set of research activities, resulting in amount of proposals. Integrity verification of client data is achieved commonly by using a technique called Provable Data Possession (PDP). This paper provides overview of current variations in PDP technique by specifying models, functionality, strengths and weaknesses. Keywords— Cloud Computing, Provable Data Possession (PDP), Integrity Verification, Cloud Storage Security
Due to specific restrictions, wireless sensor networks (WSNs) enable necessitate unique protocol configuration paradigms and new applications. An acceptable balance between the connection and wave intensity is needed.So, that the power... more
Due to specific restrictions, wireless sensor networks (WSNs) enable necessitate unique protocol configuration paradigms and new applications. An acceptable balance between the connection and wave intensity is needed.So, that the power density and lower power consuption data could be achieved. Over the last decade, this has encouraged increased effort in exploration, the process establish, and industrial investment in the sector. The goal of this survey study is to provide a comprehensive review of WSN technology, essential applications and standards, design aspects, and evolution. A model study based on real use is given, and several uncommon applications, such as those based on environmental awareness, are examined and highlighted in design strategies. Trends and possible adjustments are discussed. IEEE 802.15.4 technology is highlighted because it enables the usage of numerous WSNs.
This work focuses on the development of relatively simple, low cost, autonomous and feasible wireless sensor network and related embedded system combination to be integrated with AMATEUR UAV and unmanned ground vehicle (UGV) management... more
This work focuses on the development of relatively simple, low cost, autonomous and feasible wireless sensor network and related embedded system combination to be integrated with AMATEUR UAV and unmanned ground vehicle (UGV) management system both at inter and intra level communication and networking for different modules and different vehicles. What we describe here is our progress in a ongoing live project. We also make fresh implementable proposals to integrate autonomous Amateur UAV and share plans to implement it for vehicle management system using intelligent communication and networked system approach. We envision the capability of modern sensing network where communication between different sensors and embedded system combination enable user to have a closer view over larger area and provide potent capability of acting autonomously.
Wireless Sensor Network (WSN) is a rising technology that offers a great assurance towards a variety of revolutionary applications such as military and public. As wireless sensor networks continue to develop, there is a high importance in... more
Wireless Sensor Network (WSN) is a rising technology that offers a great assurance towards a variety of revolutionary applications such as military and public. As wireless sensor networks continue to develop, there is a high importance in security mechanisms. As sensor networks works with responsive data and operate in antagonistic environments, it is crucial to address the security issues. The sensing technology united with wireless communication and processing power makes it rewarding. Due to these computing and inherent constraints in resource, sensor network security has special challenges. The low cost and collaborative nature of the wireless networks (WNs) offers significant advantages upon the conventional communication techniques. The wireless communication technology has several kinds of security threats. The spotlight of this paper is towards addressing the security issues and challenges of WSNs. Here the idea is to identify the threats and security mechanism of wireless s...
Cloud storage has become a trend and more practical in recent years. This unique feature of the cloud poses many security challenging design issues. One of the most important security aspects that need to be addressed is that to assure... more
Cloud storage has become a trend and more practical in recent years. This unique feature of the cloud poses many security challenging design issues. One of the most important security aspects that need to be addressed is that to assure the integrity of clients data stored in the cloud. In this paper, we propose a RSA-based dynamic public audit service for the integrity verification of data using Sobol sequence. Our scheme allows a third party auditor (TPA) on behalf of the clients to verify the integrity of data stored in the cloud and also supports data dynamics at block level while maintaining the same integrity assurance. Our model allows probabilistic proofs of integrity by challenging random blocks from the server which drastically reduces the computation and communication overhead. The security, performance analysis and experimental results show that our scheme is more secure and efficient than existed probability verification schemes.
Image Steganography is a growing research area of information security where secret information is embedded in innocent-looking public communication. This paper proposes a novel crystographic technique for grayscale images in spatial... more
Image Steganography is a growing research area of information security where secret information is embedded in innocent-looking public communication. This paper proposes a novel crystographic technique for grayscale images in spatial domain. The secret data is encrypted and shuffled using pattern based bits shuffling algorithm (PBSA) and a secret key. The encrypted data is then embedded in the cover image using magic least significant bit (M-LSB) method. Experimentally, the proposed method is evaluated by qualitative and quantitative analysis which validates the effectiveness of the proposed method in contrast to several state-of-the-art methods.
Nowadays storage of data is big problem because the huge generation of multimedia data likes images, audio, video etc. whose size is very large. For storing of these data size of conventional storage is not sufficient so we need remote... more
Nowadays storage of data is big problem because the huge generation of multimedia data likes images, audio, video etc. whose size is very large. For storing of these data size of conventional storage is not sufficient so we need remote storage such as cloud which is resilient infrastructure, reliable and high quality performance for the cloud users. In the cloud there is no direct physical control over the records because the cloud uses its resource pool for storing. Consequently data reliability fortification and auditing is not a modest task. The user prerequisites to depend on a Third Party Auditor (TPA) who is working as a public auditor for authenticating the data integrity and privacy. This paper presents the various auditing techniques of cloud computing for improving security and then future research challenges which need to be adopt by researchers to make system obvious.