Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/1586
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAmjath, M.I.M.-
dc.contributor.authorSenthooran, V.-
dc.date.accessioned2022-03-14T05:27:19Z-
dc.date.available2022-03-14T05:27:19Z-
dc.date.issued2020-11-10-
dc.identifier.isbn978-1-7281-8412-8-
dc.identifier.urihttp://rda.sliit.lk/handle/123456789/1586-
dc.description.abstractIoT is an emerging technology in modern world of communication. As the usage of IoT devices is increasing in day to day life, the secure data communication in IoT environment is the major challenge. Especially, small sized Single-Board Computers (SBCs) or Microcontrollers devices are widely used to transfer data with another in IoT. Due to the less processing power and storage capabilities, the data acquired from these devices must be transferred very securely in order to avoid some ethical issues. There are many cryptography approaches are applied to transfer data between IoT devices, but there are obvious chances to suspect encrypted messages by eavesdroppers. To add more secure data transfer, steganography mechanism is used to avoid the chances of suspicion as another layer of security. Based on the capabilities of IoT devices, low complexity images are used to hide the data with different hiding algorithms. In this research study, the secret data is encoded through QR code and embedded in low complexity cover images by applying image to image hiding fashion. The encoded image is sent to the receiving device via the network. The receiving device extracts the QR code from image using secret key then decoded the original data. The performance measure of the system is evaluated by the image quality parameters mainly Peak Signal to Noise Ratio (PSNR), Normalized Coefficient (NC) and Security with maintaining the quality of contemporary IoT system. Thus, the proposed method hides the precious information within an image using the properties of QR code and sending it without any suspicion to attacker and competes with the existing methods in terms of providing more secure communication between Microcontroller devices in IoT environment.en_US
dc.language.isoenen_US
dc.publisher2020 2nd International Conference on Advancements in Computing (ICAC), SLIITen_US
dc.relation.ispartofseriesVol.1;-
dc.subjectIoTen_US
dc.subjectSteganographyen_US
dc.subjectCryptographyen_US
dc.subjectQR codeen_US
dc.subjectMicrocontrolleren_US
dc.titleSecure Communication Using Steganography in IoT Environmenten_US
dc.typeArticleen_US
dc.identifier.doi10.1109/ICAC51239.2020.9357260en_US
Appears in Collections:2nd International Conference on Advancements in Computing (ICAC) | 2020

Files in This Item:
File Description SizeFormat 
Secure_Communication_Using_Steganography_in_IoT_Environment.pdf
  Until 2050-12-31
417.71 kBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.