Recent developments in the speed of the Internet and information technology have made the rapid exchange of multimedia information possible. However, these developments in technology lead to violations of information security and private information. Digital steganography provides the ability to protect private information that has become essential in the current Internet age. Among all digital media, digital video has become of interest to many researchers due to its high capacity for hiding sensitive data. Numerous video steganography methods have recently been proposed to prevent secret data from being stolen. Nevertheless, these methods have multiple issues related to visual imperceptibly, robustness, and embedding capacity. To tackle these issues, this paper proposes a new approach to video steganography based on the corner point principle and LSBs algorithm. The proposed method first uses Shi-Tomasi algorithm to detect regions of corner points within the cover video frames. Then, it uses 4-LSBs algorithm to hide confidential data inside the identified corner points. Besides, before the embedding process, the proposed method encrypts confidential data using Arnold's cat map method to boost the security level. Experimental results revealed that the proposed method is highly secure and highly invisible, in addition to its satisfactory robustness against Salt & Pepper noise, Speckle noise, and Gaussian noise attacks, which has an average Structural Similarity Index (SSIM) of more than 0.81. Moreover, the results showed that the proposed method outperforms state-of-the-art methods in terms of visual imperceptibility, which offers excellent peak signalto-noise ratio (PSNR) of average 60.7 dB, maintaining excellent embedding capacity.
Wireless Sensor Networks (WSNs) have become extremely popular for sensing, collecting, and transmitting data across different environments. In particular, the AODV protocol is widely used to improve the behavior of WSNs in various applications. A bottleneck in the protocol's performance is the amount of data that need to be moved between different nodes. This bottleneck becomes evident in applications based on multimedia contents, such as images or videos, in which huge chunks of data need to be delivered over long distances. In this paper, we propose a new method to enhance the performance of the AODV protocol. Simulation results show that the proposed method improves the performance of the AODV protocol for image-based applications. The technique increases the quality of the delivered images, extends the network's lifetime, and reduces the delay and the network overhead associated with providing such images.
Wireless video sensor networks have been a hot topic in recent years; the monitoring capability is the central feature of the services offered by a wireless video sensor network can be classified into three major categories: monitoring, alerting, and information on-demand. These features have been applied to a large number of applications related to the environment (agriculture, water, forest and fire detection), military, buildings, health (elderly people and home monitoring), disaster relief, area and industrial monitoring. Security applications oriented toward critical infrastructures and disaster relief are very important applications that many countries have identified as critical in the near future. This paper aims to design a cross layer based protocol to provide the required quality of services for security related applications using wireless video sensor networks. Energy saving, delay and reliability for the delivered data are crucial in the proposed application. Simulation results show that the proposed cross layer based protocol offers a good performance in term of providing the required quality of services for the proposed application.
Monitoring older bridges using Wireless Sensor Networks (WSNs) has had a lot of attention in recent years. In much of this research tasks like sensor data processing, environment states and events decision making are done by a remote server. A Structural Health Monitoring (SHM) application using WSNs to provide the data collection necessary for rapid structural assessment after an event such as a natural disaster has been simulated in this paper. Efficient MAC and routing protocols must be designed for the proposed application to offer a guarantee for the reliability of the data delivered from source nodes to a sink. The number of delivered reports, delay and the lifetime of the network are considered in the proposed application. As a result, a new cross layer protocol based on MAC and routing protocols is designed and simulated for SHM application taking different scenarios into consideration and results are presented in this paper. Simulation results show that the proposed protocol increases performance of the target application, in varies scenarios.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.