Steganography is the science of invisible communication. Apart from the sender and intended recipient no one suspects the existence of the message. Using Steganography, information can be hidden in various mediums known as carriers. The carriers can be images, audio files, video files and text files. Image Steganography is a technique of using an image file as a carrier. Cryptography protects the information by applying the encryption and decryption techniques, so that the secret message can be understood only by the right person.This paper proposes a method, which combines the techniques of Steganography and cryptography, to hide the secret data in an image. In the first phase, the sender will embed the secret data in an image by using the Least Significant Bit (LSB) technique. The embedded image will be encrypted by using an encryption algorithm. At final, the encrypted image will be decrypted and the hidden data will be retrieved by supplying the valid secret key by the receiver. The process includes the phases of Data embedding, Image Encryption and recovery of both original image and secret data from the encrypted image.
A Smart city is characterized by the efficient use of information technology and industrial assets for financial improvement. Internet of Things (IoT) is an arrangement of embedded devices that communicates by using the internet and uniquely addressable with standard protocols. Application areas of Internet of things are smart cities, environmental protection, smart transportation, healthcare, agriculture and public security. Development of Smart cities leading to Pollution. Air Pollution is an environmental health concern for the public. Carbon Monoxide is a harmful gas to the human beings and also the leading cause of air pollution. So it is necessary to develop a mechanism for the detection of carbon monoxide molecules. This paper presents a survey on the methods of measuring the Carbon Monoxide emissions by using Wireless Sensor Networks. Availability of CO data from a monitoring program can be utilized for providing the awareness to the public about the air pollution.
Distributed computing guarantees to on a very basic level change the way we utilizePCs and get to and store our own specific and business data. With these new registering and correspondences models develop new data security challenges. Existing information security structures, for instance, encryption have fizzled in imagining information theft strikes, particularly those executed by an insider to the cloud supplier. We propose a substitute methodology for securing information in the cloud utilizing adversarial mimic improvement. We screen data access in the cloud and perceive unpredictable data access outlines. Right when unapproved access is suspected and after that confirmed using test questions, we dispatch a disinformation strike by giving back a considerable measure of fake information to the attacker. This secures against the misuse of the customer's real data. Trials coordinated in a neighbor-hood archive setting give confirmation this technique may give unprecedented levels of customer data security in a Cloud space.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.