2020
DOI: 10.3390/sym12122071
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things

Abstract: With the unprecedented growing demand for communication between Internet of Things (IoT) devices, the upcoming 5G and 6G technologies will pave the path to a widespread use of ultra-reliable low-latency applications in such networks. However, with most of the sensitive data being transmitted over wireless links, security, privacy and trust management are emerging as big challenges to handle. IoT applications vary, from self-driving vehicles, drone deliveries, online shopping, IoT smart cities, e-healthcare and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…We plan to use it in the upcoming European Defense Agency (EDA) project, codenamed SOFTANET, for the hidden data layer in the wireless part of a software-defined network (SDN) [35][36][37]. It is in line with the trend, visible in the literature, of using steganography in 5G systems and networks, e.g., [21,38].…”
Section: Introductionmentioning
confidence: 61%
“…We plan to use it in the upcoming European Defense Agency (EDA) project, codenamed SOFTANET, for the hidden data layer in the wireless part of a software-defined network (SDN) [35][36][37]. It is in line with the trend, visible in the literature, of using steganography in 5G systems and networks, e.g., [21,38].…”
Section: Introductionmentioning
confidence: 61%
“…In [27], the authors presented the experimental study using the ANN methods to overcome the analytic challenge in 5G-based IoT networks. The sensitive data transmission in these networks always needs attention, especially data of ultra-reliable low-latency applications.…”
Section: Related Workmentioning
confidence: 99%
“…Message Integrity was used to develop a mechanism for audio steganography. According to Atoum, Ibrahim, Sulong, and Zamani (2013) 5) , the Steganography technique's designer employed a simple paradigm for extracting and embedding the hidden information. Some of them used the same key to extract hidden messages as well as embed messages in the host signal.…”
Section: Related Studiesmentioning
confidence: 99%
“…Alsabhany (2020) 26) proposed an efficient technique to improve the capacity of hiding by 70%. MohammedJ(2020) 5) )proposed a model for hiding data in mp3 files. Hussein(2019) 32) The proposed techniques are more suitable and cable for hiding text and measured SNR and PSNR values.…”
Section: Scheme Comparisonmentioning
confidence: 99%
See 1 more Smart Citation