2019
DOI: 10.1109/jiot.2018.2886996
|View full text |Cite
|
Sign up to set email alerts
|

Fractional-Order Spatial Steganography and Blind Steganalysis for Printed Matter: Anti-Counterfeiting for Product External Packing in Internet-of-Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Ding et al [43] used mobile edge computing to implement image steganography in IoT, assuming that mobile edge computing fulfills the high computing power, data storage capacity, and bandwidth requirements for the Internet of Things (IoT) through edge servers that process data close to data sources or users. To efficiently protect external product packing in IoT against anti-counterfeiting, Pu et al [44] used fractionalorder spatial steganography (FSS) and blind steganalysis. To promote secure data transfer in a smart IoT environment, a security scheme is advocated to employ a combined approach of lightweight cryptography and the variable least significant bit substitution steganography technique to conform to the intrinsic constraints of IoT devices [45].…”
Section: Related Workmentioning
confidence: 99%
“…Ding et al [43] used mobile edge computing to implement image steganography in IoT, assuming that mobile edge computing fulfills the high computing power, data storage capacity, and bandwidth requirements for the Internet of Things (IoT) through edge servers that process data close to data sources or users. To efficiently protect external product packing in IoT against anti-counterfeiting, Pu et al [44] used fractionalorder spatial steganography (FSS) and blind steganalysis. To promote secure data transfer in a smart IoT environment, a security scheme is advocated to employ a combined approach of lightweight cryptography and the variable least significant bit substitution steganography technique to conform to the intrinsic constraints of IoT devices [45].…”
Section: Related Workmentioning
confidence: 99%
“…For every sample of I k in the dataset, different indicators are calculated with (83), and (85) using different correlations defined in (1), (2), and (6). The 2LQR and 2SQR indicators of all the test samples using Pearson, Spearman, and Kendall correlation are shown in Fig.…”
Section: Performance Of Different Indicators In Authenticationmentioning
confidence: 99%
“…To solve this problem, many methods have been proposed, such as steganography-based methods [6] and texture-based methods [7,8,9]. Steganography-based method in [6] hides the entire QR code image into the color channel of the carrier image, so a relatively expensive color printer is required. In addition, the QR code image needs to be restored from the carrier image before it can be read, which increases the processing time and is not compatible with ordinary QR code reading programs.…”
Section: Introductionmentioning
confidence: 99%
“…Information can take many forms and data hiding schemes are dependent on the media they are intended to be used with. For instance, in [14] steganography for printed matter that can be employed in the anti-counterfeiting for product external packing in the Internet of Things (IoT) is discussed, in [15] the secret message is embedded into the cover of a quantum channel in steganography protocol for Fog Cloud IoT and in [16] the noise resilient audio steganography technique is proposed to be used in IoT networks.…”
Section: Related Workmentioning
confidence: 99%