GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017
DOI: 10.1109/glocom.2017.8255039
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Noise Resilient Steganography Scheme for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(22 citation statements)
references
References 11 publications
0
22
0
Order By: Relevance
“…A key observation of this method is the high Bit Error Rate (BER), which reached 21% when 25 bins were modified per frame. In contrast, the methods proposed in [16], [17], [22] and [31] achieved high embedding rates. These methods used thresholding criteria that avoided embedding at low frequencies, while in the selected frequencies, explicit layers of the Least Significant Bit (LSB) in each phase were exploited to hide the secret message.…”
Section: Related Workmentioning
confidence: 85%
See 2 more Smart Citations
“…A key observation of this method is the high Bit Error Rate (BER), which reached 21% when 25 bins were modified per frame. In contrast, the methods proposed in [16], [17], [22] and [31] achieved high embedding rates. These methods used thresholding criteria that avoided embedding at low frequencies, while in the selected frequencies, explicit layers of the Least Significant Bit (LSB) in each phase were exploited to hide the secret message.…”
Section: Related Workmentioning
confidence: 85%
“…In [16] and [17], the BER was not measured at high embedding rates. However, in [22], the BER was around 0% against 10 dB of SNR after white Gaussian noise addition. The contradictory BER results in [19] and [22] combined reveal a research-worthy issue.…”
Section: Related Workmentioning
confidence: 93%
See 1 more Smart Citation
“…Information can take many forms and data hiding schemes are dependent on the media they are intended to be used with. For instance, in [14] steganography for printed matter that can be employed in the anti-counterfeiting for product external packing in the Internet of Things (IoT) is discussed, in [15] the secret message is embedded into the cover of a quantum channel in steganography protocol for Fog Cloud IoT and in [16] the noise resilient audio steganography technique is proposed to be used in IoT networks.…”
Section: Related Workmentioning
confidence: 99%
“…The idea of hiding in expert systems lies in two basic ideas: the first is to sacrifice a large part of the complexity of hiding algorithms and thereby reduce the amount of processing and make the application lightweight, and to sacrifice part of the strength and resistance of the algorithm used against detection and various attacks. The second idea is to try to find concise methods and simplified methods of applying hiding algorithm with a much lower processing amount than the original algorithm and thus achieving the standards of lightweight applications [4][12].…”
Section: The Hiding In Lightweight Systemsmentioning
confidence: 99%