2022
DOI: 10.3390/s22072612
|View full text |Cite
|
Sign up to set email alerts
|

Steganography in IoT: Information Hiding with APDS-9960 Proximity and Gestures Sensor

Abstract: This article describes a steganographic system for IoT based on an APDS-9960 gesture sensor. The sensor is used in two modes: as a trigger or data input. In trigger mode, gestures control when to start and finish the embedding process; then, the data come from an external source or are pre-existing. In data input mode, the data to embed come directly from the sensor that may detect gestures or RGB color. The secrets are embedded in time-lapse photographs, which are later converted to videos. Selected hardware … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…For example, another steganographic system [ 54 ] uses APDS-9960 proximity and gestures sensor. Secret data are concealed within a comment section of time-lapse photographs (JPEG files) captured with a digital camera on Raspberry Pi.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, another steganographic system [ 54 ] uses APDS-9960 proximity and gestures sensor. Secret data are concealed within a comment section of time-lapse photographs (JPEG files) captured with a digital camera on Raspberry Pi.…”
Section: Discussionmentioning
confidence: 99%
“…Citing [ 54 ], Raspberry Pi 4 Model B is a tiny, credit-card-sized computer, usually used as a robot brain, smart home hub, media center, factory controller, etc. The chosen version has 8 GB of RAM.…”
Section: Methodsmentioning
confidence: 99%
“…Subliminal channels are a great way of covert communication in an insecure environment. They find application in, for example, steganography [16], to hide secret data without suspicion. Normally, visual cryptography is used for image protection [17], and when saving computing resources is important [18,19].…”
Section: Discussionmentioning
confidence: 99%
“…In this paper have been defined new steganographic techniques for information hiding, which depend on the carrier. In traditional steganographic solutions secret hiding is not dependent on the content or features of container [1], [2]. Most approaches modify parameters in spatial or frequency domains, and not consider local carrier parameters [3].…”
Section: Introductionmentioning
confidence: 99%