Dual Security based on Crypto Steganography Using Two Level Learning In Assist with Dual Offbeat Shielding Design

Authors

  • Siva Raja P M  Computer Science and Engineering, Amrita College of Engineering and Technology, Nagercoil, Tamilnadu, India
  • Sumithra R P  Computer Science and Engineering, Amrita College of Engineering and Technology, Nagercoil, Tamilnadu, India
  • Thanusha G  Computer Science and Engineering, Amrita College of Engineering and Technology, Nagercoil, Tamilnadu, India

DOI:

https://doi.org//10.32628/CSEIT12173125

Keywords:

Chen Chaotic System, Wrapper Based Feature Selection, Pixel Value Differencing, Glow Worm Search Optimization.

Abstract

A sensor node and other electronic devices attached to any IoT object can be involved in the communication over wireless network in IoT environments, which makes it necessary to preprocess a large amount of sensed data before storing it. Therefore, sensing data in the form of images is to be sent to the cloud storage system via wireless medium, but this suffers from image hijacking where data is manipulated, which leads to insecure transmission. To mitigate this problem, two levels of security are employed. Memory retaining is the primary level of enhancing learning which uses past experiences to extract optimal features from sensed images and then subjected to offbeat shielding activities, which include cryptographic steganography. The proposed system creates cloud storage that is protected by the optimal features learned from a neural network, thus ensuring that clouds are secure in the Internet of Things.

References

  1. El-Latif, Ahmed Abd, A., BassemAbd-El-Atty, ShamimHossain, M., Samir Elmougy, and Ahmed Ghoneim.2018 “Secure quantum steganography protocol for fog cloud Internet of Things.” IEEE Access (6): 10332-10340.
  2. Luong, N.C., Hoang, D.T., Wang, P., Niyato, D., Kim, D.I., and Han, Z.2016 “Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models” A Survey.IEEE Communications Surveys and Tutorials18(4): 2546- 2590.
  3. Gao, J., Li, J., and Li, Y “ Approximate Event Detection over Multimodal Sensing Data.Journal of Combinatorial Optimization”.
  4. Gao, J., Li, J.,Cai, Z., et al. 2015 “Composite event coverage in wireless sensor networks with heterogeneous sensors.” In Proceedings of 2015 IEEE Conference on Computer Communications (INFOCOM): 217-225.
  5. Zhang, Q., Zhu, C., Yang, L.T., Chen, Z., Zhao, L., and Li, P. 2017 “An Incremental CFS Algorithm for Clustering Large Data in Industrial Internet of Things.” IEEE Transactions on Industrial Informatics13(3): 1193-1201.
  6. Singh, P., Agarwal, N., Raman, B. 2016 “Don’t see me, just filter me: towards secure cloud-based filtering using shamir’s secret sharing and pob number system” Proceedings of the Tenth Indian Conference on Computer Vision.Graphics and Image Processing, ACM12.
  7. Singh, P., Raman, B.,Misra, M.2017 “Just process me, without knowing me: a secure encrypted domain processing based on shamir secret sharing and pob number system.” Multimedia Tools Appl,1–25.
  8. Atee, HayfaaAbdulzahra, Robiah Ahmad, NorlizaMohd Noor, Abdul MonemRahma, S., and YazanAljeroudi. 2017 “Extreme learning machine based optimal embedding location finder for image steganography.” PloS one12(2): e0170329.
  9. Komal Patel and SumitUtareja.2013 “Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm.” International Journal of Computer Applications (IJCA)63(13).
  10. Sumathi, C.P., Santanam, T., and Umamaheswari, G.2014 “A study of various steganographic techniques used for information hiding.” arXiv preprint arXiv: 1401.5561.
  11. Srivastava, Arpit Kumar, ApoorvAgarwal, and AbhinavMathur.2015 “Internet of Things and its enhanced data security.” International Journal of Engineering and Applied Sciences (IJEAS)2(2).
  12. Jung, Ki-Hyun.2018 “Authenticable reversible data hiding scheme with less distortion in dual stego-images.” Multimedia Tools and Applications77(5): 6225-6241.
  13. Jung, Ki-Hyun.2018 “Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane” Journal of Real-Time Image Processing14(1): 127-136.
  14. LeCun, Y., Bengio, Y., and Hiton, G., 2015 “Deep learning” Nature521(7553): 436-444.
  15. Liu, M., Shi, J., Li, Z., Li, C., Zhu, J., and Liu, S.2017 “Towards Better Analysis of Deep Convolutional Neural Networks.” IEEE Transactions on Visualization and Computer Graphics(1): 91-100.
  16. Wu, X., Zhu, X., Wu, G.Q., and Ding, W.2014 “Data mining with bigdata.” IEEE Transactions on Knowledge and Data Engineering26(1): 97-107.
  17. Schmidhuber, J.2015” Deep Learning in Neural Networks: An Overview.” Neural Networks61:85-117.
  18. Ngiam, J.,Khosla, A., Kim, M., Nam, J., Lee, H., and Ng, A.Y. 2011 “Multimodal Deep Learning.” in Proceedings of the 28th International Conference on Machine Learning: 689-696.

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Siva Raja P M, Sumithra R P, Thanusha G, " Dual Security based on Crypto Steganography Using Two Level Learning In Assist with Dual Offbeat Shielding Design, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 3, pp.541-548, May-June-2021. Available at doi : https://doi.org/10.32628/CSEIT12173125