Hybrid Cryptography and Steganography Method to Provide Safe Data Transmission in IoT

  • Conference paper
  • First Online:
Proceedings of Data Analytics and Management (ICDAM 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 787))

Included in the following conference series:

Abstract

IoT, the upcoming phase of the information innovation, refers to the condition in which millions and millions of people and appliances are associated to improve the interchange of enormous volumes of data from various regions, necessitating the resultant requirement for intelligent data aggregation. But along with the many advantages and uses it offers, the Internet of Things also introduces a fresh difficulty element in the form of several intrinsic inconveniences, particularly security issues during data transmission phases, which mainly affect data confidentiality and integrity aspects. A combined technique of insubstantial cryptography and steganography (LSB Replacement) approach is employed for data communication between IoT tool and home server and following integrated technique of cryptography and steganography (suggested MSB–LSB Replacement approach) for data transmission stages between home server and IoT device in this paper’s security scheme, which addresses both the aforementioned issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Khan LS, Khan M, Hazzazi MM et al (2023) A novel combination of information confidentiality and data hiding mechanism. Multimed Tools Appl 82:6917–6941. https://doi.org/10.1007/s11042-022-13623-3

    Article  Google Scholar 

  2. Hhan M, Morimae T, Yamakawa T (2023) From the hardness of detecting superpositions to cryptography: quantum public key encryption and commitments. In: Hazay C, Stam M (eds) Advances in Cryptology—EUROCRYPT 2023. EUROCRYPT 2023. Lecture Notes in Computer Science, vol 14004. Springer, Cham. https://doi.org/10.1007/978-3-031-30545-0_22

  3. Pramanik S (2023) An adaptive image steganography approach depending on integer wavelet transform and genetic algorithm. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-14505-y

    Article  Google Scholar 

  4. Gupta A, Verma A, Pramanik S (2022) Security aspects in advanced image processing techniques for COVID-19. In: Pramanik S, Sharma A, Bhatia S, Le DN (eds) An interdisciplinary approach to modern network security. CRC Press, Boca Raton

    Google Scholar 

  5. Kaushik D, Garg M, Annu, Gupta A, Pramanik S (2022) Application of machine learning and deep learning in cyber security: an innovative approach. In: Ghonge M, Pramanik S, Mangrulkar R, Le DN (eds) Cybersecurity and digital forensics: challenges and future trends. Wiley, New York. https://doi.org/10.1002/9781119795667.ch12

  6. Bandyopadhyay S, Goyal V, Dutta S, Pramanik S, Sherazi HHR (2021) Unseen to seen by digital steganography. In: Pramanik S, Ghonge MM, Ravi R, Cengiz K (eds) Multidisciplinary approach to modern digital steganography. IGI Global, Hershkey, pp 1–28. https://doi.org/10.4018/978-1-7998-7160-6.ch001

  7. Kumar S, Banka H, Kaushik B (2023) Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing. Wireless Netw. https://doi.org/10.1007/s11276-023-03234-7

    Article  Google Scholar 

  8. Pandey BK, Pandey D, Nassa VK, George AS, Pramanik S, Dadheech P (2023) Applications for the text extraction method of complex degraded images, in the impact of thrust technologies on image processing. Nova Publishers, New York

    Google Scholar 

  9. Sinha M, Chacko E, Makhija P, Pramanik S (2021) Energy efficient smart cities with green IoT. In: Chakrabarty C (ed) Green technological innovation for sustainable smart societies: post pandemic era. Springer, Berlin. https://doi.org/10.1007/978-3-030-73295-0_16

  10. Wang N, Yu H, Guo Z, Lei H (2022) Firmware security verification method of distance learning terminal based on MD5 algorithm. In: Fu W, Sun G (eds) e-Learning, e-Education, and Online Training. eLEOT 2022. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, vol 454. Springer, Cham. https://doi.org/10.1007/978-3-031-21164-5_34

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sabyasachi Pramanik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ray, A.M., Pramanik, S., Das, B., Khanna, A. (2023). Hybrid Cryptography and Steganography Method to Provide Safe Data Transmission in IoT. In: Swaroop, A., Polkowski, Z., Correia, S.D., Virdee, B. (eds) Proceedings of Data Analytics and Management. ICDAM 2023. Lecture Notes in Networks and Systems, vol 787. Springer, Singapore. https://doi.org/10.1007/978-981-99-6550-2_39

Download citation

Publish with us

Policies and ethics

Navigation