Abstract
IoT, the upcoming phase of the information innovation, refers to the condition in which millions and millions of people and appliances are associated to improve the interchange of enormous volumes of data from various regions, necessitating the resultant requirement for intelligent data aggregation. But along with the many advantages and uses it offers, the Internet of Things also introduces a fresh difficulty element in the form of several intrinsic inconveniences, particularly security issues during data transmission phases, which mainly affect data confidentiality and integrity aspects. A combined technique of insubstantial cryptography and steganography (LSB Replacement) approach is employed for data communication between IoT tool and home server and following integrated technique of cryptography and steganography (suggested MSB–LSB Replacement approach) for data transmission stages between home server and IoT device in this paper’s security scheme, which addresses both the aforementioned issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Khan LS, Khan M, Hazzazi MM et al (2023) A novel combination of information confidentiality and data hiding mechanism. Multimed Tools Appl 82:6917–6941. https://doi.org/10.1007/s11042-022-13623-3
Hhan M, Morimae T, Yamakawa T (2023) From the hardness of detecting superpositions to cryptography: quantum public key encryption and commitments. In: Hazay C, Stam M (eds) Advances in Cryptology—EUROCRYPT 2023. EUROCRYPT 2023. Lecture Notes in Computer Science, vol 14004. Springer, Cham. https://doi.org/10.1007/978-3-031-30545-0_22
Pramanik S (2023) An adaptive image steganography approach depending on integer wavelet transform and genetic algorithm. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-14505-y
Gupta A, Verma A, Pramanik S (2022) Security aspects in advanced image processing techniques for COVID-19. In: Pramanik S, Sharma A, Bhatia S, Le DN (eds) An interdisciplinary approach to modern network security. CRC Press, Boca Raton
Kaushik D, Garg M, Annu, Gupta A, Pramanik S (2022) Application of machine learning and deep learning in cyber security: an innovative approach. In: Ghonge M, Pramanik S, Mangrulkar R, Le DN (eds) Cybersecurity and digital forensics: challenges and future trends. Wiley, New York. https://doi.org/10.1002/9781119795667.ch12
Bandyopadhyay S, Goyal V, Dutta S, Pramanik S, Sherazi HHR (2021) Unseen to seen by digital steganography. In: Pramanik S, Ghonge MM, Ravi R, Cengiz K (eds) Multidisciplinary approach to modern digital steganography. IGI Global, Hershkey, pp 1–28. https://doi.org/10.4018/978-1-7998-7160-6.ch001
Kumar S, Banka H, Kaushik B (2023) Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing. Wireless Netw. https://doi.org/10.1007/s11276-023-03234-7
Pandey BK, Pandey D, Nassa VK, George AS, Pramanik S, Dadheech P (2023) Applications for the text extraction method of complex degraded images, in the impact of thrust technologies on image processing. Nova Publishers, New York
Sinha M, Chacko E, Makhija P, Pramanik S (2021) Energy efficient smart cities with green IoT. In: Chakrabarty C (ed) Green technological innovation for sustainable smart societies: post pandemic era. Springer, Berlin. https://doi.org/10.1007/978-3-030-73295-0_16
Wang N, Yu H, Guo Z, Lei H (2022) Firmware security verification method of distance learning terminal based on MD5 algorithm. In: Fu W, Sun G (eds) e-Learning, e-Education, and Online Training. eLEOT 2022. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, vol 454. Springer, Cham. https://doi.org/10.1007/978-3-031-21164-5_34
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ray, A.M., Pramanik, S., Das, B., Khanna, A. (2023). Hybrid Cryptography and Steganography Method to Provide Safe Data Transmission in IoT. In: Swaroop, A., Polkowski, Z., Correia, S.D., Virdee, B. (eds) Proceedings of Data Analytics and Management. ICDAM 2023. Lecture Notes in Networks and Systems, vol 787. Springer, Singapore. https://doi.org/10.1007/978-981-99-6550-2_39
Download citation
DOI: https://doi.org/10.1007/978-981-99-6550-2_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-6549-6
Online ISBN: 978-981-99-6550-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)