98
Views
0
CrossRef citations to date
0
Altmetric
Articles

A Novel Steganographic Approach for Secured Communication via Boustrophedon Transformation to Develop IoT-based Smart City

ORCID Icon, &

References

  • M. Y. Valandar, P. Ayubi, and M. J. Barani, “A new transform domain steganography based on modified logistic chaotic map for color images,” J. Inf. Security Appl., Vol. 34, no. Part 2, pp. 142–51, 2017.
  • A. Saleema, and T. Amarunnishad, “A New steganography algorithm using hybrid fuzzy neural networks,” Proc Technol, Vol. 24, pp. 1566–74, 2016. doi:10.1016/j.protcy.2016.05.139
  • S. Edward Jero, P. Ramu, and S. Ramakrishnan, “ECG steganography using curvelet transform”, Biomed. Signal Process Control, Vol. 22, pp. 161–9, 2015. doi:10.1016/j.bspc.2015.07.004
  • S. Uma Maheswari, and D. Jude Hemanth, ““Frequency domain QR code-based image steganography using Fresnelet transform,” AEU – Int. J. Electron. Commun., Vol. 69, no. 2, pp. 539–44, 2015. doi:10.1016/j.aeue.2014.11.004
  • S. A. El_Rahman, “A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information,” Comput. Electr. Eng., Vol. 70, pp. 380–99, 2018. doi:10.1016/j.compeleceng.2016.09.001
  • A. A. Abd EL-Latif, B. Abd-El-Atty, and S. E. Venegas-Andraca, “A novel image steganography technique based on quantum substitution boxes,” Optics & Laser Technology, Vol. 116, pp. 92–102, 2019. doi:10.1016/j.optlastec.2019.03.005
  • D. Bhattacharyya, and T. Kim, “Image data hiding technique using discrete Fourier transformation,” in Ubiquitous computing and multimedia applications. UCMA 2011. communications in computer and information science, Vol 151, T. Kim, H. Adeli, R.J. Robles, and M Balitanas, Eds. Berlin, Heidelberg: Springer, 2011, p. 151.
  • A. Khamrui, and J. K. Mandal, “A genetic algorithm based steganography using discrete cosine transformation (GASDCT),” Proc. Technol., Vol. 10, pp. 105–111, 2013. doi:10.1016/j.protcy.2013.12.342
  • T. Bikku, and R. Paturi, “Frequency domain steganography with reversible texture combination,” Traitement du Signal, Vol. 36, no. 1, pp. 109–117, 2019. doi:10.18280/ts.360114
  • P. Pan, Z. Wu, C. Yang, and B. Zhao, “Double-Matrix, decomposition image steganography scheme based on wavelet transform with multi-region coverage,” Entropy, Vol. 24, p. 246, 2022. doi:10.3390/e24020246.
  • S. S. Tevaramani, and J. Ravi, “Image steganography performance analysis using discrete wavelet transform and alpha blending for secure communication,” Global Trans Proc, Vol. 3, no. 2022, pp. 208–14, 2022. doi:10.1016/j.gltp.2022.03.024
  • J. Millar, N. J. A. Sloane, and N. E. Young, “A new operation on sequences: The boustrophedon transform,” J. Comb. Theory A, Vol. 76, no. 1, pp. 44–54, 1996. doi:10.1006/jcta.1996.0087
  • A. Bairagi, R. Khondoker, and R. Islam, “An efficient steganographic approach for protecting communication in the internet of things (IoT) critical infrastructures,” Inf Security J: A Global Perspective, Vol. 25, pp. 1–16, 2016. Doi:10.1080/19393555.2016.1206640.
  • A. G. Weber. The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering. http://sipi.usc.edu/database/ (Last accessed on 20th January, 2022).
  • https://in.mathworks.com/help/vision/ref/psnr.html, downloaded, 05.03.2020.
  • R. Bhardwaj, and V. Sharma, “Image steganography based on complemented message and inverted Bit LSB substitution,” Procedia Comput. Sci., Vol. 93, pp. 832–8, 2016. Doi:10.1016/j.procs.2016.07.245.
  • MATLAB Answers, https://www.mathworks.com/matlabcentral/answers/512820-how-do-i-calcualte-image-fidelity-using-this-equation.
  • S. Ghosal, and J. Mandal, “Color image authentication based on two-dimensional separable discrete hartley transform (CIA2D-SDHT),” Adv. Modell. Anal. B, Vol. 57, pp. 68–87, 2014.
  • J. Yin, G. Fen, F. Mughal, and V. Iranmanesh, “Internet of things: securing data using image steganography,” 2015, 310–14. Doi:10.1109/AIMS.2015.56.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.