Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.3.58Keywords:
IoT (Internet of things), Encryption and decryption, Malicious fraudsters closed-form expression, Embedded data.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
An internet of things (IoT) is an intelligent environment such as homes and smart cities of our country, and IoT improves the new technology implementation for home automation. The problem with security in IoT-based devices is that data transmission and signal passing are easily hacked using encryption and decryption methods. The old technology of the Steganography method does not improve the data hidden in images because encryption and decryption use a 1-bit 0.05-bit store, and low ranges hide the information in images, so that information hides out of the size and bits of the image. The hackers easily hack the hide information pixel by pixel or bit by bit in images. So, need for a proposed system, new technology, or methods. The suggested solution improves data concealment in photos by combining CNN’s deep learning techniques with steganography. The secret information these photographs convey can be shared without drawing hackers’ notice. The data is encrypted before being embedded in the image to increase its security. Steganography messages are frequently encrypted using more conventional methods first, after which the encrypted message is added to the cover image in some manner. The previous algorithm of SFNET algorithm architecture has been divided by segment, the segment based on width, height, and depth changes based improve performances. Existing systems of SFNET and SRNET are compared to the fractal net algorithm to improve the performance of 3 to 1 % of the proposed system.Abstract
How to Cite
Downloads
Similar Articles
- Farheen Najma B, Faseeha Begum, Resistance to digital banking by senior citizens in India - A review , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Roshni Kanth, R Guru, Anusuya M A, Madhu B K, A comprehensive study of AI in test case generation: Analysing industry trends and developing a predictive model , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- Sanskriti Gandhi, Usha Asnani, Srivalli Natarajan, Chinmay Rao, Richa Agrawal, Evaluation of stability of fixation using conventional miniplate osteosynthesis in comminuted and non-comminuted Le Fort I, II, III fractures – A dynamic finite element analysis , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Rekha Raghavendra, Shobha Gowda, Jissy Thomas, Fingerprint doorlock system using Arduino uno , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- Mahima Srivastava, Chemical facets of environment-friendly corrosion impediment of low-carbon steel in aqueous solutions of inorganic mineral acid , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Anjum Parvez, Seema Yadav, Sandhya Verma, Electronic Record as Evidence in the Courts: An Analysis , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- UMA SHANKAR SHUKLA, AN INFLATED PROBABILITY MODEL FOR INFECTION , The Scientific Temper: Vol. 10 No. 1&2 (2019): The Scientific Temper
- Sirajum Munira Priety, Farhan Bin Manjur, AI Driven Approach in Smart Manufacturing in Bangladesh , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Jerinrechal, I. Antonitte Vinoline, A vendor-constrained economic production quantity model integrating scrap recovery under sustainability , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
<< < 10 11 12 13 14 15 16 17 18 19 > >>
You may also start an advanced similarity search for this article.

