Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.3.58Keywords:
IoT (Internet of things), Encryption and decryption, Malicious fraudsters closed-form expression, Embedded data.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
An internet of things (IoT) is an intelligent environment such as homes and smart cities of our country, and IoT improves the new technology implementation for home automation. The problem with security in IoT-based devices is that data transmission and signal passing are easily hacked using encryption and decryption methods. The old technology of the Steganography method does not improve the data hidden in images because encryption and decryption use a 1-bit 0.05-bit store, and low ranges hide the information in images, so that information hides out of the size and bits of the image. The hackers easily hack the hide information pixel by pixel or bit by bit in images. So, need for a proposed system, new technology, or methods. The suggested solution improves data concealment in photos by combining CNN’s deep learning techniques with steganography. The secret information these photographs convey can be shared without drawing hackers’ notice. The data is encrypted before being embedded in the image to increase its security. Steganography messages are frequently encrypted using more conventional methods first, after which the encrypted message is added to the cover image in some manner. The previous algorithm of SFNET algorithm architecture has been divided by segment, the segment based on width, height, and depth changes based improve performances. Existing systems of SFNET and SRNET are compared to the fractal net algorithm to improve the performance of 3 to 1 % of the proposed system.Abstract
How to Cite
Downloads
Similar Articles
- C. Mohan Raj, M. Sundaram , M. Anand, Automation of industrial machinerie , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Arunachalaprabu G, Fathima Bibi K, A pattern-driven Huffman encoding and positional encoding for DNA compression , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Bayelign Abebe Zelalem, Ayalew Ali Abebe, Dividend policy and banks’ performance: Assessing the relevance versus irrelevance theory , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- Priya Sharma, Jyoti Rana, Understanding Customer Awareness and effectiveness of Social Media Marketing in Banks , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- V. Mahalakshmi, M. Manimekalai, Location Specific Paddy Yield Prediction using Monte Carlo Simulation incorporated Long Short-Term Memory , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Ayesha Shakith, L. Arockiam, Enhancing classification accuracy on code-mixed and imbalanced data using an adaptive deep autoencoder and XGBoost , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Ayesha Shakith, L. Arockiam, EMSMOTE: Ensemble multiclass synthetic minority oversampling technique to improve accuracy of multilingual sentiment analysis on imbalance data , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Saloni M. Thacker, S. Z. Zubair Ahmed, Anaurene Roy, Influence of loneliness on self-esteem and mental wellbeing in non-domicle postgraduate students in Bangalore , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Merla Agnes Mary, Britto Ramesh Kumar, Hybrid GAN with KNN - SMOTE Approach for Class-Imbalance in Non-Invasive Fetal ECG Monitoring , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
<< < 11 12 13 14 15 16 17 18 19 20 > >>
You may also start an advanced similarity search for this article.

