Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.3.58Keywords:
IoT (Internet of things), Encryption and decryption, Malicious fraudsters closed-form expression, Embedded data.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
An internet of things (IoT) is an intelligent environment such as homes and smart cities of our country, and IoT improves the new technology implementation for home automation. The problem with security in IoT-based devices is that data transmission and signal passing are easily hacked using encryption and decryption methods. The old technology of the Steganography method does not improve the data hidden in images because encryption and decryption use a 1-bit 0.05-bit store, and low ranges hide the information in images, so that information hides out of the size and bits of the image. The hackers easily hack the hide information pixel by pixel or bit by bit in images. So, need for a proposed system, new technology, or methods. The suggested solution improves data concealment in photos by combining CNN’s deep learning techniques with steganography. The secret information these photographs convey can be shared without drawing hackers’ notice. The data is encrypted before being embedded in the image to increase its security. Steganography messages are frequently encrypted using more conventional methods first, after which the encrypted message is added to the cover image in some manner. The previous algorithm of SFNET algorithm architecture has been divided by segment, the segment based on width, height, and depth changes based improve performances. Existing systems of SFNET and SRNET are compared to the fractal net algorithm to improve the performance of 3 to 1 % of the proposed system.Abstract
How to Cite
Downloads
Similar Articles
- Ahmed Mustefa, Validating the dairy marketing performance of Mizan-Aman town, Bench-Sheko zone, Ethiopia , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Sadanand Maurya, Manikant Tripathi, Karunesh K. Tiwari, Awadhesh K. Shukla, Isolation and molecular characterization of microbial isolates from Saryu river water , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Bayelign A. Zelalem, Ayalew A. Abebe, Evaluating supply chain management practice among micro and small manufacturing enterprise in southwest, Ethiopia , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Ravi Kumar P, C. Gowri Shankar, Optimizing power converters for enhanced electric vehicle propulsion: A novel research methodology , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Santima Uchukanokkul, Bijal Zaveri, Global student mobility from Southeast Asia and South Asia: Trends, challenges, and policy interventions , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- I. Francina Nishandhi, A Study on an Optimal Four Echelon Inventory Model for Growing Items with Imperfect Quality and Trade Credit Financing , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Maya Kumari, Vikas Y Patade, Z Ahmad, INVOLVEMENT OF PLANT MICRORNAS IN ABIOTIC STRESS RESPONSES , The Scientific Temper: Vol. 1 No. 01 (2010): The Scientific Temper
- Archana Bansal, Management of Crop-Residue to Control Environmental Hazards , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- S Prabhakaran, Yugeshkrishnan M, Santhiya M, Danush Kumar S M, Smart Dustbin using IOT , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Bhuvaneshwarri Ilango, A machine translation model for abstractive text summarization based on natural language processing , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 23 24 25 26 27 28 29 30 31 32 > >>
You may also start an advanced similarity search for this article.

