Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.3.58Keywords:
IoT (Internet of things), Encryption and decryption, Malicious fraudsters closed-form expression, Embedded data.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
An internet of things (IoT) is an intelligent environment such as homes and smart cities of our country, and IoT improves the new technology implementation for home automation. The problem with security in IoT-based devices is that data transmission and signal passing are easily hacked using encryption and decryption methods. The old technology of the Steganography method does not improve the data hidden in images because encryption and decryption use a 1-bit 0.05-bit store, and low ranges hide the information in images, so that information hides out of the size and bits of the image. The hackers easily hack the hide information pixel by pixel or bit by bit in images. So, need for a proposed system, new technology, or methods. The suggested solution improves data concealment in photos by combining CNN’s deep learning techniques with steganography. The secret information these photographs convey can be shared without drawing hackers’ notice. The data is encrypted before being embedded in the image to increase its security. Steganography messages are frequently encrypted using more conventional methods first, after which the encrypted message is added to the cover image in some manner. The previous algorithm of SFNET algorithm architecture has been divided by segment, the segment based on width, height, and depth changes based improve performances. Existing systems of SFNET and SRNET are compared to the fractal net algorithm to improve the performance of 3 to 1 % of the proposed system.Abstract
How to Cite
Downloads
Similar Articles
- Neeraj ., Anita Singhrova, Quantum Key Distribution-based Techniques in IoT , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Chandrasekaran M, Rajesh P K, Optimization of cost to customer of power train in commercial vehicle using knapsack dynamic programming influenced by vehicle IoT data , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- M. Ragul, A. Aloysius, V. Arul Kumar, Enhancing IoT blockchain scalability through the eepos consensus algorithm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- V Babydeepa, K. Sindhu, A hybrid feature selection and generative adversarial network for lung and uterus cancer prediction with big data , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Madhuri Prashant Pant, Jayshri Appaso Patil, Unlocking the potential of big data and analytics significance, applications in diverse domains and implementation of Apache Hadoop map/reduce for citation histogram , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- Anita M, Shakila S, Stochastic kernelized discriminant extreme learning machine classifier for big data predictive analytics , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Lakshmi Priya, Anil Vasoya, C. Boopathi, Muthukumar Marappan, Evaluating dynamics, security, and performance metrics for smart manufacturing , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Vijay Sharma, Nishu, Anshu Malhotra, An encryption and decryption of phonetic alphabets using signed graphs , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

