Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.3.58Keywords:
IoT (Internet of things), Encryption and decryption, Malicious fraudsters closed-form expression, Embedded data.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
An internet of things (IoT) is an intelligent environment such as homes and smart cities of our country, and IoT improves the new technology implementation for home automation. The problem with security in IoT-based devices is that data transmission and signal passing are easily hacked using encryption and decryption methods. The old technology of the Steganography method does not improve the data hidden in images because encryption and decryption use a 1-bit 0.05-bit store, and low ranges hide the information in images, so that information hides out of the size and bits of the image. The hackers easily hack the hide information pixel by pixel or bit by bit in images. So, need for a proposed system, new technology, or methods. The suggested solution improves data concealment in photos by combining CNN’s deep learning techniques with steganography. The secret information these photographs convey can be shared without drawing hackers’ notice. The data is encrypted before being embedded in the image to increase its security. Steganography messages are frequently encrypted using more conventional methods first, after which the encrypted message is added to the cover image in some manner. The previous algorithm of SFNET algorithm architecture has been divided by segment, the segment based on width, height, and depth changes based improve performances. Existing systems of SFNET and SRNET are compared to the fractal net algorithm to improve the performance of 3 to 1 % of the proposed system.Abstract
How to Cite
Downloads
Similar Articles
- Dattatraya Pandurang Rane, Amey Adinath Choudhari, Rita Kakade, Technology-driven financial inclusion: Opportunities for corporate expansion in emerging markets , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Manisha Anil Vhora, Vidya Bhandwalkar, Prashant Mangesh Rege, AI-driven HR analytics: Enhancing decision-making in workforce planning , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Venkatesh R, A study on women empowerment by enhancing saving capabilities – through self-help groups , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Ramalakshmi V, Prioritizing the factors affecting employee relations and its influence on job performance , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Shemal Dave, Dhaval Vyas, Jyotindra Jani, Capital adequacy and systemic risk: Evidence from selected Indian private sector banks , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- A. Appu, How does brand equity influence the intent of e-bike users? Evidence from Chennai city , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Akshay J., G. Mahesh Kumar, B. H. Manjunath, Optimizing durability of the thin white topping applying Taguchi method using desirability function , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Chirag Darji, Rajesh Chauhan, Views of undergraduates on Vikshit Bharat@2047 , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Vibhu Tripathi, India’s transformative journey: A decade and a half of growth, innovation, and inclusive progress , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sivasankar G. A, Study of hybrid fuel injectors for aircraft engines , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 32 33 34 35 36 37 38 39 40 41 > >>
You may also start an advanced similarity search for this article.

