Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published November 19, 2020 | Version v1
Journal article Open

Dual method cryptography image by two force secure and steganography secret message in IoT

  • 1. Department of Computer Science, University of Technology, Iraq
  • 2. College of Engineering Department of Biomedical Engineering, University of Kerbala, Iraq
  • 3. College of Information Technology, Department of Software, University of Babylon, Iraq

Description

With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted data via networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed for the Internet of things storage in the database in IoT (data flow), when the user needs any information can be access in via of internet of things (IoTs). The outcome of the proposed system is obtained to be evaluated through different measures, such as peak signal noise ratio (PSNR), mean square error (MSE), entropy, correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.

Files

15 15847.pdf

Files (2.0 MB)

Name Size Download all
md5:7af2a300fb6b384a87b011476e0eb3c2
2.0 MB Preview Download