Steganography Techniques for Data Protection in IOT
Keywords:
Internet of Things, Steganography, Cryptography, Authentication, Encryption, Encryption & Authentication.Abstract
Internet of Things (IoT) is a domain wherein which the relocate of data is taking place every single second. The protection of these data is an exigent task; however, security challenges can be mitigated with cryptography and steganography techniques. These techniques are decisive when commerce with user verification and data isolation. Here the planned exertion, the elliptic Galois cryptography protocol plays an important role. In this protocol, a cryptography procedure is worn to encrypt confidential data that came from dissimilar medical sources. Next, a Matrix XOR encoding steganography system is use to embed the encrypted data into a low density representation. The proposed work also uses an optimization algorithm called Adaptive Firefly to optimize the assortment of envelop blocks within the image. Based on the results, various parameters are evaluated and compared with the obtainable techniques. Finally, the data that is secreted in the figure is recovered and is then decrypted.