Design and Development of Hybrid Algorithms to Improve Cyber Security and Provide Securing Data Using Image Steganography With Internet of Things

Author(s):  
Abhishek Rajeshkumar Mehta ◽  
Trupti Pravinsinh Rathod

Internet of things (IoT) is a typical thing (object) in this day and age, which fills in as a component of our standard life exercises. In spite of the fact that it benefits the private region in a few different ways, different difficulties, for example information classification and protection, are made. Web of things (IoT) is all over the place and utilized in a lot more advantageous functionality. It is utilized in our homes, clinics, fire counteraction, and announcing and controlling of ecological changes. Information security is an urgent prerequisite for IoT since the number of late advances in various spaces is expanding step by step. Different endeavors have been set to sate the client's expectations for greater security and protection.

Author(s):  
Hristo Terziev

Internet of Things is a new world for connecting object space in the real world with virtual space in a computer environment. To build IoT as an effective service platform, end users need to trust the system. With the growing quantity of information and communication technologies, the need to ensure information security and improve data security is increasing. One of the potential solutions for this are steganographic methods. Steganography based on the least significant bit (LSB) is a popular and widely used method in the spatial domain.


Heliyon ◽  
2021 ◽  
Vol 7 (3) ◽  
pp. e06522
Author(s):  
Kwesi Hughes-Lartey ◽  
Meng Li ◽  
Francis E. Botchey ◽  
Zhen Qin

Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


Sign in / Sign up

Export Citation Format

Share Document