Securing IoT Data Using Steganography: A Practical Implementation Approach
Adding network connectivity to any “thing” can certainly provide great value, but it also brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” system’s capabilities, the validity and accuracy of transmitted data should be ensured. Due to the constrained envi...
Saved in:
Main Author: | Fatiha Djebbar |
---|---|
Format: | article |
Language: | EN |
Published: |
MDPI AG
2021
|
Subjects: | |
Online Access: | https://doaj.org/article/7e7f437d48d64b2e9db47c65bb77c920 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A New Audio Steganography System Based on Auto-Key Generator
by: Inas Jawad Kadhim
Published: (2012) -
A New Audio Steganography System Based on Auto-Key Generator
by: Inas Jawad Kadhim
Published: (2012) -
MADS Based on DL Techniques on the Internet of Things (IoT): Survey
by: Hussah Talal, et al.
Published: (2021) -
Advanced Authentication Method by Geometric Data Analysis Based on User Behavior and Biometrics for IoT Device with Touchscreen
by: Jiwoo Lee, et al.
Published: (2021) -
Shape adaptive IRS based SAG IoT network
by: Fei Qi, et al.
Published: (2021)