Abstract

The substantial rise of information technology has facilitated the methods of access to digital information and internet of things (IOT). Digital image processing handles the digital material to store and distribute more effectively with decreased time and space complexity. However, these tactics undermine the privacy of digital materials. A recent study focuses on shielding digital materials from illicit use and distribution by making reversible data strategies to tackle the risk of privacy breaches for digital content. In this study, a composite reversible data hiding (CRDH) approach is suggested. CRDH employed the integer wavelet transform (HAAR transform) with the HH band’s eigenvalue decomposition. The suggested CRDH first performed the IWT transformation on the cover image (CI) and parsed it into four consecutive frequency subbands, namely, LL, HL, LH, and HH. Sensitive data of the proposed approach are incorporated by merging the HH band of the cover image’s individual values with the encrypted eigenvalues of the confidential data. The choosing of casing art is such a method that values are within a range. The confidential data picture and HH band’s frequency band are roughly the same; thus, modifying the individual values will not affect the quality of the confidential data image and the HH band’s content. The suggested strategy’s primary purpose is to design a data concealing technique that hinders the verification of digital information by maintaining a high rate of peak signal-to-noise ratio (PSNR). The PSNR of the existing technology is less than 50 per cent of the total accessible data set. The PSNR value shows the picture’s visual quality, where the PSNR increases the better image quality. Therefore, concealing data is essential for the technique that inhibits authentication and keeps a high rate of PSNR. The suggested approach fulfils this aim, gets a PSNR rate of above 50 per cent, and hits 59 per cent for line.

Highlights

  • The internet of things (IoT) is aimed at connecting every device to the Internet so that these devices can be accessed anytime, anywhere, and from any path

  • Considering that the number of devices connected to the Internet will be over 29 billion in 2023 and IoT devices will manage the internet traffic (Cisco, 2020), needs such as addressing a large number of devices and supporting the traffic generated by the existing infrastructure arise

  • This paper presents a composite reversible data hiding (CRDH) scheme that employs integer wavelet transform (HAAR transformation) with eigen decomposition over both cover and confidential data images [10]

Read more

Summary

Introduction

The internet of things (IoT) is aimed at connecting every device to the Internet so that these devices can be accessed anytime, anywhere, and from any path (i.e., any network). Considering that the number of devices connected to the Internet will be over 29 billion in 2023 and IoT devices will manage the internet traffic (Cisco, 2020), needs such as addressing a large number of devices and supporting the traffic generated by the existing infrastructure arise In this context, the adaptation layer and IPv6/6LoWPAN protocol stack enable wireless sensor devices to connect to external IP networks using IPv6 addresses. It provides point-to-point connection between the source host and destination host for delivering services efficiently In this context, the most striking solution proposal in recent years as an alternative to end-to-end communication is information-centered network architecture (ICN (information-centric networks). This architecture proposes a network model that focuses on content/data instead of address-based communication between destination and source nodes Methods such as naming, routing, caching, and securing ICN provide advantages for IoT applications.

Internet of Things
Communication Features
Data Security in IOT
Reversible Data Hiding
Result
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call