Details

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

MR. NITIN B.NAIK

Vice-Principal, Sharad Institute of Technology ,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India

MRS. ARCHANA NITIN NAIK

HOD E&TC, Sharad Institute of Technology ,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India

1-6

Vol: 5, Issue: 2, 2015

Receiving Date: 2015-02-07 Acceptance Date:

2015-03-05

Publication Date:

2015-04-02

Download PDF

Abstract

Steganography is a science dealing with writing hidden messages/pictures in a particular way that only the sender & the intended recipient are able to decipher so as to provide security in open environment like internet. Steganography attempts to hide the very existence of the message and make communication undetectable. Important domains, besides classic computing, where steganography can be applied are domains using mobile and embedded devices. This paper focuses on the implementation of a steganographic algorithm using wireless communication such as Zigbee. Furthermore, this article presents experimental results obtained from testing a steganographic algorithm using Zigbee devices. The main purpose of implementing such an algorithm using zigbee is to provide security on low and medium cost devices.

Keywords: Steganography ; communication ; experimental ; implementing

References

  1. Daniela Stanescu, Valentin Stangaciu, Ioana Ghergulescu, Mircea Stratulat “Steganography on embedded devices” 5th International Symposium on Applied Computational Intelligence and Informatics • Timişoara, Romania
  2. Neil F. Johnson, Sushil Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE COMPUTER, vol. 31, 1998, pp. 26--34
  3. József Lenti, “Steganographic methods”, Department of Control Engineering and Information Technology, Budapest University of Technology and Economics, H-1521, Budapest, Hungary, June 2000, pp. 249-258
  4. J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, “Electronic marking and identification techniques to discourage document copying,” Selected Areas in Communications, IEEE Journal on vol. 13, 1995, pp. 1495-1504.
  5. D. Gruhl, W. Bender, A. Lu, “Echo hiding”, in Information hiding: First International Workshop, Computer Science, Isaac Newton Institute, Cambridge, England, May 1996, pp. 295 – 315
  6. D. Stanescu, M. Stratulat, B. Ciubotaru, D. Chiciudean, R. Cioarga, and D. Borca, “Digital Watermarking using Karhunen- Loeve transform,” Applied Computational Intelligence and Informatics, 2007. SACI '07. 4th International Symposium on, 2007, pp. 187-190
  7. Stanescu, D.; Stratulat, M.; Groza, V.; Ghergulescu, I.; Borca, D.“Steganography in YUV color space”, Robotic and Sensors Environments, 2007. ROSE 2007. International Workshop on Volume , Issue , 12-13 Oct. 2007
  8. Taras Holotyak, Jessica Fridrich, Sviatoslav Voloshynovskiy, “Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics”, Communications and Multimedia
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.