STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE
MR. NITIN B.NAIK
Vice-Principal, Sharad Institute of Technology ,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India
MRS. ARCHANA NITIN NAIK
HOD E&TC, Sharad Institute of Technology ,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India
1-6
Vol: 5, Issue: 2, 2015
Receiving Date:
2015-02-07
Acceptance Date:
2015-03-05
Publication Date:
2015-04-02
Download PDF
Abstract
Steganography is a science dealing with writing hidden messages/pictures in a particular way that only
the sender & the intended recipient are able to decipher so as to provide security in open environment
like internet. Steganography attempts to hide the very existence of the message and make communication
undetectable. Important domains, besides classic computing, where steganography can be applied are
domains using mobile and embedded devices. This paper focuses on the implementation of a
steganographic algorithm using wireless communication such as Zigbee. Furthermore, this article
presents experimental results obtained from testing a steganographic algorithm using Zigbee devices.
The main purpose of implementing such an algorithm using zigbee is to provide security on low and
medium cost devices.
Keywords:
Steganography ; communication ; experimental ; implementing
References
- Daniela Stanescu, Valentin Stangaciu, Ioana Ghergulescu, Mircea Stratulat “Steganography on embedded devices” 5th International Symposium on Applied Computational Intelligence and Informatics • Timişoara, Romania
- Neil F. Johnson, Sushil Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE COMPUTER, vol. 31, 1998, pp. 26--34
- József Lenti, “Steganographic methods”, Department of Control Engineering and Information Technology, Budapest University of Technology and Economics, H-1521, Budapest, Hungary, June 2000, pp. 249-258
- J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, “Electronic marking and identification techniques to discourage document copying,” Selected Areas in Communications, IEEE Journal on vol. 13, 1995, pp. 1495-1504.
- D. Gruhl, W. Bender, A. Lu, “Echo hiding”, in Information hiding: First International Workshop, Computer Science, Isaac Newton Institute, Cambridge, England, May 1996, pp. 295 – 315
- D. Stanescu, M. Stratulat, B. Ciubotaru, D. Chiciudean, R. Cioarga, and D. Borca, “Digital Watermarking using Karhunen- Loeve transform,” Applied Computational Intelligence and Informatics, 2007. SACI '07. 4th International Symposium on, 2007, pp. 187-190
- Stanescu, D.; Stratulat, M.; Groza, V.; Ghergulescu, I.; Borca, D.“Steganography in YUV color space”, Robotic and Sensors Environments, 2007. ROSE 2007. International Workshop on Volume , Issue , 12-13 Oct. 2007
- Taras Holotyak, Jessica Fridrich, Sviatoslav Voloshynovskiy, “Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics”, Communications and Multimedia
Back