An SVM based secural image steganography algorithm for IoT

Weifeng Sun, Minghan Jia, Shumiao Yu, Boxiang Dong, Xinyi Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

With the fast development of IoT network, there are more and more images generated by sensors and other devices, which increases the transmission expenses. By adopting image steganography, the images can deliver more information than they could. Therefore, the transmission expenses could be significantly reduced. However, the safety and quality of steganographic algorithms is not promising nowadays. To improve this situation, we propose an SVM-based steganography algorithm. The algorithm takes advantage of four features, including the variance of the image, the overall difference, the shape context matching and the smoothness. The analysis and experimental results show that the information hiding algorithm can effectively optimize the information steganography and anti-steganography analysis, which could be used in IoT.

Original languageEnglish
Title of host publicationCyberspace Safety and Security - 11th International Symposium, CSS 2019, Proceedings
EditorsJaideep Vaidya, Xiao Zhang, Jin Li
PublisherSpringer
Pages357-371
Number of pages15
ISBN (Print)9783030373511
DOIs
StatePublished - 2019
Event11th International Symposium on Cyberspace Safety and Security, CSS 2019 - Guangzhou, China
Duration: 1 Dec 20193 Dec 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11983 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Symposium on Cyberspace Safety and Security, CSS 2019
Country/TerritoryChina
CityGuangzhou
Period1/12/193/12/19

Keywords

  • Anti-steganography analysis
  • Image steganography
  • IoT
  • LSB embedding

Fingerprint

Dive into the research topics of 'An SVM based secural image steganography algorithm for IoT'. Together they form a unique fingerprint.

Cite this