A review of methods of embedding information in digital objects for security in the internet of things
Transmission, processing and storage of information in the infrastructure of the Internet of Things are related to the necessity for solving a number of problems in information security. The main difficulty lies in the fact that the infrastructure of the Internet of Things is not homogeneous and con...
Saved in:
Published in: | Kompʹûternaâ optika Vol. 43; no. 1; pp. 137 - 154 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
Samara National Research University
01-02-2019
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Transmission, processing and storage of information in the infrastructure of the Internet of Things are related to the necessity for solving a number of problems in information security. The main difficulty lies in the fact that the infrastructure of the Internet of Things is not homogeneous and contains many different devices, including those with limited computing resources. One of the approaches to solving these problems is to embed additional information into the transmitted and stored digital objects. In this paper we present a review of methods of embedding information in digital data to provide security in the Internet of Things, including methods of steganographic embedding of information and methods for embedding digital watermarks. We reviewed methods of embedding information into digital images, as well as wireless sensor network data, proposed for use in the Internet of Things. In this paper we defined the advantages and disadvantages of individual methods and groups of methods, also we analyzed their applicability for data protection in the Internet of Things. Relevant trends in this field of research have been identified. |
---|---|
AbstractList | Transmission, processing and storage of information in the infrastructure of the Internet of Things are related to the necessity for solving a number of problems in information security. The main difficulty lies in the fact that the infrastructure of the Internet of Things is not homogeneous and contains many different devices, including those with limited computing resources. One of the approaches to solving these problems is to embed additional information into the transmitted and stored digital objects. In this paper we present a review of methods of embedding information in digital data to provide security in the Internet of Things, including methods of steganographic embedding of information and methods for embedding digital watermarks. We reviewed methods of embedding information into digital images, as well as wireless sensor network data, proposed for use in the Internet of Things. In this paper we defined the advantages and disadvantages of individual methods and groups of methods, also we analyzed their applicability for data protection in the Internet of Things. Relevant trends in this field of research have been identified. |
Author | Meshcheryakov, R.V. Kokurina, A.S. Evsutin, O.O. |
Author_xml | – sequence: 1 givenname: O.O. surname: Evsutin fullname: Evsutin, O.O. – sequence: 2 givenname: A.S. surname: Kokurina fullname: Kokurina, A.S. – sequence: 3 givenname: R.V. surname: Meshcheryakov fullname: Meshcheryakov, R.V. |
BookMark | eNo9kUtLAzEUhYMoWGv_wyzcRvOayQTclOILCm50HTLJTZvSTiSJiv_eTCuuzuUc7nfhnit0PsYRELqh5Jb2rJd3TFCGOyoVZoQqLDimmHKJaSvO0Ow_PUczQrnATLTsEi1y3hFC6n5HBZ0hv2wSfAX4bqJvDlC20eVphMMAzoVx04TRx3QwJcSxzo0Lm1DMvonDDmzJTQ2bDPYzhfIz5WULVQqkEcoEKtsKydfowpt9hsWfztH748Pb6hmvX59eVss1tpzKgpmSzCnBvWp7rhTpzKBg4INQIB04rjwD6mzfEtMKkB0MzDBLpVfKEtO3fI5eTlwXzU5_pHAw6UdHE_TRiGmjTSrB7kEPgjlhesG5Z4L5etIS6BSDQXrXVnuO7k8sm2LOCfw_jxJ9rEBPT9bTk_VUgRZcU10r0LUC_gudtXzN |
CitedBy_id | crossref_primary_10_4018_IJSST_309403 crossref_primary_10_1088_1742_6596_1368_5_052019 crossref_primary_10_1088_1742_6596_1745_1_012032 crossref_primary_10_24158_pep_2020_10_7 crossref_primary_10_1088_1742_6596_1745_1_012028 crossref_primary_10_15622_ia_2020_19_5_7 crossref_primary_10_18287_2412_6179_CO_1000 crossref_primary_10_21869_2223_1560_2020_24_2_136_152 crossref_primary_10_20914_2310_1202_2020_4_371_376 |
ContentType | Journal Article |
CorporateAuthor | Tomsk State University of Control Systems and Radioelectronics V.A. Trapeznikov Institute of Control Sciences of the Russian Academy of Sciences |
CorporateAuthor_xml | – name: Tomsk State University of Control Systems and Radioelectronics – name: V.A. Trapeznikov Institute of Control Sciences of the Russian Academy of Sciences |
DBID | AAYXX CITATION DOA |
DOI | 10.18287/2412-6179-2019-43-1-137-154 |
DatabaseName | CrossRef Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: http://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences |
EISSN | 2412-6179 |
EndPage | 154 |
ExternalDocumentID | oai_doaj_org_article_b42d4a8433f242ff95c0e692eb7fd543 10_18287_2412_6179_2019_43_1_137_154 |
GroupedDBID | 642 AAYXX ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION GROUPED_DOAJ |
ID | FETCH-LOGICAL-c317t-2972d943f95839906ab9eb3b49e7ded39f2e1dc850a54e76eb2a2c17f99c0a853 |
IEDL.DBID | DOA |
ISSN | 0134-2452 |
IngestDate | Tue Oct 22 15:15:57 EDT 2024 Thu Nov 21 21:36:28 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c317t-2972d943f95839906ab9eb3b49e7ded39f2e1dc850a54e76eb2a2c17f99c0a853 |
OpenAccessLink | https://doaj.org/article/b42d4a8433f242ff95c0e692eb7fd543 |
PageCount | 18 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_b42d4a8433f242ff95c0e692eb7fd543 crossref_primary_10_18287_2412_6179_2019_43_1_137_154 |
PublicationCentury | 2000 |
PublicationDate | 2019-02-01 |
PublicationDateYYYYMMDD | 2019-02-01 |
PublicationDate_xml | – month: 02 year: 2019 text: 2019-02-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | Kompʹûternaâ optika |
PublicationYear | 2019 |
Publisher | Samara National Research University |
Publisher_xml | – name: Samara National Research University |
SSID | ssj0002876141 |
Score | 2.1836176 |
Snippet | Transmission, processing and storage of information in the infrastructure of the Internet of Things are related to the necessity for solving a number of... |
SourceID | doaj crossref |
SourceType | Open Website Aggregation Database |
StartPage | 137 |
SubjectTerms | digital images digital watermark information embedding information security Internet of Things steganography |
Title | A review of methods of embedding information in digital objects for security in the internet of things |
URI | https://doaj.org/article/b42d4a8433f242ff95c0e692eb7fd543 |
Volume | 43 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV25TsQwELWAAtFwI265oLWIj9hxuRyrrWgAic7yFbRI7CIS_p8ZJyCoaOisWLGiN07ejGO_R8hF9o0HVtZMB56gQFENC6bKLPiqiQECLoscw-ze3D01N7cok_Nt9YV7wgZ54AG4y6BEUr5RUrbAJm1r61hlbUUOpk21GnQ-K_2jmHopS0ZQnqvBjFAqhr8X18kFfiFQ4P0SaEvg4TgLk4RbhiqdjEvDeK1-8dMPGf_CN9NtsjkminQyPOAOWcmLXbI1Jo10fCW7PdJO6HD8hC5bOvhBd9jMryEnJCY6aqNiBKBN0_wZjULoMuASTEehk3ajix32Q0ZI52WdMPc4UF-cPffJ4_T24XrGRvMEFiEl6JmwRiSrJAAGOZCttA8WCuegbDYpJ2lbkXmKTV35WmWjocL2InLTWhsrDyR-QNYWy0U-JFTxAJ0mcKFrFbTwPJpKyRJ-GXM8IvUXZO5t0MhwWFsg1A6hdgi1Q6idko47gNoB1EfkCvH9vgeVrssFiL8b4-_-iv_xfwxyQjbKRCi7sU_JWv_-kc_Iapc-zsu8-gQTYMz3 |
link.rule.ids | 315,782,786,866,2106,27933,27934 |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+review+of+methods+of+embedding+information+in+digital+objects+for+security+in+the+internet+of+things&rft.jtitle=Komp%CA%B9%C3%BBterna%C3%A2+optika&rft.au=Evsutin%2C+O.O.&rft.au=Kokurina%2C+A.S.&rft.au=Meshcheryakov%2C+R.V.&rft.date=2019-02-01&rft.issn=0134-2452&rft.eissn=2412-6179&rft.volume=43&rft.issue=1&rft_id=info:doi/10.18287%2F2412-6179-2019-43-1-137-154&rft.externalDBID=n%2Fa&rft.externalDocID=10_18287_2412_6179_2019_43_1_137_154 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0134-2452&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0134-2452&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0134-2452&client=summon |