Reference Hub1
The Study of Genetic Type Steganographic Models to Increase Noise Immunity of IoT Systems

The Study of Genetic Type Steganographic Models to Increase Noise Immunity of IoT Systems

Dmitry S. Zaichenko, Irina S. Sineva
Copyright: © 2020 |Volume: 11 |Issue: 2 |Pages: 15
ISSN: 1947-3176|EISSN: 1947-3184|EISBN13: 9781799807001|DOI: 10.4018/IJERTCS.2020040101
Cite Article Cite Article

MLA

Zaichenko, Dmitry S., and Irina S. Sineva. "The Study of Genetic Type Steganographic Models to Increase Noise Immunity of IoT Systems." IJERTCS vol.11, no.2 2020: pp.1-15. http://doi.org/10.4018/IJERTCS.2020040101

APA

Zaichenko, D. S. & Sineva, I. S. (2020). The Study of Genetic Type Steganographic Models to Increase Noise Immunity of IoT Systems. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 11(2), 1-15. http://doi.org/10.4018/IJERTCS.2020040101

Chicago

Zaichenko, Dmitry S., and Irina S. Sineva. "The Study of Genetic Type Steganographic Models to Increase Noise Immunity of IoT Systems," International Journal of Embedded and Real-Time Communication Systems (IJERTCS) 11, no.2: 1-15. http://doi.org/10.4018/IJERTCS.2020040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Research and development in the field of the Internet of Things, or more generally M2M systems security, is the subject of daily discussion in the ICT market. With the rapid development of intelligent devices, the necessity of valuable information protection has generated many new methods and technologies. Stegoimages, along with genetic algorithms (GA), are a relatively new object in the field of information hiding. The assumption that their application can significantly improve the noise-resistant properties of stegofiles is justified by the properties of the GA, but it is a subject for detailed study, since in such an application the GA has not yet been considered. The proposed method is based on genetic coding that hides messages between Internet of Things devices and is capable of detecting both internal and external attacks in the intellectual infrastructure. A sufficiently high efficiency of preliminary GA coding is shown for objects such as hiding graphic information in a graphic stegocontainer.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.