WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Generative Adversarial Networks in IoT Networks Security for Security Data Transmission Integrating Image Data Hiding

I. Sujiban Sujiban

Download Paper

Paper Contents

Abstract

The Internet of Things (IoT) describes the network of physical objects or things that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. Although several IoT devices are openly accessible to all in the network, it is extremely vital to be aware of the security risks and threats of cyber-attacks; therefore, it should be secured. In Cryptography, plain text is converted to encrypted text before it is sent, and it is converted to plain text after communication on the other side. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. One technique is to hide data in bits that represent the same colour pixels repeated in a row in an image file. By applying the encrypted data to this redundant data in some inconspicuous way, the result will be an image file that appears identical to the original image but that has "noise" patterns of regular, unencrypted data. In this project it proposes to encrypt the IoT networks data by hiding the message inside an image file using image data hiding technique. We are going to incorporate the usage of convolutional neural networks in traditional image data hiding method to drastically increase the payload that can be transmitted through an image. Different convolutional parameters will be analysed to achieve the highest payload. Encryption and decryption of the data will be performed using the newly developed deep learning algorithm. Thus, in this project the convolutional networks will be trained in such a way to increase the payload of the data to be encrypted as well as safely decrypted to view the original message.

Copyright

Copyright © 2023 I. Sujiban. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS30400004375
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science.Designed and Developed by EVG Software Solutions All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us