检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Ahamad B.Alkodre Nour Mahmoud Bahbouh Sandra Sendra Adnan Ahmed Abi Sen Yazed Alsaawy Saad Said Alqahtany Abdallah Namoun Hani Almoamari
机构地区:[1]Faculty of Computer and Information Systems,Islamic University,Al-Madinah,42351,Saudi Arabia [2]Department of Information and Communication Sciences,Granada University,Granada,18071,Spain [3]Instituto de Investigación para la Gestión Integrada de Zonas Costeras,Universitat Politècnica de València,Valencia,46730,Spain [4]Department of Graduate Studies&Scientific Research,University of Prince Mugrin,Al-Madinah,42351,Saudi Arabia
出 处:《Computers, Materials & Continua》2024年第11期2727-2751,共25页计算机、材料和连续体(英文)
基 金:funded by the Research Deanship of the Islamic University of Madinah under grant number 966.
摘 要:In Saudi Arabia,drones are increasingly used in different sensitive domains like military,health,and agriculture to name a few.Typically,drone cameras capture aerial images of objects and convert them into crucial data,alongside collecting data from distributed sensors supplemented by location data.The interception of the data sent from the drone to the station can lead to substantial threats.To address this issue,highly confidential protection methods must be employed.This paper introduces a novel steganography approach called the Shuffling Steganography Approach(SSA).SSA encompasses five fundamental stages and three proposed algorithms,designed to enhance security through strategic encryption and data hiding techniques.Notably,this method introduces advanced resistance to brute force attacks by employing predefined patterns across a wide array of images,complicating unauthorized access.The initial stage involves encryption,dividing,and disassembling the encrypted data.A small portion of the encrypted data is concealed within the text(Algorithm 1)in the third stage.Subsequently,the parts are merged and mixed(Algorithm 2),and finally,the composed text is hidden within an image(Algorithm 3).Through meticulous investigation and comparative analysis with existing methodologies,the proposed approach demonstrates superiority across various pertinent criteria,including robustness,secret message size capacity,resistance to multiple attacks,and multilingual support.
关 键 词:Health of palm trees steganography based text steganography based image DRONE fog computing security
分 类 号:TP39[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.140.250.157