Обзор методов встраивания информации в цифровые объекты для обеспечения безопасности в "интернете вещей"
Автор: Евсютин Олег Олегович, Кокурина Анна Сергеевна, Мещеряков Роман Валерьевич
Журнал: Компьютерная оптика @computer-optics
Рубрика: Численные методы и анализ данных
Статья в выпуске: 1 т.43, 2019 года.
Бесплатный доступ
Передача, обработка и хранение информации в инфраструктуре «интернета вещей» сопряжены с необходимостью решения ряда задач обеспечения информационной безопасности. Основная сложность заключается в том, что инфраструктура «интернета вещей» неоднородна и включает в себя множество различных устройств, в том числе с ограниченными вычислительными ресурсами. Одним из подходов к решению данных задач является встраивание дополнительной информации в передаваемые и хранимые цифровые объекты. В данной работе представлен обзор методов встраивания информации в цифровые данные для обеспечения безопасности в «интернете вещей», включающий методы стеганографического встраивания информации и методы встраивания цифровых водяных знаков. Рассмотрены методы встраивания информации в цифровые изображения, а также данные беспроводных сенсорных сетей, предлагаемые для использования в «интернете вещей». Выявлены достоинства и недостатки, присущие отдельным методам и группам методов, проведён анализ их применимости для защиты данных в «интернете вещей». Выявлены актуальные направления в данной области исследований.
Защита информации, интернет вещей, встраивание информации, цифровые изображения, стеганография, цифровой водяной знак
Короткий адрес: https://sciup.org/140243262
IDR: 140243262 | DOI: 10.18287/2412-6179-2019-43-1-137-154
Список литературы Обзор методов встраивания информации в цифровые объекты для обеспечения безопасности в "интернете вещей"
- Li, S. The internet of things: a survey/S. Li, L.D. Xu, S. Zhao//Information Systems Frontiers. -2015. -Vol. 17, Issue 2. -P. 243-259. - DOI: 10.1007/s10796-014-9492-7
- Boavida, F. People-centric internet of things -Challenges, approach, and enabling technologies/F. Boavida, A. Kliem, T. Renner, J. Riekki, C. Jouvray, M. Jacovi, S. Ivanov, F. Guadagni, P. Gil, A. Triviño. -In: Intelligent Distributed Computing IX/ed. by P. Novais, D. Camacho, C. Analide, A.E.F. Seghrouchni, C. Badica. -Cham: Springer, 2016. -P. 463-474. - DOI: 10.1007/978-3-319-25017-5_44
- Hmood, A.K. On the capacity and security of steganography approaches: An overview/A.K. Hmood, H.A. Jalab, Z.M. Kasirun, B.B. Zaidan, A.A. Zaidan//Journal of Applied Sciences. -2010. -Vol. 10, Issue 16. -P. 1825-1833. - DOI: 10.3923/jas.2010.1825.1833
- Bazyar, M. A recent review of MP3 based steganography methods/M. Bazyar, R. Sudirman//International Journal of Security and its Applications. -2014. -Vol. 8, Issue 6. -P. 405-414. - DOI: 10.14257/ijsia.2014.8.6.35
- Cheddad, A. Digital image steganography: Survey and analysis of current methods/A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt//Signal Processing. -2010. -Vol. 90, Issue 3. -P. 727-752. - DOI: 10.1016/j.sigpro.2009.08.010
- Sadek, M.M. Video steganography: a comprehensive review/M.M. Sadek, A.S. Khalifa, M.G.M. Mostafa//Multimedia Tools and Applications. -2015. -Vol. 74, Issue 17. -P. 7063-7094. -
- DOI: 10.1007/s11042-014-1952-z
- Fridrich, J. Steganography in digital media: Principles, algorithms and applications/J. Fridrich. -New York: Cambridge University Press, 2010. -437 p. -ISBN: 978-0-521-19019-0.
- Mitekin, V. A new QIM-based watermarking algorithm robust against multi-image histogram attack/V. Mitekin, V. Fedoseev//Procedia Engineering. -2017. -Vol. 201. -P. 453-462. -
- DOI: 10.1016/j.proeng.2017.09.687
- Bianchi, T. Secure watermarking for multimedia content protection: A review of its benefits and open issues/T. Bianchi, A. Piva//IEEE Signal Processing Magazine. -2013. -Vol. 30, Issue 2. -P. 87-96. -
- DOI: 10.1109/MSP.2012.2228342
- Kannan, D. An extensive research on robust digital image watermarking techniques: A review/D. Kannan, M. Gobi//International Journal of Signal and Imaging Systems Engineering. -2015. -Vol. 8, Issues 1-2. -P. 89-104. -
- DOI: 10.1504/IJSISE.2015.067047
- Panah, A.S. On the properties of non-media digital watermarking: A review of state of the art techniques/A.S. Panah, R.V. Schyndel, T. Sellis, E. Bertino//IEEE Access. -2016. -Vol. 4. -P. 2670-2704. -ISSN 2169-3536. -
- DOI: 10.1109/ACCESS.2016.2570812
- Bairagi, A.K. An efficient steganographic approach for protecting communication in the Internet of Things IoT critical infrastructures/A.K. Bairagi, R. Khondoker, R. Islam//Information Security Journal: A Global Perspective. -2016. -Vol. 25, Issues 4-6. -P. 192-212. -
- DOI: 10.1080/19393555.2016.1206640
- Li, H. The maximum matching degree sifting algorithm for steganography pretreatment applied to IoT/H. Li, L. Hu, J. Chu, L. Chi, H. Li//Multimedia Tools and Applications. -2018. -Vol. 77, Issue 14. -P. 18203-18221. -
- DOI: 10.1007/s11042-017-5075-1
- Parah, S.A. High capacity and secure electronic patient record (EPR) embedding in color images for IoT driven healthcare systems/S.A. Parah, J.A. Sheikh, F. Ahad, G.M. Bhat. -In: Internet of things and big data analytics toward next-generation intelligence/ed. by N. Dey, A.E. Hassanien, C. Bhatt, A.S. Ashour, S.C. Satapathy. -Cham, Switzerland: Springer International Publishing AG, 2018. -P. 409-437. -
- DOI: 10.1007/978-3-319-60435-0_17
- Parah, S.A. Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication/S.A. Parah, J.A. Sheikh, J.A. Akhoon, N.A. Loan//Future Generation Computer Systems. -2018. -In Press. -
- DOI: 10.1016/j.future.2018.02.023
- Huang, C.-T. VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements/C.-T. Huang, M.-Y. Tsai, L.-C. Lin, W.-J. Wang, S.-J. Wang//Journal of Supercomputing. -2016. -Vol. 74, Issue 9. -P. 4295-4314. -
- DOI: 10.1007/s11227-016-1874-9
- Tondwalkar, A. Secure localisation of wireless devices with application to sensor networks using steganography/A. Tondwalkar, P. Vinayakray-Jani//Procedia Computer Science. -2016. -Vol. 78. -P. 610-616. -
- DOI: 10.1016/j.procs.2016.02.107
- Kim, S.R. Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications/S.R. Kim, J.N. Kim, S.T. Kim, S. Shin, J.H. Yi//The Journal of Supercomputing. -2018. -Vol. 74, Issue 9. -P. 4261-4280. -
- DOI: 10.1007/s11227-016-1848-y
- Elhoseny, M. Secure medical data transmission model for IoT-based healthcare systems/M. Elhoseny, G. Ramírez-González, O.M. Abu-Elnasr, S.A. Shawkat, A. N, A. Farouk//IEEE Access. -2018. -Vol. 6. -P. 20596-20608. -
- DOI: 10.1109/ACCESS.2018.2817615
- Das, R. Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques/R. Das, I. Das//Proceedings of the 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN). -2016. -P. 296-301. -
- DOI: 10.1109/ICRCICN.2016.7813674
- Yassin, A.A. Toward for strong authentication code in cloud of internet of things based on DWT and steganography/A.A. Yassin, A.M. Rashid, Z.A. Abduljabbar, H.A.A. Alasadi, A.J.Y. Aldarwish//Journal of Theoretical and Applied Information Technology. -2018. -Vol. 96, Issue 10. -P. 2922-2935.
- Bapat, C. Smart-lock security re-engineered using cryptography and steganography/C. Bapat, G. Baleri, S. Inamdar, A.V. Nimkar. -In Book: Security in computing and communications/ed. by S.M. Thampi, G.M. Pérez, C.B. Westphall, J. Hu, C.I. Fan, F.G. Mármol. -Singapore: Springer Nature Singapore Pte Ltd., 2017. -P. 325-336. -
- DOI: 10.1007/978-981-10-6898-0_27
- Li, L. Distortion less secret image sharing scheme for Internet of Things system/L. Li, M.S. Hossain, A.A. Abd El-Latif, M.F. Alhamid//Cluster Computing. -2017. -P. 1-15. -
- DOI: 10.1007/s10586-017-1345-y
- De Fuentes, J.M. Applying information hiding in VANETs to covertly report misbehaving vehicles/J.M. de Fuentes, J. Blasco, A.I. González-Tablas, L. González-Manzano//International Journal of Distributed Sensor Networks. -2014. -Vol. 10, Issue 2. -P. 1-15. -
- DOI: 10.1155/2014/120626
- Ren, J. A sensitive data aggregation scheme for body sensor networks based on data hiding/J. Ren, G. Wu, L. Yao//Personal and Ubiquitous Computing. -2013. -Vol. 17, Issue 7. -P. 1317-1329. -
- DOI: 10.1007/s00779-012-0566-6
- Pizzolante, R. On the protection of consumer genomic data in the Internet of Living Things/R. Pizzolante, A. Castiglione, B. Carpentieri, A. De Santis, F. Palmieri, A. Castiglione//Computers & Security. -2018. -Vol. 74. P. 384-400. -
- DOI: 10.1016/j.cose.2017.06.003
- Wang, H. Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks/H. Wang//Journal of Supercomputing. -2013. -Vol. 64, Issue 3. -P. 883-897. -
- DOI: 10.1016/j.cose.2017.06.003
- Wang, J. A cross-layer authentication design for secure video transportation in wireless sensor network/J. Wang, G.L. Smith//International Journal of Security and Networks. -2010. -Vol. 5, Issue 1. -P. 63-76. -
- DOI: 10.1504/IJSN.2010.030724
- Zhang, W. Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach/W. Zhang, Y. Liu, S.K. Das, P. De//Pervasive and Mobile Computing. -2008. -Vol. 4, Issue 5. -P. 658-680. -
- DOI: 10.1016/j.pmcj.2008.05.005
- Panah, A.S. In the shadows we trust: A secure aggregation tolerant watermark for data streams/A.S. Panah, R.V. Schyndel, T. Sellis, E. Bertino//Proceedings of the IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). -2015. -P. 1-9. -
- DOI: 10.1109/WoWMoM.2015.7158149
- Yavari, A. Scalable role-based data disclosure control for the Internet of Things/A. Yavari, A.S. Panah, D. Georgakopoulos, P.P. Jayaraman, R. Van Schyndel//Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS). -2017. -P. 2226-2233. -
- DOI: 10.1109/ICDCS.2017.307
- Yi, Y. A digital watermarking approach to secure and precise range query processing in sensor networks/Y. Yi, R. Li, F. Chen, A.X. Liu, Y. Lin//2013 Proceedings IEEE INFOCOM. -2013. -P. 1950-1958. -
- DOI: 10.1109/INFCOM.2013.6566995
- Yue, M. Rights protection for trajectory streams/M. Yue, Z. Peng, K. Zheng, Y. Peng. -In: Database systems for advanced applications/ed. by S.S. Bhowmick, C.E. Dyreson, C.S. Jensen, M.L. Lee, A. Muliantara, B. Thalheim. -Cham, Switzerland: Springer International Publishing, 2014. -P. 407-421. -
- DOI: 10.1007/978-3-319-05813-9_27
- Lipuš, B. Robust watermarking of airborne LiDAR data/B. Lipuš, B. Žalik//Multimedia Tools and Applications. -2018. -Vol. 77, Issue 21. -P. 29077-29097. -
- DOI: 10.1007/s11042-018-6039-9
- Hameed, K. Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks/K. Hameed, A. Khan, M. Ahmed, A.G. Reddy, M.M. Rathore//Future Generation Computer Systems. -2018. -Vol. 82. -P. 274-289. -
- DOI: 10.1016/j.future.2017.12.009
- Wang, C. Data secure transmission model based on compressed sensing and digital watermarking technology/C. Wang, Y. Bai, X. Mo//Wuhan University Journal of Natural Sciences. -2014. -Vol. 19, Issue 6. -P. 505-511. -
- DOI: 10.1007/s11859-014-1045-x
- Zhang, G. A new digital watermarking method for data integrity protection in the perception layer of IoT/G. Zhang, L. Kou, L. Zhang, C. Liu, Q. Da, J. Sun//Security and Communication Networks. -2017. -Vol. 2017. -3126010 (12 p.). -
- DOI: 10.1155/2017/3126010
- Kamel, I. Simplified watermarking scheme for sensor networks/I. Kamel, H. Juma//International Journal of Internet Protocol Technology. -2010. -Vol. 5, Issues 1-2. -P. 101-111. -
- DOI: 10.1504/IJIPT.2010.032619
- Shi, X. A reversible watermarking authentication scheme for wireless sensor networks/X. Shi, D. Xiao//Information Sciences. -2013. -Vol. 240. -P. 173-183. -
- DOI: 10.1016/j.ins.2013.03.031
- Chong, S. Self-identifying data for fair use/S. Chong, C. Skalka, J.A. Vaughan//Journal of Data and Information Quality. -2015. -Vol. 5, Issue 3. -11 (30 p.). -
- DOI: 10.1145/2687422