Skip to main content
main-content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

09.12.2019 | Ausgabe 2/2020

Wireless Networks 2/2020

A hybrid security strategy (HS2) for reliable video streaming in fog computing

Zeitschrift:
Wireless Networks > Ausgabe 2/2020
Autoren:
Shaimaa A. Hussein, Ahmed I. Saleh, Hossam El-Din Mostafa, Marwa I. Obaya
Wichtige Hinweise

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Abstract

Recently, digital communication and storage over the Internet through the cloud have increased in a rapid manner. Accordingly, data security becomes a vital issue as there are many hackers who want to steal or alter others’ private data. Fog computing comes to secure and facilitate the connection to the cloud. It works as an intermediary between the cloud and the peripheral devices. Accordingly, the channel between the fog and those devices must be secured against attacks. Many efforts have been done to secure the fog through the use of steganography to embed important data into a cover digital medium and cryptography to encrypt the data into a meaningless form. As steganography and cryptography have their own advantages, combining them into a hybrid system will certainly promote the security level. Video steganography uses video as a cover media for hiding secret data as video streaming over internet is very popular and common that cannot be doubted by intruders. The advantage of using video files as a cover is that they are more secure against hacker attacks due to their relative complexity compared to other multimedia types and the data redundancy which permits to embed large amount of secret data. In this paper a new hybrid security strategy (HS2) merging the advantages of both cryptography and steganography for securing the fog has been proposed. HS2 embeds a secret image into a video .mp4 as the host medium. HS2 has two main contributions. The first is a new encryption technique that depends on α-blocks of linear feedback shift registers (LFSRs) merged with an adder/subtractor to generate a strong secret key for each block. All blocks outputs are combined using a nonlinear function to construct the final key. Such generated key will be XORed with the secret image to produce the encrypted secret image. The second contribution is a new steganography methodology based on an enhanced discrete wavelet packet transform (DWPT) to embed the encrypted secret image into a cover video. Experimental results and security analysis have shown that the proposed HS2 outperforms recent security strategies and resist common attacks when applied to the fog environment.

Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Umwelt
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Testen Sie jetzt 30 Tage kostenlos.

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Umwelt
  • Maschinenbau + Werkstoffe




Testen Sie jetzt 30 Tage kostenlos.

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Testen Sie jetzt 30 Tage kostenlos.

Literatur
Über diesen Artikel

Weitere Artikel der Ausgabe 2/2020

Wireless Networks 2/2020 Zur Ausgabe