Volume 10 Issue 06, November 2022

A Review on Enhanced Reversible Data Hiding on Encrypted Images by Hierarchical Embedding Method

Ankit Kumar, Jeetendra Singh Yadav

Page no:01-04

Abstract

Bettered reversible data hiding scheme in encoded images using Data Security deals with securing data from unauthorized users and data corruption. A vital data security measure is encryption, where digital data are encoded. Reversible data caching can restore the image after the secret data is extracted. Security and integrity of data are two challenging areas for exploration. Further attention is paid to reversible d caching in encoded images as the original cover image can be lossless recovered after embedded data is extracted while securing the confidentiality of the image contents. This paper compares two approaches used for reversible data caching. The PSNR value of the recovered image of both ways is compared. The main idea of the hierarchical embedding method (HEM) is that an image proprietor encrypts a cover image, and a data hider embeds secret information in the encoded image. With information concealment, a receiver can extract the embedded data from the hidden image; with encryption, the receiver reconstructs the original image. Experimental results prove that the proposed system not only realizes high-capacity reversible data hiding in encoded images but also reconstructs the original image in the fully operational area like the Military, Medical where minor changes in the original image content affect a lot. This literature survey discusses all the existing data-hiding methodology and their performance. An experimental study shows that the proposed scheme outperforms the existing schemes in terms of embedding rate without compromising encryption efficiency.

A Survey Paper on Wireless Sensor Network Localization Using RSSI

Deepika Sonawane, Jeetendra Singh Yadav

Page no:05-09

Abstract

The issues concerning wireless sensor nodes’ localisation estimation are still a matter of research interest. It is driven by the complexity and the diversity of current and unborn wireless detector network operations. Several single schemes have been proposed and studied for position estimation, each with advantages and limitations. Still, the current methods for performance evaluation of wireless detector networks substantially concentrate on a single private or objective evaluation. Accurate position information is essential for colourful arising operations in wireless detector networks (WSN). To better localisation accuracy, it’s of consummate significance to reduce the goods of noisy distance measures. This paper analyses commercial and exploration prototypes, which are available wireless sensor nodes based on these parameters and outlines exploration directions in this area. The SNs are still sphere specific and generally stationed to support a specific operation. Still, as WSNs’ nodes are increasingly important, it’s getting more and more material to examine how multiple operations could participate in the same WSN structure. Virtualisation is a technology that can potentially enable this sharing. Existing works are presented in detail and critically evaluated, and more error rates using a set of requirements derived from the scenarios.

A Review on Evaluations of Malicious Node Detection in Wireless Sensor Network Environment

Pragati Nigam, Vivek Sharma

Page no:10-15

Abstract

Deployed in a hostile environment, the adversary could easily compromise individual wireless sensor network nodes due to constraints such as limited battery lifetime, memory space and computing capability. Wireless Sensor Network is broadly used today in various fields, such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network deployed in an environment that is physically insecure, intrusion detection has been one of the major areas of research in WSN. In order to achieve an appropriate level of security in WSNs, we cannot depend on cryptographic techniques, as these techniques fall prey to insider attacks. This paper discusses the watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Networks. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems with existing watchdog techniques for malicious node detection. A brief survey is presented on different trust-based models aimed at WSNs for malicious node detection and dealing with the security of wireless sensor networks, starting with a brief overview of the sensor networks and discussing the current state of the security attacks in WSNs. Various types of attacks are discussed, and their countermeasures are presented. A brief discussion on future research directions in WSN security is also included. Malicious node detection causing attacks, packet loss causes, and data modifications are the challenges to overcome due to the network’s malicious nodes. Moreover, different sorts of malicious attacks on trust models are identified, and whether the existing trust models can withstand these attacks or not has been assessed.