Abstract
Industries across the world produce thousands of confidential images and other data that needs to be secured on a daily basis. With the onset of the information era and the exponential growth of technologies like big data, security of private and confidential information in any form has become a challenge. Many times, these images need to be transmitted over public networks to facilitate wireless monitoring and sharing testing results with remote operators. This transmission needs to be secure to ensure the safety and confidentiality of the images, thus cryptography techniques like image steganography are required. In this prototype, we have designed, developed and tested a Raspberry Pi LAMP web server which stores images locally which are obtained using an ESP32-Cam, and which facilitates transmission using the steganography technique. There is also an option to store these images on any other widely used cloud server, and the transmission can still use steganography encryption for an extra layer of security. The stored images can only be accessed by authorized users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Li, S., Zheng, X.: On the security of an image encryption method. In: Proceedings International Conference on Image Processing, vol. 2, p. II. IEEE (2002)
Bansod, S.P., Mane, V.M., Ragha, R.: Modified BPCS steganography using hybrid cryptography for improving data embedding capacity. In: 2012 International Conference on Communication, Information Computing Technology (ICCICT), pp. 1–6. IEEE (2012)
Neeta, D., Snehal, K., Jacobs, D.: Implementation of LSB steganography and its evaluation for various bits. In: 2006 1st International Conference on Digital Information Management, pp. 173–178. IEEE (2006)
Alharbi, A., Kechadi, T.M.: A novel steganography algorithm based on alpha blending technique using discrete wavelet transform (ABT-DWT). In: Rocha, Á., Serrhini, M. (eds.) EMENA-ISTL 2018. SIST, vol. 111, pp. 342–351. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-03577-8_38
Indra Sena Reddy, M., Siva Kumar, A.P.: Secured data transmission using wavelet based steganography and cryptography by using AES algorithm. Procedia Comput. Sci. 85, 62–69 (2016)
Gutub, A., Al-Qahtani, A., Tabakh, A.: Triple-a: secure RGB image steganography based on randomization. In: 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 400–403. IEEE (2009)
Wahl, J.D., Zhang, J.X.: Development and power characterization of an IoT network for agricultural imaging applications. J. Adv. Inf. Technol. 12(3), 214–219 (2021)
Myung-Jae, L.I.M., Dong-Kun, J.U.N.G., Young-Man, K.W.O.N.: An image analysis system design using Arduino sensor and feature point extraction algorithm to prevent intrusion. Korea J. Artif. Intell. 9(2), 23–28 (2021)
Shukla, A., Diwan, R.: IoT based load automation with remote access surveillance using ESP 32 Camand ESP 8266 module. Ann. Romanian Soc. Cell Biol. 25(3), 6904–6914 (2021)
Rasras, R.J., AlQadi, Z.A., Abu Sara, M.R.: A methodology based on steganography and cryptography to protect highly secure messages. Eng. Technol. Appl. Sci. Res. 9(1), 3681–3684 (2019)
Bloisi, D.D., Iocchi, L.: Image based steganography and cryptography. In: VISAPP (1), pp. 127–134. CiteSeer (2007)
Yang, X., et al.: A survey on smart agriculture: development modes, technologies, and security and privacy challenges. IEEE/CAA J. Automatica Sinica, 8(2), 273–302 (2021)
Zhang, P.Y., Zhou, M.C., Fortino, G.: Security and trust issues in fog computing: a survey. Futur. Gener. Comput. Syst. 88, 16–27 (2018)
Prabha, S.S., Paul Antony, A.J., Meena, M.J., Pandian, SP.: Smart cloud robot using raspberry pi. In: 2014 International Conference on Recent Trends in Information Technology, pp. 1–5. IEEE (2014)
Kumar, S., Sharma, K., Raj, G., Datta, D., Ghosh, A.: Arduino and ESP32-CAM-based automatic touchless attendance system. In: Proceedings of the 3rd International Conference on Communication, Devices and Computing. LNEE, vol. 851, pp. 135–144. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-9154-6_14
Soni, G., Saini, S.S., Malhi, S.S., Srao, B.K., Sharma, A., Puri, D.: Design and implementation of object motion detection using telegram. In: 2021 International Conference on Technological Advancements and Innovations (ICTAI), pp. 203–206. IEEE (2021)
AbdelRahim, S., Ghoneimy, S., Selim, G.: Adaptive security scheme for real-time VoIP using multi-layer steganography. In: Proceedings of the 7th International Conference on Software and Information Engineering, pp. 106–110, (2018)
Osama Hosam and Muhammad Hammad Ahmad: Hybrid design for cloud data security using combination of AES, ECC and LSB steganography. Int. J. Comput. Sci. Eng. 19(2), 153–161 (2019)
Rohadi, E., et al.: Internet of Things: CCTV monitoring by using raspberry pi. In: 2018 International Conference on Applied Science and Technology (iCAST), pp. 454–457. IEEE (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Gokhale, H., Satapathy, C., Syed, A.Z. (2022). Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography. In: González-Vidal, A., Mohamed Abdelgawad, A., Sabir, E., Ziegler, S., Ladid, L. (eds) Internet of Things. GIoTS 2022. Lecture Notes in Computer Science, vol 13533. Springer, Cham. https://doi.org/10.1007/978-3-031-20936-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-031-20936-9_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20935-2
Online ISBN: 978-3-031-20936-9
eBook Packages: Computer ScienceComputer Science (R0)