Nothing Special   »   [go: up one dir, main page]

Skip to main content

Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography

  • Conference paper
  • First Online:
Internet of Things (GIoTS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13533))

Included in the following conference series:

  • 875 Accesses

Abstract

Industries across the world produce thousands of confidential images and other data that needs to be secured on a daily basis. With the onset of the information era and the exponential growth of technologies like big data, security of private and confidential information in any form has become a challenge. Many times, these images need to be transmitted over public networks to facilitate wireless monitoring and sharing testing results with remote operators. This transmission needs to be secure to ensure the safety and confidentiality of the images, thus cryptography techniques like image steganography are required. In this prototype, we have designed, developed and tested a Raspberry Pi LAMP web server which stores images locally which are obtained using an ESP32-Cam, and which facilitates transmission using the steganography technique. There is also an option to store these images on any other widely used cloud server, and the transmission can still use steganography encryption for an extra layer of security. The stored images can only be accessed by authorized users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Li, S., Zheng, X.: On the security of an image encryption method. In: Proceedings International Conference on Image Processing, vol. 2, p. II. IEEE (2002)

    Google Scholar 

  2. Bansod, S.P., Mane, V.M., Ragha, R.: Modified BPCS steganography using hybrid cryptography for improving data embedding capacity. In: 2012 International Conference on Communication, Information Computing Technology (ICCICT), pp. 1–6. IEEE (2012)

    Google Scholar 

  3. Neeta, D., Snehal, K., Jacobs, D.: Implementation of LSB steganography and its evaluation for various bits. In: 2006 1st International Conference on Digital Information Management, pp. 173–178. IEEE (2006)

    Google Scholar 

  4. Alharbi, A., Kechadi, T.M.: A novel steganography algorithm based on alpha blending technique using discrete wavelet transform (ABT-DWT). In: Rocha, Á., Serrhini, M. (eds.) EMENA-ISTL 2018. SIST, vol. 111, pp. 342–351. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-03577-8_38

    Chapter  Google Scholar 

  5. Indra Sena Reddy, M., Siva Kumar, A.P.: Secured data transmission using wavelet based steganography and cryptography by using AES algorithm. Procedia Comput. Sci. 85, 62–69 (2016)

    Google Scholar 

  6. Gutub, A., Al-Qahtani, A., Tabakh, A.: Triple-a: secure RGB image steganography based on randomization. In: 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 400–403. IEEE (2009)

    Google Scholar 

  7. Wahl, J.D., Zhang, J.X.: Development and power characterization of an IoT network for agricultural imaging applications. J. Adv. Inf. Technol. 12(3), 214–219 (2021)

    Google Scholar 

  8. Myung-Jae, L.I.M., Dong-Kun, J.U.N.G., Young-Man, K.W.O.N.: An image analysis system design using Arduino sensor and feature point extraction algorithm to prevent intrusion. Korea J. Artif. Intell. 9(2), 23–28 (2021)

    Google Scholar 

  9. Shukla, A., Diwan, R.: IoT based load automation with remote access surveillance using ESP 32 Camand ESP 8266 module. Ann. Romanian Soc. Cell Biol. 25(3), 6904–6914 (2021)

    Google Scholar 

  10. Rasras, R.J., AlQadi, Z.A., Abu Sara, M.R.: A methodology based on steganography and cryptography to protect highly secure messages. Eng. Technol. Appl. Sci. Res. 9(1), 3681–3684 (2019)

    Google Scholar 

  11. Bloisi, D.D., Iocchi, L.: Image based steganography and cryptography. In: VISAPP (1), pp. 127–134. CiteSeer (2007)

    Google Scholar 

  12. Yang, X., et al.: A survey on smart agriculture: development modes, technologies, and security and privacy challenges. IEEE/CAA J. Automatica Sinica, 8(2), 273–302 (2021)

    Google Scholar 

  13. Zhang, P.Y., Zhou, M.C., Fortino, G.: Security and trust issues in fog computing: a survey. Futur. Gener. Comput. Syst. 88, 16–27 (2018)

    Article  Google Scholar 

  14. Prabha, S.S., Paul Antony, A.J., Meena, M.J., Pandian, SP.: Smart cloud robot using raspberry pi. In: 2014 International Conference on Recent Trends in Information Technology, pp. 1–5. IEEE (2014)

    Google Scholar 

  15. Kumar, S., Sharma, K., Raj, G., Datta, D., Ghosh, A.: Arduino and ESP32-CAM-based automatic touchless attendance system. In: Proceedings of the 3rd International Conference on Communication, Devices and Computing. LNEE, vol. 851, pp. 135–144. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-9154-6_14

    Chapter  Google Scholar 

  16. Soni, G., Saini, S.S., Malhi, S.S., Srao, B.K., Sharma, A., Puri, D.: Design and implementation of object motion detection using telegram. In: 2021 International Conference on Technological Advancements and Innovations (ICTAI), pp. 203–206. IEEE (2021)

    Google Scholar 

  17. AbdelRahim, S., Ghoneimy, S., Selim, G.: Adaptive security scheme for real-time VoIP using multi-layer steganography. In: Proceedings of the 7th International Conference on Software and Information Engineering, pp. 106–110, (2018)

    Google Scholar 

  18. Osama Hosam and Muhammad Hammad Ahmad: Hybrid design for cloud data security using combination of AES, ECC and LSB steganography. Int. J. Comput. Sci. Eng. 19(2), 153–161 (2019)

    Google Scholar 

  19. Rohadi, E., et al.: Internet of Things: CCTV monitoring by using raspberry pi. In: 2018 International Conference on Applied Science and Technology (iCAST), pp. 454–457. IEEE (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hrishikesh Gokhale .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gokhale, H., Satapathy, C., Syed, A.Z. (2022). Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography. In: González-Vidal, A., Mohamed Abdelgawad, A., Sabir, E., Ziegler, S., Ladid, L. (eds) Internet of Things. GIoTS 2022. Lecture Notes in Computer Science, vol 13533. Springer, Cham. https://doi.org/10.1007/978-3-031-20936-9_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20936-9_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20935-2

  • Online ISBN: 978-3-031-20936-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics