LSB‐XOR technique for securing captured images from disaster by UAVs in B5G networks

Farheen Syed,Saeed Hamood Alsamhi,Sachin Kumar Gupta,Abdu Saif
DOI: https://doi.org/10.1002/cpe.8061
2024-03-05
Concurrency and Computation Practice and Experience
Abstract:Summary Recently, unmanned aerial vehicles (UAV) technology has been utilized to monitor and capture images from disasters to analyze, process, and take action in real‐time for a speedy recovery. UAVs represent one of the critical technologies used beyond the fifth generation (B5G) of heterogeneous networks. Due to the sensitive data captured from disaster areas by UAVs, security has become a significant concern. Therefore, effective methods are needed to defend collected data against hackers and fictional activity by untrusted users. Audio encryption technologies can be applied to military communication, multimedia, medical, telemedical, and the internet. The present work introduces a novel Steganographic technique of converting an image to audio using LSB coding with XOR operation, ensuring the audio signal is protected using a key and maintains the excellent quality of the signal regenerated. Python3 is used for the implementation of the proposed technique. The findings show significant improvement in MSE and SSIM contexts.
computer science, theory & methods, software engineering
What problem does this paper attempt to address?