ISSN: 1304-7191 | E-ISSN: 1304-7205
Real-time implementation of secured data transmission with '3*m' imperceptible files on raspberry PI
1Dhanekula Institute of Engineering and Technology, Department of Electronics and Communication Engineering, Ganguru (V), Vijayawada, Andhra Pradesh-521139, India
2NRI Institute of Technology, Pothavarappadu (V), Vijayawada, Andhra Pradesh-521212, India
3Koneru Lakshmaiah Education Foundation, Department of Electronics and Communication Engineering, Vaddeswaram (V), Vijayawada, Andhra Pradesh-522302, India
Sigma J Eng Nat Sci - DOI: 10.14744/sigma.2026.1959

Abstract

In this manuscript, the covert communication security has been enhanced in the real-time using novel algorithms such as Analytical and Numerical (AN), Conditional Splitting (CS) and Logical Obfuscation (LO), by employing the '3*m' imperceptible files. Typically, data encryption and steganography techniques are employed to safeguard information with one and two tiers of security, respectively; however, they may draw the attention of attackers since they indicate the availability of the information and raise the danger of decryption. To address this limitation, this research generates the '3*m' files to provide four tiers of real-time security to clandestine data. The innovative aspect of this framework is that it offers multiple levels of security for the transfer of data by transforming a stego image into files that are incomprehensible to the attacker. The “Analytical and Numerical” encoding technique yields 'ciphertext' lengths that are shorter than those of the lengths of covert data input. Steganography ensures good visual quality in stego images through DST (Discrete Shearlet Transform) and RPE (Random Pixel Embedding) techniques. Eventually, from a comprehensible stego image, the “Logical Obfuscation” and “Conditional Splitting” algorithms produce '3*m' imperceptible files. In a real-time scenario, the proposed framework is implemented by using a Raspberry Pi device. Based on experimental findings, the proposed algorithm achieved a 63.59 “peak signal to noise ratio,” a 1.00 “correlation,” a 0.0101 “number of pixels change in rate” and a 98.398 “structural similarity index”. Further it improved the payload capacity and offered four tiers of real-time security to clandestine data. In addition, this algorithm has been able to withstand file deletion and visual steganalysis attacks.