A Novel Image Steganography Method for Industrial Internet of Things Security
- Authors
- Hassaballah, M[Hassaballah, M.]; Hameed, MA[Hameed, Mohamed Abdel]; Awad, AI[Awad, Ali Ismail]; Muhammad, K[Muhammad, Khan]
- Issue Date
- Nov-2021
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Security; Encoding; Industrial Internet of Things; Artificial intelligence; Optimization; Informatics; Visualization; Data hiding; industrial Internet of Things (IoT); information security; optimization; privacy; steganography
- Citation
- IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, v.17, no.11, pp.7743 - 7751
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
- Volume
- 17
- Number
- 11
- Start Page
- 7743
- End Page
- 7751
- URI
- https://scholarx.skku.edu/handle/2021.sw.skku/98268
- DOI
- 10.1109/TII.2021.3053595
- ISSN
- 1551-3203
- Abstract
- The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) brings new security threats by exposing secret and private data. Thus, information security has become a major concern in the communication environment of IIoT and AI, where security and privacy must be ensured for the messages between a sender and the intended recipient. In this article, we propose a method called Harris hawks optimization-integer wavelet transform (HHO-IWT) for covert communication and secure data in the IIoT environment based on digital image steganography. The method embeds secret data in the cover images using a metaheuristic optimization algorithm called HHO to efficiently select image pixels that can be used to hide bits of secret data within integer wavelet transforms. The HHO-based pixel selection operation uses an objective function evaluation depending on the following two phases: exploitation and exploration. The objective function is employed to determine an optimal encoding vector to transform secret data into an encoded form generated by the HHO algorithm. Several experiments are conducted to validate the performance of the proposed method with respect to visual quality, payload capacity, and security against attacks. The obtained results reveal that the HHO-IWT method achieves higher levels of security than the state-of-the-art methods and that it resists various forms of steganalysis. Thus, utilizing this approach can keep unauthorized individuals away from the transmitted information and solve some security challenges in the IIoT.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Computing and Informatics > Convergence > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.