Detailed Information

Cited 75 time in webofscience Cited 101 time in scopus
Metadata Downloads

A Novel Image Steganography Method for Industrial Internet of Things Security

Authors
Hassaballah, M[Hassaballah, M.]Hameed, MA[Hameed, Mohamed Abdel]Awad, AI[Awad, Ali Ismail]Muhammad, K[Muhammad, Khan]
Issue Date
Nov-2021
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Security; Encoding; Industrial Internet of Things; Artificial intelligence; Optimization; Informatics; Visualization; Data hiding; industrial Internet of Things (IoT); information security; optimization; privacy; steganography
Citation
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, v.17, no.11, pp.7743 - 7751
Indexed
SCIE
SCOPUS
Journal Title
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume
17
Number
11
Start Page
7743
End Page
7751
URI
https://scholarx.skku.edu/handle/2021.sw.skku/98268
DOI
10.1109/TII.2021.3053595
ISSN
1551-3203
Abstract
The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) brings new security threats by exposing secret and private data. Thus, information security has become a major concern in the communication environment of IIoT and AI, where security and privacy must be ensured for the messages between a sender and the intended recipient. In this article, we propose a method called Harris hawks optimization-integer wavelet transform (HHO-IWT) for covert communication and secure data in the IIoT environment based on digital image steganography. The method embeds secret data in the cover images using a metaheuristic optimization algorithm called HHO to efficiently select image pixels that can be used to hide bits of secret data within integer wavelet transforms. The HHO-based pixel selection operation uses an objective function evaluation depending on the following two phases: exploitation and exploration. The objective function is employed to determine an optimal encoding vector to transform secret data into an encoded form generated by the HHO algorithm. Several experiments are conducted to validate the performance of the proposed method with respect to visual quality, payload capacity, and security against attacks. The obtained results reveal that the HHO-IWT method achieves higher levels of security than the state-of-the-art methods and that it resists various forms of steganalysis. Thus, utilizing this approach can keep unauthorized individuals away from the transmitted information and solve some security challenges in the IIoT.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Computing and Informatics > Convergence > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher MUHAMMAD, KHAN photo

MUHAMMAD, KHAN
Computing and Informatics (Convergence)
Read more

Altmetrics

Total Views & Downloads

BROWSE