Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Novel Image Steganography Method for Industrial Internet of Things Security
Department of Computer Science, Faculty of Computers and Information, South Valley University, Qena, Egypt.
Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor, Egypt.
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Digital Services and Systems. Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Qena 83513, Egypt; Centre for Security, Communications and Network Research, University of Plymouth, Plymouth PL4 8AA, U.K..ORCID iD: 0000-0002-3800-0757
Department of Software, Sejong University, Seoul 143-747, South Korea.
2021 (English)In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 17, no 11, p. 7743-7751Article in journal (Refereed) Published
Abstract [en]

The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) brings new security threats by exposing secret and private data. Thus, information security has become a major concern in the communication environment of IIoT and AI, where security and privacy must be ensured for the messages between a sender and the intended recipient. To this end, we propose a method called HHO-IWT for covert communication and secure data in the IIoT environment based on digital image steganography. The method embeds secret data in the cover images using a metaheuristic optimization algorithm called Harris hawks optimization (HHO) to efficiently select image pixels that can be used to hide bits of secret data within integer wavelet transforms. The HHO-based pixel selection operation uses an objective function evaluation depending on two phases: exploitation and exploration. The objective function is employed to determine an optimal encoding vector to transform secret data into an encoded form generated by the HHO algorithm. Several experiments are conducted to validate the performance of the proposed method with respect to visual quality, payload capacity, and security against attacks. The obtained results reveal that the HHO-IWT method achieves higher levels of security than the state-of-the-art methods and that it resists various forms of steganalysis. Thus, utilizing this approach can keep unauthorized individuals away from the transmitted information and solve some security challenges in the IIoT.

Place, publisher, year, edition, pages
IEEE, 2021. Vol. 17, no 11, p. 7743-7751
Keywords [en]
Data Hiding, Industrial IoT, Information Security, Optimization, Privacy, Steganography
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
URN: urn:nbn:se:ltu:diva-82763DOI: 10.1109/TII.2021.3053595ISI: 000679533900055Scopus ID: 2-s2.0-85100504915OAI: oai:DiVA.org:ltu-82763DiVA, id: diva2:1525117
Note

Validerad;2021;Nivå 2;2021-08-11 (alebob)

Available from: 2021-02-03 Created: 2021-02-03 Last updated: 2021-08-27Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Awad, Ali Ismail

Search in DiVA

By author/editor
Awad, Ali Ismail
By organisation
Digital Services and Systems
In the same journal
IEEE Transactions on Industrial Informatics
Information Systems, Social aspects

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 259 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf