Open Access iconOpen Access

ARTICLE

crossmark

Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment

Mahmoud Ragab1,2,3,*, Samah Alshehri4, Hani A. Alhadrami5,6,7, Faris Kateb1, Ehab Bahaudien Ashary8, S. Abdel-khalek9,10

1 Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
2 Centre of Artificial Intelligence for Precision Medicines, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
3 Department of Mathematics, Faculty of Science, Al-Azhar University, Naser City, 11884, Cairo, Egypt
4 Department of Pharmacy Practice, Faculty of Pharmacy, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
5 Department of Medical Laboratory Technology, Faculty of Applied Medical Sciences, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
6 Molecular Diagnostic Lab, King Abdulaziz University Hospital, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
7 Special Infectious Agent Unit, King Fahd Medical Research Center, King Abdulaziz University, Jeddah, 21589,Saudi Arabia
8 Electrical and Computer Engineering Department, Faculty of Engineering, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
9 Department of Mathematics, Faculty of Science, Taif University, Taif, 21944, Saudi Arabia
10 Department of Mathematics, Faculty of Science, Sohag University, Sohag, 82524, Egypt

* Corresponding Author: Mahmoud Ragab. Email: email

Computers, Materials & Continua 2022, 72(1), 1323-1338. https://doi.org/10.32604/cmc.2022.024775

Abstract

Rapid advancements of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) pose serious security issues by revealing secret data. Therefore, security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time. Practically, AI techniques can be utilized to design image steganographic techniques in IIoT. In addition, encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access. In order to accomplish secure data transmission in IIoT environment, this study presents novel encryption with image steganography based data hiding technique (EIS-DHT) for IIoT environment. The proposed EIS-DHT technique involves a new quantum black widow optimization (QBWO) to competently choose the pixel values for hiding secrete data in the cover image. In addition, the multi-level discrete wavelet transform (DWT) based transformation process takes place. Besides, the secret image is divided into three R, G, and B bands which are then individually encrypted using Blowfish, Twofish, and Lorenz Hyperchaotic System. At last, the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image. In order to validate the enhanced data hiding performance of the EIS-DHT technique, a set of simulation analyses take place and the results are inspected interms of different measures. The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security.

Keywords


Cite This Article

APA Style
Ragab, M., Alshehri, S., Alhadrami, H.A., Kateb, F., Ashary, E.B. et al. (2022). Encryption with image steganography based data hiding technique in iiot environment. Computers, Materials & Continua, 72(1), 1323-1338. https://doi.org/10.32604/cmc.2022.024775
Vancouver Style
Ragab M, Alshehri S, Alhadrami HA, Kateb F, Ashary EB, Abdel-khalek S. Encryption with image steganography based data hiding technique in iiot environment. Comput Mater Contin. 2022;72(1):1323-1338 https://doi.org/10.32604/cmc.2022.024775
IEEE Style
M. Ragab, S. Alshehri, H.A. Alhadrami, F. Kateb, E.B. Ashary, and S. Abdel-khalek, “Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment,” Comput. Mater. Contin., vol. 72, no. 1, pp. 1323-1338, 2022. https://doi.org/10.32604/cmc.2022.024775



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1705

    View

  • 954

    Download

  • 0

    Like

Share Link