Open Access
ARTICLE
Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment
1 Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
2 Centre of Artificial Intelligence for Precision Medicines, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
3 Department of Mathematics, Faculty of Science, Al-Azhar University, Naser City, 11884, Cairo, Egypt
4 Department of Pharmacy Practice, Faculty of Pharmacy, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
5 Department of Medical Laboratory Technology, Faculty of Applied Medical Sciences, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
6 Molecular Diagnostic Lab, King Abdulaziz University Hospital, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
7 Special Infectious Agent Unit, King Fahd Medical Research Center, King Abdulaziz University, Jeddah, 21589,Saudi Arabia
8 Electrical and Computer Engineering Department, Faculty of Engineering, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
9 Department of Mathematics, Faculty of Science, Taif University, Taif, 21944, Saudi Arabia
10 Department of Mathematics, Faculty of Science, Sohag University, Sohag, 82524, Egypt
* Corresponding Author: Mahmoud Ragab. Email: