Loading [MathJax]/extensions/MathMenu.js
A Novel Image Steganography Method for Industrial Internet of Things Security | IEEE Journals & Magazine | IEEE Xplore

A Novel Image Steganography Method for Industrial Internet of Things Security


Abstract:

The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) brings new security threats by exposing secret and private data. Thus, ...Show More

Abstract:

The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) brings new security threats by exposing secret and private data. Thus, information security has become a major concern in the communication environment of IIoT and AI, where security and privacy must be ensured for the messages between a sender and the intended recipient. In this article, we propose a method called Harris hawks optimization-integer wavelet transform (HHO-IWT) for covert communication and secure data in the IIoT environment based on digital image steganography. The method embeds secret data in the cover images using a metaheuristic optimization algorithm called HHO to efficiently select image pixels that can be used to hide bits of secret data within integer wavelet transforms. The HHO-based pixel selection operation uses an objective function evaluation depending on the following two phases: exploitation and exploration. The objective function is employed to determine an optimal encoding vector to transform secret data into an encoded form generated by the HHO algorithm. Several experiments are conducted to validate the performance of the proposed method with respect to visual quality, payload capacity, and security against attacks. The obtained results reveal that the HHO-IWT method achieves higher levels of security than the state-of-the-art methods and that it resists various forms of steganalysis. Thus, utilizing this approach can keep unauthorized individuals away from the transmitted information and solve some security challenges in the IIoT.
Published in: IEEE Transactions on Industrial Informatics ( Volume: 17, Issue: 11, November 2021)
Page(s): 7743 - 7751
Date of Publication: 22 January 2021

ISSN Information:


I. Introduction

With the rapid development of the Industrial Internet of Things (IIoT) and the common use of artificial intelligence (AI) in the IIoT, several security threats have appeared in the present time [1], [2]. Today, many devices are connected to the Internet of Things (IoT) such as routers, refrigerators, webcams, smart locks, medical devices, and home automation hubs powered by AI technologies [3]. All these devices or gadgets are vulnerable to security threats such as hijacking, leaks, unsecured devices, and even home intrusion [4]. In this regard, privacy is among the most significant challenges facing the IIoT [5], [6]. In addition, the dramatic growth of data generated by industrial intelligence connecting billions of terminal devices on the IoT cloud imposes a heavy burden on communication and information systems [7], [8], making private and secret data vulnerable to serious situations [9]. Thus, techniques for securing sensitive data must be developed constantly. To preserve the confidentiality of data and keep unauthorized users far from the transmitted secret information, data hiding is one technique that has been introduced using encryption and steganography [10].

References

References is not available for this document.