I. Introduction
With the rapid development of the Industrial Internet of Things (IIoT) and the common use of artificial intelligence (AI) in the IIoT, several security threats have appeared in the present time [1], [2]. Today, many devices are connected to the Internet of Things (IoT) such as routers, refrigerators, webcams, smart locks, medical devices, and home automation hubs powered by AI technologies [3]. All these devices or gadgets are vulnerable to security threats such as hijacking, leaks, unsecured devices, and even home intrusion [4]. In this regard, privacy is among the most significant challenges facing the IIoT [5], [6]. In addition, the dramatic growth of data generated by industrial intelligence connecting billions of terminal devices on the IoT cloud imposes a heavy burden on communication and information systems [7], [8], making private and secret data vulnerable to serious situations [9]. Thus, techniques for securing sensitive data must be developed constantly. To preserve the confidentiality of data and keep unauthorized users far from the transmitted secret information, data hiding is one technique that has been introduced using encryption and steganography [10].