Skip to main content
Erschienen in: Cluster Computing 3/2022

17.08.2021

IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography

verfasst von: Alaa Alarood, Nedal Ababneh, Mahmoud Al-Khasawneh, Majdi Rawashdeh, Mohammad Al-Omari

Erschienen in: Cluster Computing | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) networks are considered the great challenging by emerging technologies that try to solve the problems in modern life, while securing the information still vital in different systems in research. A simple, but yet efficient, steganography based on the pixels characteristics of the cover image in the spatial domain is proposed in this paper. The cover image pixels are classified into highly smooth (HS) and Less Smooth (LS) domains to select the extra eligible pixels that occur in the HS region. The proposed classification scheme, named IoTSteg, achieves an embedment process different from other traditional steganography that use the total number of pixels. The performance of the developed new steganography is evaluated using the measures such as the Peak Signal to Noise Ratio (PSNR), Capacity-Distortion Trade-Off (CDTO) and Structural Similarity Index (SSIM). The results are compared with the schemes including the Statistical Features Maintained (SFM_A and SFM_B) and Difference Histogram Shifting (DHS). The secret test using 8000 bits and 4 cover images each size \(512\times 512\) produced a PSNR value of 66.61, CDTO, and SSIM of 0.9998. The competence of the proposed scheme is determined under two embedding rates of 0.1 and 0.2 bit per pixel maintaining the high level of imperceptibility of the cover images. Detail analyses showed that the proposed steganography achieved excellent competence for the embedment procedure with two rates (HS and LS) to maintain the high level of the cover images imperceptibility.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kadhim, I.J., Premaratne, P., Vial, P.J., Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 299–326 (2019)CrossRef Kadhim, I.J., Premaratne, P., Vial, P.J., Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 299–326 (2019)CrossRef
2.
Zurück zum Zitat Shi, Y.-Q., Li, X., Zhang, X., Wu, H.-T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016)CrossRef Shi, Y.-Q., Li, X., Zhang, X., Wu, H.-T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016)CrossRef
3.
Zurück zum Zitat Tao, J., Li, S., Zhang, X., Wang, Z.: Towards robust image steganography. IEEE Trans. Circuits Syst. Video Technol. 29(2), 594–600 (2018)CrossRef Tao, J., Li, S., Zhang, X., Wang, Z.: Towards robust image steganography. IEEE Trans. Circuits Syst. Video Technol. 29(2), 594–600 (2018)CrossRef
4.
Zurück zum Zitat Wang, Z., Qian, Z., Zhang, X., Yang, M., Ye, D.: On improving distortion functions for jpeg steganography. IEEE Access 6, 74917–74930 (2018)CrossRef Wang, Z., Qian, Z., Zhang, X., Yang, M., Ye, D.: On improving distortion functions for jpeg steganography. IEEE Access 6, 74917–74930 (2018)CrossRef
5.
Zurück zum Zitat Hao, W., Xiang, L., Li, Y., Yang, P., Shen, X.: Reversible natural language watermarking using synonym substitution and arithmetic coding. Comput. Mater. Continua 55, 541 (2018) Hao, W., Xiang, L., Li, Y., Yang, P., Shen, X.: Reversible natural language watermarking using synonym substitution and arithmetic coding. Comput. Mater. Continua 55, 541 (2018)
6.
Zurück zum Zitat Li, F., Wu, K., Zhang, X., Yu, J., Lei, J., Wen, M.: Robust batch steganography in social networks with non-uniform payload and data decomposition. IEEE Access 6, 29912–29925 (2018)CrossRef Li, F., Wu, K., Zhang, X., Yu, J., Lei, J., Wen, M.: Robust batch steganography in social networks with non-uniform payload and data decomposition. IEEE Access 6, 29912–29925 (2018)CrossRef
7.
Zurück zum Zitat Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, 2013, pp. 59–68 Holub, V.,  Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, 2013, pp. 59–68
8.
Zurück zum Zitat Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Foren. Security 11(2), 221–234 (2015)CrossRef Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Foren. Security 11(2), 221–234 (2015)CrossRef
9.
Zurück zum Zitat Cui, Q., Zhou, Z., Fu, Z., Meng, R., Sun, X., Wu, Q.J.: Image steganography based on foreground object generation by generative adversarial networks in mobile edge computing with internet of things. IEEE Access 7, 90815–90824 (2019)CrossRef Cui, Q., Zhou, Z., Fu, Z., Meng, R., Sun, X., Wu, Q.J.: Image steganography based on foreground object generation by generative adversarial networks in mobile edge computing with internet of things. IEEE Access 7, 90815–90824 (2019)CrossRef
10.
Zurück zum Zitat Zhou, Z., Mu, Y., Wu, Q.J.: Coverless image steganography using partial-duplicate image retrieval. Soft Comput. 23(13), 4927–4938 (2019)CrossRef Zhou, Z., Mu, Y., Wu, Q.J.: Coverless image steganography using partial-duplicate image retrieval. Soft Comput. 23(13), 4927–4938 (2019)CrossRef
11.
Zurück zum Zitat Cao, Y., Zhou, Z., Sun, X., Gao, C.: Coverless information hiding based on the molecular structure images of material. Comput. Mater. Continua 54(2), 197–207 (2018) Cao, Y., Zhou, Z., Sun, X., Gao, C.: Coverless information hiding based on the molecular structure images of material. Comput. Mater. Continua 54(2), 197–207 (2018)
12.
Zurück zum Zitat Yin, J. H. J., Fen, G. M. , Mughal, F., Iranmanesh, V.: Internet of things: Securing data using image steganography. In: 2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), 2015, pp. 310–314 Yin, J. H. J., Fen, G. M. , Mughal, F.,  Iranmanesh, V.: Internet of things: Securing data using image steganography. In: 2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), 2015, pp. 310–314
13.
Zurück zum Zitat Lin, J.C.W., Srivastava, G., Zhang, Y., Djenouri, Y., Aloqaily, M.: Privacy preserving multi-objective sanitization model in 6g iot environments. IEEE Internet Things J. 1, 1 (2020)CrossRef Lin, J.C.W., Srivastava, G., Zhang, Y., Djenouri, Y., Aloqaily, M.: Privacy preserving multi-objective sanitization model in 6g iot environments. IEEE Internet Things J. 1, 1 (2020)CrossRef
14.
Zurück zum Zitat Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., Titouna, F.: A privacy-preserving cryptosystem for iot e-healthcare. Inf. Sci. 527, 493–510 (2019)MathSciNetCrossRef Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., Titouna, F.: A privacy-preserving cryptosystem for iot e-healthcare. Inf. Sci. 527, 493–510 (2019)MathSciNetCrossRef
15.
Zurück zum Zitat Feng, C., Yu, K., Aloqaily, M., Alazab, M., Lv, Z., Mumtaz, S.: Attribute-based encryption with parallel outsourced decryption for edge intelligent iov. IEEE Trans. Vehicular Technol. 69(11), 13784–13795 (2020)CrossRef Feng, C., Yu, K., Aloqaily, M., Alazab, M., Lv, Z., Mumtaz, S.: Attribute-based encryption with parallel outsourced decryption for edge intelligent iov. IEEE Trans. Vehicular Technol. 69(11), 13784–13795 (2020)CrossRef
16.
Zurück zum Zitat Elhoseny, M., Ramarez-Gonzailez, G., Abu-Elnasr, O.M., Shawkat, S.A., Arunkumar, N., Farouk, A.: Secure medical data transmission model for iot-based healthcare systems. IEEE Access 6, 20596–20608 (2018)CrossRef Elhoseny, M., Ramarez-Gonzailez, G., Abu-Elnasr, O.M., Shawkat, S.A., Arunkumar, N., Farouk, A.: Secure medical data transmission model for iot-based healthcare systems. IEEE Access 6, 20596–20608 (2018)CrossRef
17.
Zurück zum Zitat Abuadbba, S., Ibaida, A., Khalil, I.: Iotsign: Protecting privacy and authenticity of iot using discrete cosine based steganography, resreport, arXiv:1911.00604 (2019) Abuadbba, S., Ibaida, A., Khalil, I.: Iotsign: Protecting privacy and authenticity of iot using discrete cosine based steganography, resreport, arXiv:​1911.​00604 (2019)
18.
Zurück zum Zitat Li, L., Hossain, M.S., El-Latif, A.A.A., Alhamid, M.F.: Distortion less secret image sharing scheme for internet of things system. Clust. Comput. 22, 2293–2307 (2019)CrossRef Li, L., Hossain, M.S., El-Latif, A.A.A., Alhamid, M.F.: Distortion less secret image sharing scheme for internet of things system. Clust. Comput. 22, 2293–2307 (2019)CrossRef
19.
Zurück zum Zitat El-Latif, A.A.A., Abd-El-Atty, B., Hossain, M.S., Elmougy, S., Ghoneim, A.: Secure quantum steganography protocol for fog cloud internet of things. IEEE Access 6, 10332–10340 (2018)CrossRef El-Latif, A.A.A., Abd-El-Atty, B., Hossain, M.S., Elmougy, S., Ghoneim, A.: Secure quantum steganography protocol for fog cloud internet of things. IEEE Access 6, 10332–10340 (2018)CrossRef
20.
Zurück zum Zitat Lewis Tseng, A.X.Y., Otoum, S., Aloqaily, M., Jararweh, Y.: Blockchain-based database in an iot environment: challenges, opportunities, and analysis. Clust. Comput. 23, 1 (2020)CrossRef Lewis Tseng, A.X.Y., Otoum, S., Aloqaily, M., Jararweh, Y.: Blockchain-based database in an iot environment: challenges, opportunities, and analysis. Clust. Comput. 23, 1 (2020)CrossRef
21.
Zurück zum Zitat Bhattacharyya, S., Hassanien, A., Gupta, D., Khanna, A., Pan, I.: Image steganography using lsb substitution facilitated by shared password. In: International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, vol 55, (2019) Bhattacharyya, S., Hassanien, A., Gupta, D., Khanna, A., Pan, I.: Image steganography using lsb substitution facilitated by shared password. In: International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, vol 55, (2019)
22.
Zurück zum Zitat Mansoor, F., Mohsen, R., Yasser, I.: A new method of coding for steganography based on lsb matching revisited, Security and Communication Networks (2021) Mansoor, F., Mohsen, R.,  Yasser, I.: A new method of coding for steganography based on lsb matching revisited, Security and Communication Networks (2021)
23.
Zurück zum Zitat Zhenkun, B., Yanqing, G., Xiaolong, L., Yi, Z., Meng, X., Xiangyang, L.: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J. Ambient Intell. Hum. Comput. 11, 1889–1901 (2020)CrossRef Zhenkun, B., Yanqing, G., Xiaolong, L., Yi, Z., Meng, X., Xiangyang, L.: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J. Ambient Intell. Hum. Comput. 11, 1889–1901 (2020)CrossRef
24.
Zurück zum Zitat Pratik, S., B. R.: A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: International Conference on Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 632. Springer, Singapore, 2018, pp. 119–129 Pratik, S., B. R.: A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: International Conference on Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 632. Springer, Singapore, 2018, pp. 119–129
26.
Zurück zum Zitat Xie, G., Ren, J., Marshall, S., Zhao, H., Li, H.: A new cost function for spatial image steganography based on 2d-ssa and wmf. IEEE Access 9, 30604–30614 (2021)CrossRef Xie, G., Ren, J., Marshall, S., Zhao, H., Li, H.: A new cost function for spatial image steganography based on 2d-ssa and wmf. IEEE Access 9, 30604–30614 (2021)CrossRef
27.
Zurück zum Zitat Das, A., Singh Wahi, J., Anand, M., Rana, Y.: Multi-image steganography using deep neural networks, Technical report eprint arXiv:2101.00350 (2021) Das, A.,  Singh Wahi, J.,  Anand, M.,  Rana, Y.: Multi-image steganography using deep neural networks, Technical report eprint arXiv:​2101.​00350 (2021)
29.
Zurück zum Zitat Holub, V., Fridrich, J.:Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), IEEE, 2012, pp. 234–239 Holub, V., Fridrich, J.:Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), IEEE, 2012, pp. 234–239
30.
Zurück zum Zitat Pevnỳ, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: International Workshop on Information Hiding, Springer, Berlin, 2010, pp. 161–177 Pevnỳ, T.,  Filler, T.,  Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: International Workshop on Information Hiding, Springer, Berlin, 2010, pp. 161–177
31.
Zurück zum Zitat Zitnick, C.L., Kang, S.B.: Stereo for image-based rendering using image over-segmentation. Int. J. Comput. Vis. 75(1), 49–65 (2007)CrossRef Zitnick, C.L., Kang, S.B.: Stereo for image-based rendering using image over-segmentation. Int. J. Comput. Vis. 75(1), 49–65 (2007)CrossRef
32.
Zurück zum Zitat Clausi, D.A.: Comparison and fusion of co-occurrence, gabor and mrf texture features for classification of sar sea-ice imagery. Atmosphere-Ocean 39(3), 183–194 (2001)CrossRef Clausi, D.A.: Comparison and fusion of co-occurrence, gabor and mrf texture features for classification of sar sea-ice imagery. Atmosphere-Ocean 39(3), 183–194 (2001)CrossRef
33.
Zurück zum Zitat Feng, J., Jiao, L., Zhang, X., Yang, D.: Bag-of-visual-words based on clonal selection algorithm for sar image classification. IEEE Geosci. Remote Sens. Lett. 8(4), 691–695 (2011)CrossRef Feng, J., Jiao, L., Zhang, X., Yang, D.: Bag-of-visual-words based on clonal selection algorithm for sar image classification. IEEE Geosci. Remote Sens. Lett. 8(4), 691–695 (2011)CrossRef
34.
Zurück zum Zitat Feng, H., Hou, B., Gong, M.: Sar image despeckling based on local homogeneous-region segmentation by using pixel-relativity measurement. IEEE Trans. Geosci. Remote Sens. 49(7), 2724–2737 (2011)CrossRef Feng, H., Hou, B., Gong, M.: Sar image despeckling based on local homogeneous-region segmentation by using pixel-relativity measurement. IEEE Trans. Geosci. Remote Sens. 49(7), 2724–2737 (2011)CrossRef
35.
Zurück zum Zitat Touzi, R., Lopes, A., Bousquet, P.: A statistical and geometrical edge detector for sar images. IEEE Trans. Geosci. Remote Sens. 26(6), 764–773 (1988)CrossRef Touzi, R., Lopes, A., Bousquet, P.: A statistical and geometrical edge detector for sar images. IEEE Trans. Geosci. Remote Sens. 26(6), 764–773 (1988)CrossRef
36.
Zurück zum Zitat Li, T., Li, H., Hu, L., Li, H.: A reversible steganography method with statistical features maintained based on the difference value. IEEE Access 8, 12845–12855 (2020)CrossRef Li, T., Li, H., Hu, L., Li, H.: A reversible steganography method with statistical features maintained based on the difference value. IEEE Access 8, 12845–12855 (2020)CrossRef
Metadaten
Titel
IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography
verfasst von
Alaa Alarood
Nedal Ababneh
Mahmoud Al-Khasawneh
Majdi Rawashdeh
Mohammad Al-Omari
Publikationsdatum
17.08.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 3/2022
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03383-4

Weitere Artikel der Ausgabe 3/2022

Cluster Computing 3/2022 Zur Ausgabe

Premium Partner