IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography

Internet of Things (IoT) networks are considered the great challenging by emerging technologies that try to solve the problems in modern life, while securing the information still vital in different systems in research. A simple, but yet efficient, steganography based on the pixels characteristics of the cover image in the spatial domain is proposed in this paper. The cover image pixels are classified into highly smooth (HS) and Less Smooth (LS) domains to select the extra eligible pixels that occur in the HS region. The proposed classification scheme, named IoTSteg, achieves an embedment process different from other traditional steganography that use the total number of pixels. The performance of the developed new steganography is evaluated using the measures such as the Peak Signal to Noise Ratio (PSNR), Capacity-Distortion Trade-Off (CDTO) and Structural Similarity Index (SSIM). The results are compared with the schemes including the Statistical Features Maintained (SFM_A and SFM_B) and Difference Histogram Shifting (DHS). The secret test using 8000 bits and 4 cover images each size $$512\times 512$$ produced a PSNR value of 66.61, CDTO, and SSIM of 0.9998. The competence of the proposed scheme is determined under two embedding rates of 0.1 and 0.2 bit per pixel maintaining the high level of imperceptibility of the cover images. Detail analyses showed that the proposed steganography achieved excellent competence for the embedment procedure with two rates (HS and LS) to maintain the high level of the cover images imperceptibility.

[1]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[2]  Lewis Tseng,et al.  Blockchain-based database in an IoT environment: challenges, opportunities, and analysis , 2020, Cluster Computing.

[3]  Stephen Marshall,et al.  A New Cost Function for Spatial Image Steganography Based on 2D-SSA and WMF , 2021, IEEE Access.

[4]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[5]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Maoguo Gong,et al.  SAR Image Despeckling Based on Local Homogeneous-Region Segmentation by Using Pixel-Relativity Measurement , 2011, IEEE Transactions on Geoscience and Remote Sensing.

[7]  Ahmed Farouk,et al.  Secure Medical Data Transmission Model for IoT-Based Healthcare Systems , 2018, IEEE Access.

[8]  Joanne Hwan Jie Yin,et al.  Internet of Things: Securing Data Using Image Steganography , 2015, 2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS).

[9]  Mansoor Fateh,et al.  A New Method of Coding for Steganography Based on LSB Matching Revisited , 2021, Secur. Commun. Networks.

[10]  Ahmed Ghoneim,et al.  Secure Quantum Steganography Protocol for Fog Cloud Internet of Things , 2018, IEEE Access.

[11]  Ali Ismail Awad,et al.  A Novel Image Steganography Method for Industrial Internet of Things Security , 2021, IEEE Transactions on Industrial Informatics.

[12]  Bin Ma,et al.  Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.

[13]  Wei Hao,et al.  Reversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding , 2018 .

[14]  Mostafa Bellafkih,et al.  Novel QoE monitoring and management architecture with eTOM for SDN-based 5G networks , 2019, Cluster Computing.

[15]  Balachandra Pattanaik,et al.  Contrasting the performance metrics of discrete transformations on digital image steganography using artificial intelligence , 2021 .

[16]  Gautam Srivastava,et al.  Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments , 2021, IEEE Internet of Things Journal.

[17]  Ayman Ibaida,et al.  IoTSign: Protecting Privacy and Authenticity of IoT using Discrete Cosine Based Steganography , 2019, ArXiv.

[18]  Paolo Bellavista,et al.  A privacy-preserving cryptosystem for IoT E-healthcare , 2020, Inf. Sci..

[19]  Q. M. Jonathan Wu,et al.  Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.

[20]  Xiangyang Luo,et al.  A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients , 2020, J. Ambient Intell. Humaniz. Comput..

[21]  Zhangjie Fu,et al.  Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things , 2019, IEEE Access.

[22]  Abhishek Das,et al.  Multi-Image Steganography Using Deep Neural Networks , 2021, ArXiv.

[23]  David A. Clausi,et al.  Comparison and fusion of co‐occurrence, Gabor and MRF texture features for classification of SAR sea‐ice imagery , 2001 .

[24]  Li Li,et al.  Distortion less secret image sharing scheme for Internet of Things system , 2017, Cluster Computing.

[25]  Zhenxing Qian,et al.  On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.

[26]  Sing Bing Kang,et al.  Stereo for Image-Based Rendering using Image Over-Segmentation , 2007, International Journal of Computer Vision.

[27]  A. Lopes,et al.  A statistical and geometrical edge detector for SAR images , 1988 .

[28]  Xinpeng Zhang,et al.  Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition , 2018, IEEE Access.

[29]  Xingming Sun,et al.  Coverless Information Hiding Based on the Molecular Structure Images of Material , 2018 .

[30]  Licheng Jiao,et al.  Bag-of-Visual-Words Based on Clonal Selection Algorithm for SAR Image Classification , 2011, IEEE Geoscience and Remote Sensing Letters.

[31]  Pragya Gupta,et al.  Image Steganography Using LSB Substitution Facilitated by Shared Password , 2019 .

[32]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[33]  Xinpeng Zhang,et al.  Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[34]  Peter James Vial,et al.  Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research , 2019, Neurocomputing.

[35]  Liang Hu,et al.  A Reversible Steganography Method With Statistical Features Maintained Based on the Difference Value , 2020, IEEE Access.

[36]  R. S. Bichkar,et al.  A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator , 2018 .

[37]  Keping Yu,et al.  Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV , 2020, IEEE Transactions on Vehicular Technology.