scispace - formally typeset
Open AccessJournal ArticleDOI

SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT

Reads0
Chats0
TLDR
In this article, the authors proposed an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique.
Abstract
Internet of Things (IoT) is a domain where the transfer of big data is taking place every single second. The security of these data is a challenging task; however, security challenges can be mitigated with cryptography and steganography techniques. These techniques are crucial when dealing with user authentication and data privacy. In the proposed work, a highly secured technique is proposed using IoT protocol and steganography. This work proposes an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique. Thereafter a Salp Swarm Optimization Algorithm (SSOA) based adaptive embedding process is proposed to increase the payload capacity by setting different parameters in the steganographic embedding function for edge and smooth blocks. Here the SSOA algorithm is used to localize the edge and smooth blocks efficiently. Then, the hybrid Fuzzy Neural Network with a backpropagation learning algorithm is used to enhance the quality of the stego images. Then these stego images are transferred to the destination in the highly secured protocol of IoT. The proposed steganography technique shows better results in terms of security, image quality, and payload capacity in comparison with the existing state of art methods.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Experimental, computational analysis of Butein and Lanceoletin for natural dye-sensitized solar cells and stabilizing efficiency by IoT

TL;DR: In this paper, an IoT proficiency in restoring the fresh condition of natural dye-sensitized solar cells once again by refilling the photo-sensor from its dye-degraded condition is conceived.
Journal ArticleDOI

Development of image recognition software based on artificial intelligence algorithm for the efficient sorting of apple fruit

TL;DR: In this article, a low budget alternative solution for intelligent grading and sorting of apple fruit employing the deep learning-based approach was proposed. But the results show that the sorting image recognition system can successfully sort apples according to the perimeter characteristics.
Journal ArticleDOI

Research on image text recognition based on canny edge detection algorithm and k-means algorithm

TL;DR: In this article, the authors used canny algorithm to process edge detection of text, and k-means algorithm for cluster pixel recognition to improve the accuracy of image text recognition effectively.
Journal ArticleDOI

Review and potential for artificial intelligence in healthcare

TL;DR: In this paper, a detailed information of the different segmentation methods along with their merits and demerits is provided. And the quantitative analysis of existing techniques and the performance evaluation is done and detailed.
Journal ArticleDOI

Artificial intelligence-based Kubernetes container for scheduling nodes of energy composition

TL;DR: The KCSS presented in this study provides multicriteria node selection based on artificial intelligence in terms of decision making systems thereby giving the scheduler a broad picture of the cloud's condition and the user's requirements.
References
More filters
Journal ArticleDOI

Salp Swarm Algorithm

TL;DR: The qualitative and quantitative results prove the efficiency of SSA and MSSA and demonstrate the merits of the algorithms proposed in solving real-world problems with difficult and unknown search spaces.
Proceedings ArticleDOI

Image Quality Metrics: PSNR vs. SSIM

Alain Horé, +1 more
TL;DR: A simple mathematical relationship is derived between the peak-signal-to-noise ratio and the structural similarity index measure which works for various kinds of image degradations such as Gaussian blur, additive Gaussian white noise, jpeg and jpeg2000 compression.
Journal ArticleDOI

Secure Medical Data Transmission Model for IoT-Based Healthcare Systems

TL;DR: The proposed hybrid security model for securing the diagnostic text data in medical images proved its ability to hide the confidential patient’s data into a transmitted cover image with high imperceptibility, capacity, and minimal deterioration in the received stego-image.
Journal ArticleDOI

Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’

TL;DR: It is shown that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications, and improvements and security patches are proposed that attempt to fix the susceptibilities of his scheme.
Journal ArticleDOI

b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET

TL;DR: A secure scheme that can achieve the security and privacy requirements, and overcome the weaknesses of SPECS is provided, and the efficiency merits of the scheme are shown through performance evaluations in terms of verification delay and transmission overhead.
Related Papers (5)