• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment

    2022-08-24 12:56:28MahmoudRagabSamahAlshehriHaniAlhadramiFarisKatebEhabBahaudienAsharyandAbdelkhalek9
    Computers Materials&Continua 2022年7期

    Mahmoud Ragab, Samah Alshehri, Hani A.Alhadrami, Faris Kateb,Ehab Bahaudien Asharyand S.Abdel-khalek9,0

    1Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University,Jeddah, 21589, Saudi Arabia

    2Centre of Artificial Intelligence for Precision Medicines, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

    3Department of Mathematics, Faculty of Science, Al-Azhar University, Naser City, 11884, Cairo, Egypt

    4Department of Pharmacy Practice, Faculty of Pharmacy, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

    5Department of Medical Laboratory Technology, Faculty of Applied Medical Sciences, King Abdulaziz University,Jeddah, 21589, Saudi Arabia

    6Molecular Diagnostic Lab, King Abdulaziz University Hospital, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

    7Special Infectious Agent Unit, King Fahd Medical Research Center, King Abdulaziz University, Jeddah, 21589,Saudi Arabia

    8Electrical and Computer Engineering Department, Faculty of Engineering, King Abdulaziz University, Jeddah, 21589,Saudi Arabia

    9Department of Mathematics, Faculty of Science, Taif University, Taif, 21944, Saudi Arabia

    10Department of Mathematics, Faculty of Science, Sohag University, Sohag, 82524, Egypt

    Abstract: Rapid advancements of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) pose serious security issues by revealing secret data.Therefore, security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time.Practically, AI techniques can be utilized to design image steganographic techniques in IIoT.In addition, encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access.In order to accomplish secure data transmission in IIoT environment, this study presents novel encryption with image steganography based data hiding technique (EISDHT) for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization (QBWO) to competently choose the pixel values for hiding secrete data in the cover image.In addition, the multi-level discrete wavelet transform (DWT) based transformation process takes place.Besides, the secret image is divided into three R, G, and B bands which are then individually encrypted using Blowfish, Twofish, and Lorenz Hyperchaotic System.At last, the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.In order to validate the enhanced data hiding performance of the EIS-DHT technique, a set of simulation analyses take place and the results are inspected interms of different measures.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security.

    Keywords: IIoT; security; data hiding technique; image steganography;encryption; secure communication

    1 Introduction

    Industry 4.0 is the 4th generation industrial revolution that has dramatically increased from the Internet of Things (IoT) to the industrial IoT (IIoT).Such innovations have given a solution to novel problems for the industrial sectors.IoT enables linking a number of devices at once more convenient with no requirements of human interference [1].IIoT is employed in the supply chain, monitoring system, management, and manufacturing process.It handles the connectivity of machines, management systems, smart factories, and another streamlined business operation.It employs more precise and sensitive sensor nodes when compared to IoT, comprising further location aware technology on the supply chain management [2].Currently, smart device is employed in various field of industries,like sensor nodes for monitoring factories, drones for monitoring oil pipelines, tractors in agriculture,and water treating equipment.Smart cities might be an integration of commercial IoT & IIoT.Fig.1 depicts the overview of IIoT [3].

    Figure 1: Overview of IIoT

    Industry 4.0 is based on the number of new technologies.Several commercial enterprises near this reality are set on industry 4.0.It can be being utilized for building business intelligence, data management systems, realtime analyses, and scientific research [4].Image sensor based solution helps in improving work process and maintenance securely.Moreover, they considerably enhance the quality of productivity.Computer vision technologies are employed for the visual quality control of production and continuous monitoring procedures.Increasingly state-of-the-art sensors and cameras are being employed in the industry.Also, this development brought additional problems, like absence of built-in security.Such problems request secure and safe devices and applications without human interference.Cyberattacks against automation in the IIoT environments have essential impacts [5].They could disturb the manufacturing procedure, and secure information might be lost.

    The direct solution is to encrypt the information with standard encryption tool beforehand outsourcing.Although there are several high and robust secured data preserving methods, and there is an advancement to make sure the robustness and security of the approach regarding its efficiency[6].Image steganography has established an extensive application in the fields of mobile communication, content, online voting systems, personalized secure image retrieval, privacy of medical records, and surveillance system [7,8].Security is the major concern in present times, for hiding a sensitive piece of information fromhackers and intruders becomes a tedious process [9].The researcher didn’t pay much attention to the problems like, when cover image dimension isn’t appropriate for forming an image block to embed, next how to execute data hiding and either this technique is prone to different kinds of stego attack.Hence, further means should be used like modification to lesser number of pixels or transform coefficient, employ encrypted form of hidden message to be embedded so on.Still, several works in these fields are needed for choosing appropriate tradeoffs among the efficacy calculation measures like payload capacity, security, and imperceptibility

    Xiang et al.[10] proposed a privacy preserving tucker train decomposition through blockchain based encrypted IIoT information.Especially, employ blockchain methods for enabling IIoT data provider for securely and reliably allocate its information by encrypting them beforehand recording them blockchain.They utilize tucker train (TT) concept for building an effective TT decomposition according to gradient descent which greatly decreases the number of components to be upgraded at the time of Tucker decomposition.This study exploits the huge resource of clouds and fogs for implementing an effective privacy preserving tucker train decomposition system.Feng et al.[11]proposed a robust cramer shoup delay optimized fully homomorphic encryption (RCSD-DOFHE)approach.This technique consists of 3 stages.Initially, minimalize the transmission time and overhead,Kullback Leibler divergences are employed in the RCSD method.Then, to minimalize the network delay and data latency, DOFHE method is proposed.In this study, delivery delay is evaluated among the IIoT device signal and base station (BS).Lastly, privacy preserving DOFHE and RCSD were introduced for privacy preserved secure data transmission.Li et al.[12] focus on the secured method of image data on cloud servers.The experimental result and security analyses demonstrate the effectiveness and security of this system.

    In Xia et al.[13], a new detection method of encrypted traffic is presented for manually extracting the features for effective traffic classification, i.e., depending on spatio-temporal features.It consists of the classification and preprocessing phases.In preprocessing stage, raw traffic information is treated using sampling, vectorization, and flow segmentation, so on.Lin et al.[14] proposed permissioned private blockchain based solutions for securing the image when encrypting.In this system, the cryptographic pixel value of images is kept on the blockchain, ensuring the security and privacy of image data.Depending on the number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and data entropy analyses, they calculate the strength of presented image encryption method cipher regarding different attacks.

    Khan et al.[15] proposed 3 data hiding methods to protect transmission in crucial IoT framework using steganography, in which RGB image is applied as a carrier for the data.They examine experimentally and mathematically.Mathematically, they demonstrate that the adversary could not forecast the real data using analyses.Bairagi et al.[16] proposed an effective data hiding system on the basis of multi-dimension mini SuDoKu reference matrix (RM).The presented RM has higher difficulty and could efficiently enhance the security of data hiding.Moreover, this work determines a range locator function that could considerably enhance the embedding efficacy of multi-dimension RM.

    Horng et al.[17] proposed an interpolation-based reversible data hiding (IRDH) system which enhances Lee and Huang’s scheme and Malik et al.’s system by integrating its embedding methods and the optimal pixel adjustment process (OPAP) rises the embedding capability and the visual quality of the systems.In this proposed work, they begin by stretching the size of the original image with the present enhanced neighbor mean interpolation (ENMI) interpolation approach later the data is embedded to the interpolated pixel with this new embedding technique which is based on the intensity of the pixel and the maximized variance value.Hassan et al.[18] proposed a technique named Harris hawks optimization-integer wavelet transform (HHO-IWT) for hidden data and transmission in the IIoT environments on the basis of digital image steganography.The technique embedded hidden information in the cover imageswith a Meta heuristic optimization method namedHHOfor effectively selecting image pixels which are employed for hiding bits of hidden information within integer wavelet transform.The HHO based pixel election process utilizes an objective function calculation based on succeeding 2 stages: exploration and exploitation.The objective functions are used for determining optimum encoding vectors to convert hidden information to an encoded version made using HHO approach.

    This study presents novel encryption with image steganography based data hiding technique (EISDHT) for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization (QBWO) for optimal pixel selection to hide secrete data in the cover image.In addition, the multi-level discrete wavelet transform (DWT) based transformation process takes place.Besides, the secret image is divided as to three R, G, and B bands which are then individually encrypted using Blowfish, Twofish, and Lorenz Hyperchaotic System.Finally, the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.For examining the improved data hiding performance of the EIS-DHT technique, a set of experimentation were carried out and the results are examined based on distinct metrics.

    2 The Proposed EIS-DHT Technique

    In this study, an efficient EIS-DHT technique has been developed for secure communication in IIoT environment.The presented model involves different stages of operations such as channel extraction, decomposition, optimal pixel selection, encryption, and embedding process.Firstly, the input cover image is divided into RGB channels to better understand the color space.Next to that, the multilevel DWT based transformation process takes place to generate a set of vector coefficients to determine the location of the pixels in the cover image.Besides, the optimal pixel selection process is carried out using the QBWO algorithm over the encrypted R, G, and B channels.On the other hand,the channel separation and encryption of the three channels of the secret image also take place.The encryption of the three R, G, and B channels takes place by the use of three encryption techniques.Finally, the encrypted images are embedded as to optimal pixel locations of the cover image and generate the stego image for secure data transmission.Fig.2 illustrates the overall process of proposed EIS-DHT model.

    2.1 Multi-level DWT Based Decomposition Process

    At the initial stage, the multi-level DWT technique is applied to decompose the image into diverse sets of vector coefficients.The 2D-DWTis themost significant spatial to frequency domain conversion method.The partition is made with two processes namely, vertical and horizontal processes.The horizontal function decomposes an image to High (H) and Low (L) frequency bands.The RGB cover image is divided on the basis of HH, LH, LL, and HL bands for finding pixel position.Later,the vertical function decomposes the image to HH1LL1, LH1, and HL1, frequency bands.For next decompositions, LL1band decompose to LL2, LH2, HL2, and HH2, where the image size represents‘M * N’.Initially, to down sample and filter the image, the horizontal decomposition decreases an image toM×size.

    Figure 2: Overall process of EIS-DHT model

    The vertical one decrease down-sample the images to.The single level decomposition outcomes are done using Eq.(1)

    Whereas‘C1’,‘C2’,‘C3’,and‘C4’denotes coefficient numbers of decomposing frequency band.‘C1’denotes low level frequency band i.e., additionally decomposing for extracting subbands as provided under as [19]:

    The coefficient in lower frequency bandis over decomposed, since it produces the edge and texture interrelated details of an image.The following decompositions are executed on low band LL1.The decomposition formation of frequency bands is presented by:

    2.2 Optimal Pixel Selection (OPS) Using QBWO Algorithm

    The multi-level DWT transformed image offers a set of vector coefficients and the optimal pixel values are elected by the use of QBWO algorithm.The BWO technique starts with a primary spider’s population, therefore, all the spiders are referred to as feasible solutions.In pairs, these primary spiders are obvious for reproducing the novel generation.As premature as 11 days following being laid, during the egg sacs, the spiderling performs.In order to various days, it can be alive composed on parental web; the sibling cannibalism has been exposed at that period.Consequently, it takes offmy life focused on the wind.

    With the intention of resolving an optimized problem, this challenge of variables values must set up an appropriate structure for current issue solution.In BWO algorithm, a feasible solution to all problems is allocated to Black widow spider.All the black widow spider displays the problem variables value [20].During theNvar- optimized problem, the widow signified as array of 1×Nvarreferring the problem solution and it can be demonstrated as under:

    All the variable values (y1,y2,...yNvar) signifies the floating-point number.The fitness of widow is reached utilizing assessment of fitness methodfat a widow of (y1,y2,...yNvar).Therefore

    The candidate widow matrix of sizeNpop×Nvaris generated with primary spider’s population for establishing the optimized method.Next, by mating, couples of parents randomly were elected for performing the procreating method, where the female black widow eats the male during or succeeding to that.

    Since they are self-governing, it starts formating with the purpose of replicating a new generation, in correspond, obviously, all the couple mates in their web, individually from the options.During all the mating, nearly a thousand eggs were created in the real-world; but, eventually, some spider babies have been continued that is burly.Currently, during this manner with the purpose of repeating, an array called as alpha necessity more created giving widow array with random numbers including, afterward offspring has been created by developing α with succeeding to Eq.(6) wherey1andy2represents the parentsz1andz2are offspring.

    This process is reiterated for,if the randomly elected numbers are essential not be reproduced.Eventually, the mother as well as children are continuous as array and considered utilizing its fitness function, at the current reliable with cannibalism rating; some of optimum those are comprised in the presently formed population.These steps are provided to every couple.

    At this point, three types of cannibalism are present.A primary one has been sexual cannibalism, where during or succeeding for mating, the male black widow has been eaten by female.During this technique, distinguish the male as well as female are predictably utilizing its fitness values.More than one group has been sibling cannibalism where the burly spiderlings utilize their smaller siblings.During this technique, the CR is set reliable that survivor number has been obvious.In some situations, the third kind of cannibalism are often experiential which the child spider utilizes its mother.

    During the mutation phase,Mutepopdemonstrates the number of individualswas elected arbitrarily in the population.During the array, all elected solutions randomly swap 2 elements.Utilizing the mutation rateMutepopwas calculated.Same as other evolutionary manners, 3 stop conditions are dealt with: i) an existing number of iterations, ii) a few iterations,compliance ofno change in value of fitness to optimum widow, iii) obtaining to specific level of accuracy.

    The QBWO algorithm is designed by the incorporation of quantum computing into the BWO algorithm.Quantum Computingis a new kind of processing model which accepts the concept relevant to quantum modules like quantum entanglement, state superposition, and measurements.The basic component of quantum computing is qubit.The 2 fundamental conditions |0〉and |1〉make a qubit which is stated by linear integration as given by

    where |α|2denotes the likelihood of observing condition |0〉, |β|2and |1〉, where |α|2+ |β|2= 1.A quantum is comprised ofnqubits.Due to the quantum superposition nature, each quantum has 2npossible values.A set of n qubits quantum is represented by

    Quantum gates could change the qubit states like rotation gate, NOT gate, Hadamard gate, and so on.The rotation gate is determined by mutation function to make quanta approach an optimum solution and finally, detect global optimum solutions.The rotation gate is determined by

    △θd=△×S(αd,βd),△θdrepresents the rotation angle of qubit, when△andS(αd,βd) denotes direction and size of rotations, respectively.The QBWO algorithm derives an objective function depending upon the fitness function.The major goal of the QBWO algorithm is to design an image steganography technique in such a way that the mean square error (MSE) gets minimized and peak signal to noise ratio (PSNR) gets maximized.It can be denoted by

    I vividly1 recall entering their driveway and being overwhelmed by the size of their home, the beauty of the furnishings, the manicured grounds and the pecan orchard2

    The preferable maximum and minimum values are attained by the use of QBWO algorithm.

    2.3 Encryption and Embedding Process

    During the encryption process, the secret image gets converted into three elements namely R, G, and B.They are separately encrypted by the Blowfish, Twofish, and Lorenz Hyperchaotic System.Finally, the encryptedRGB elements get embed into the optimal chosen pixel points in the cover image to ensure security.

    2.3.1 R Band Encryption Using Blowfish

    The R band of the secret image is primarily encrypted by the use of Blowfish technique.The blowfish is a symmetric block cipher which encrypts data from 8-byte blocks.The Blowfish technique contains 2 parts: data encryption as well as key expansion.The key expansion connections a variablelength key as a maximum of 64 bytes (512 bits) as to arrays of subkeys totaling 4168 bytes [21].

    A huge amount of subkeys is utilized by Blowfish technique where these keys were pre-computed previously some data encrypted/decrypted.TheP-array have 1832-bit subkeys.There are also 4 32-bitS-boxes with 256 entries.

    The point of view behind the Blowfish is the simplicity of this technique planned and this produces simplicity for implementation.Utilizing a streamlined Feistel network, an easyS-Box exchange and easyP-box substitution creates the body of Blowfish as easy as feasible, but preserving the chosen encryption features of the framework.All bits of xL have been utilized only as input for oneSbox that is importantly improved the technique against different attacks.The functionFis given as follows:

    Divide XL into 4 eight-bit quarters:a,b,c, andd.Afterward,

    2.3.2 G Band Encryption Using Blowfish

    Then, the G band image is encrypted by the Twofish technique.It is a symmetric block cipher;a single key is employed for decryption and encryption.It has a block size of 128 bits and accepts a key of some length upto 256 bits.(National Institute of Standards and Technology (NIST) needed the approach for accepting 128-, 192-, and 256-bit keys.) It is fast on 32 and 8-bits CPU (embedded chips, smart cards,), and in hardware.Also, it is flexible; it is employed in the network application in which keys are altered continuously and in applications where there is slightly or no read only memory(ROM) and random access memory (RAM) accessible.Twofish is a Feistel network.It implies that in all the rounds, half of the text blocks are transmitted with an F function, and later XORed using another half of the text blocks.Data encryption standard (DES) is a Feistel network.Blowfish (other Schneier approach) is a Feistel network.Five of the advanced encryption standard (AES) submission is a Feistel network.Feistel networks have been studied long in cryptography, and we all know how they work.In all rounds of Twofish, 2 thirty two bit words (the 2 vertical lines with the left) serves as an input to the F function.All the words are divided into 4 bytes.These 4 bytes are transmitted via 4 distinct key based S-box.The 4 output bytes (the S-box has eight bit output and input) are integrated with a Maximum Distance Separable (MDS) matrix and integrated with thirty two-bit words.Next the 2 thirty two-bit words are integrated with a PHT, included in 2 round sub-keys, later XORed using the right half of the text.Also, it consists of 2 one-bit rotations, one after and before the XOR.As well,Twofish has somewhat named“postwhitening”&“prewhitening”; further subkeys are XORed to the text block beforehand of the initial and final rounds.The approach could seem random, however, they performed all for the purpose.Not anything is in Twofish accidentally.Everything in the approach cannot describe.The results are mean algorithm, lean i.e., simple and stronger.

    All steps of the round functions are bijective.Specifically, each output is probable.We have seen numerous attacks against cipher that does not do not pose these properties to add it.The round functions mix-up the operation from distinct arithmetical sets: MDSmatrix, S-box substitution, along with Galois field (GF) 2 (known as XOR), 1-bit rotations, and addition in GF (232).This makes the approach complex to attack arithmetically.The key based S-boxes are made to be strong against the 2 bigger attacks of the earlier 1990s—linear and differential cryptanalyses—and strong against any unknown attacks that occur.Numerous approach designer optimizes their design against certain attacks, without considering resistance against the unknown.This designed philosophy was quite distinct: good enough nastiness to (hopefully) resists unknown attacks and enough against known attacks.Key based S-boxes weren’t randomly elected, since they are in Blowfish.Rather, they carefully design S-box construction rules and verified them with each probable 128-bit keys (and a subset of probable longer keys) to ensure that each S-box is quite stronger.This method allows to integration of the strong S-box, strength of fixed with the strength of secret S-box.Also, Twofish has no weaker keys, since Blowfish ensures in decreased round variant.

    2.3.3 B Band Encryption Using Blowfish

    Next, the encryption of‘B’band takes place by the use of Lorenz Hyperchaotic system.The chaotic methods are extremely utilized in the data encryption field as its primary value and parameter were sensitive as well as pseudorandom.The low-dimension chaotic models are small key space and weak pseudorandom.So, several researchers are enhanced on low-dimension chaotic models by rising chaotic techniques to superior dimension.These enhanced high-dimension chaotic techniques are named hyperchaotic schemes.For generating the 4 pseudorandom orders which are needed by the encryption technique, it can implement the Lorenz hyperchaotic method for encrypting technique[22].The Lorenz hyperchaotic scheme was explained as follows.

    wherea,b,c, andrrefers the 4 parameters of Lorenz hyperchaotic model.Ifa= 10,b= 8/3,c= 28,and -1.52≤r≤0.06, the Lorenz hyperchaotic method is a hyperchaotic state.The hyperchaotic technique was restated by utilizing Runge-Kutta approach ifr= -1.

    3 Performance Validation

    The performance of the EIS-DHT technique is investigated using a benchmark USC-SIPI image dataset [23].It contains a numerous collection of digital images with varying sizes of 256 * 256, 512* 512, and 1024 * 1024 pixels.The results are investigated interms of PSNR, structural similarity(SSIM),MSE, quality index (QI), embedding capacity, and execution time.Fig.3 illustrates the sample images [24].

    Figure 3: Sample images

    Tab.1 and Fig.4 demonstrate the results analysis of the EIS-DHT technique under different images (256 * 256) pixels.The table values denoted that the effective performance of the EIS-DHT technique with the higher PSNR, SSIM, andQI values along with lowerMSE.For instance, with Lena cover image, the EIS-DHT technique has gained an increased PSNR of 56.50 dB, SSIM of 0.9971, and QI of 1.000 along with the reduced MSE of 0.1456.Simultaneously, with Baboon cover image, the EIS-DHT method has reached an improved PSNR of 56.76 dB, SSIM of 0.9992, and QI of 1.000 along with the lower MSE of 0.1372.Besides, with Barbara cover image, the EIS-DHT method has reached a maximum PSNR of 56.60 dB, SSIM of 0.9987, and QI of 1.000 along with the decreased MSE of 0.1423.Also, with Airplane cover image, the EIS-DHT technique has gained a higher PSNR of 55.95 dB, SSIM of 0.9979, and QI of 1.000 along with the reduced MSE of 0.1652.Moreover, with Boat cover image, the EIS-DHT methodology has obtained an increased PSNR of 55.70 dB, SSIM of 0.9995, and QI of 1.000 along with the minimal MSE of 0.1752.

    Table 1: Performance of proposed EIS-DHT method on different images (256 * 256)

    Figure 4: Result analysis of EIS-DHT model with different measures

    Tab.2 and Fig.5 showcases the embedding capacity of the EIS-DHT technique under different test images.The EIS-DHT technique has resulted in effective performance with the maximum embedding capacities on all the applied images.For instance, the EIS-DHT technique has achieved an embedding capacity of 16.34% on the‘Lena’image.Furthermore, the EIS-DHT manner has reached an embedding capacity of 15.58% on the‘Baboon’image.In line with, the EIS-DHT manner has obtained an embedding capacity of 16.33% on the‘Barbara’image.Along with that, the EIS-DHT approach has gained an embedding capacity of 16.40% on the‘Aeroplane’image.Eventually, the EISDHT algorithm has reached an embedding capacity of 17.37% on the‘Boat’image.

    Table 2: Embedding capacity analysis of EIS-DHT method

    Tab.3 and Fig.6 investigates the execution time analysis of the EIS-DHT technique on different test images.The results ensured that the EIS-DHT technique has demonstrated effective performance with a reduced embedding, extraction, and total time.For instance, on the test ‘Lena’ image, the EISDHTapproach has obtained a lower embedding, extraction, and total time of 33.75, 17.82, and 51.57 s respectively.Concurrently, on the test ‘Barbara’ image, the EIS-DHT approach has reached a lesser embedding, extraction, and total time of 34.56, 18.72, and 53.28 s correspondingly.Simultaneously,on the test‘Boat’image, the EIS-DHT methodology has achieved a minimum embedding, extraction,and total time of 35.06, 18.57, and 53.63s respectively.

    Figure 5: Embedding capacity analysis of EIS-DHT model

    Table 3: Execution time analysis of the EIS-DHT technique on applied test images

    A brief comparative study of the EIS-DHT technique with existing methods take place in Fig.7 and Tab.4.The results denoted that Goa et al.have shownworse performance on all the applied images with the least PSNR value.Likewise, the techniques devised by Hou et al., Ou et al., and Dragoi and Coltuc have reached a moderately significant performance over the earlier methods.However, the proposed EIS-DHT technique has resulted in a superior outcome over the existing techniques with the higher PSNR value on the applied test images.

    In order to showcase the improved security performance of the EIS-DHT technique, a brief comparison study is made under varying kinds of attacks in Tab.5.The results exhibited that the EISDHT technique has accomplished proficient results with the minimal MSE and RMSE values and maximum PSNR and normalized correlation coefficient (NCC) values.Under the Erosion attack, the EIS-DHT technique has offered an MSE of 127.0332, RMSE of 11.2709, PSNR of 27.0916dB, and NCC of 0.9625.In line with, under the Gaussian Noise attack, the EIS-DHT approach has obtainable an MSE of 47.0116, RMSE of 6.8565, PSNR of 31.4088dB, and NCC of 0.9998.Likewise, under the Dilation attack, the EIS-DHT method has existed an MSE of 137.1452, RMSE of 11.7109, PSNR of 26.7590dB, and NCC of 0.9614.Meanwhile, under the S&P noise attack, the EIS-DHT manner has offered an MSE of 160.1414, RMSE of 12.6547, PSNR of 26.0858dB, and NCC of 0.9997.Additionally,under the Speckle attack, the EIS-DHT method has offered anMSE of317.1320,RMSE of 17.8082, PSNR of 23.1184dB, and NCC of 0.9982.At last, under the Poisson noise attack, the EISDHT methodology has accessible an MSE of 117.8354, RMSE of 10.8552, PSNR of 27.4180dB, and NCC of 1.0000.The experimental analysis ensured that the EIS-HDT technique has found to be an effective tool to accomplish secure data transmission in IIoT environment.

    Figure 6: Execution time analysis of EIS-DHT method

    Figure 7: PSNR analysis of EIS-DHT model with existing techniques

    Table 4: Performance of existing with proposed EIS-DHT method on different images (512 * 512)

    Table 5: Results analysis of EIS-DHT with existing techniques under different attacks

    4 Conclusion

    In this study, an efficient EIS-DHT technique has been developed for secure communication in IIoT environment.The EIS-DHT technique can be designed to hide the secret image into the cover image to accomplish secrecy.The presented model involves different stages of operations such as channel extraction, decomposition, QBWO based optimal pixel selection, encryption, and embedding process.The QBWO algorithm derives an objective function to design an image steganography technique in such a way that the MSE gets minimized and PSNR gets maximized.For examining the improved data hiding performance of the EIS-DHT technique, a set of experimentation were carried out and the results are examined based on distinct metrics.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security.As a part of future scope, the performance of the EIS-DHT technique can be improved by the use of hybrid metaheuristics for optimal pixel selection.

    Acknowledgement:This work was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, under grant No.(D-336-611-1443).The authors, therefore, gratefully acknowledge DSR technical and financial support.

    Funding Statement:This research work was funded by Institution Fund projects under Grant No.(IFPRC-215-249-2020) Therefore, authors gratefully acknowledge technical and financial support from the Ministry of Education and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    精品人妻一区二区三区麻豆| 国产极品天堂在线| 国产真实伦视频高清在线观看| 成年女人看的毛片在线观看| 在线观看av片永久免费下载| 久久久久久伊人网av| 国产综合精华液| 亚洲欧美一区二区三区国产| 久久精品熟女亚洲av麻豆精品 | 色哟哟·www| 成人午夜高清在线视频| 九九爱精品视频在线观看| 特级一级黄色大片| 国产高潮美女av| 亚洲av.av天堂| 国产成人a∨麻豆精品| 少妇人妻精品综合一区二区| 亚洲人成网站在线观看播放| 18禁裸乳无遮挡免费网站照片| 日韩亚洲欧美综合| 十八禁国产超污无遮挡网站| 三级国产精品欧美在线观看| 2018国产大陆天天弄谢| 国产在视频线精品| 亚洲人成网站高清观看| 日本免费在线观看一区| 久久人人爽人人爽人人片va| 欧美性猛交╳xxx乱大交人| 国产亚洲最大av| 国产成人91sexporn| 亚洲av.av天堂| xxx大片免费视频| 久久人人爽人人爽人人片va| 国精品久久久久久国模美| av国产久精品久网站免费入址| 久久韩国三级中文字幕| 亚洲精品影视一区二区三区av| 久久午夜福利片| 欧美一区二区亚洲| 乱人视频在线观看| 床上黄色一级片| 国产一区二区亚洲精品在线观看| 18禁在线播放成人免费| 青青草视频在线视频观看| 欧美日韩视频高清一区二区三区二| 国产精品爽爽va在线观看网站| 免费看美女性在线毛片视频| 搡老乐熟女国产| 国产综合精华液| 色播亚洲综合网| 51国产日韩欧美| 午夜激情福利司机影院| 久久精品国产亚洲网站| 亚洲欧美一区二区三区国产| 久久精品久久久久久久性| 亚洲欧美中文字幕日韩二区| 2021少妇久久久久久久久久久| 久久久久网色| 久久久久性生活片| 三级毛片av免费| 麻豆乱淫一区二区| 99热全是精品| 成人鲁丝片一二三区免费| 亚洲成人一二三区av| 内地一区二区视频在线| 精品久久久噜噜| 国产伦在线观看视频一区| .国产精品久久| 久久99蜜桃精品久久| 美女xxoo啪啪120秒动态图| 免费在线观看成人毛片| 日韩国内少妇激情av| 少妇人妻一区二区三区视频| 18禁在线播放成人免费| av线在线观看网站| 精品一区二区三区人妻视频| 色综合站精品国产| 免费看日本二区| www.av在线官网国产| 久久精品久久久久久噜噜老黄| 国精品久久久久久国模美| 亚洲精品国产av蜜桃| 亚洲av二区三区四区| 亚洲美女视频黄频| 国产精品久久视频播放| 一级毛片aaaaaa免费看小| 欧美精品一区二区大全| 色综合站精品国产| 久久99热6这里只有精品| 国产精品99久久久久久久久| 搡女人真爽免费视频火全软件| 性插视频无遮挡在线免费观看| 狠狠精品人妻久久久久久综合| 亚洲经典国产精华液单| 国产男人的电影天堂91| 麻豆av噜噜一区二区三区| 欧美人与善性xxx| av免费观看日本| 69av精品久久久久久| 国产91av在线免费观看| 你懂的网址亚洲精品在线观看| 美女黄网站色视频| 午夜激情福利司机影院| 亚洲最大成人中文| 日日撸夜夜添| 久久久久网色| 人人妻人人看人人澡| 22中文网久久字幕| 久久97久久精品| 非洲黑人性xxxx精品又粗又长| 久久亚洲国产成人精品v| 日韩欧美精品v在线| 啦啦啦中文免费视频观看日本| 嘟嘟电影网在线观看| 免费看不卡的av| 22中文网久久字幕| 免费观看无遮挡的男女| 免费观看精品视频网站| 街头女战士在线观看网站| 成人午夜高清在线视频| 又爽又黄a免费视频| 身体一侧抽搐| 淫秽高清视频在线观看| 午夜福利成人在线免费观看| av.在线天堂| 日韩av免费高清视频| 少妇熟女欧美另类| 免费无遮挡裸体视频| 亚洲综合色惰| 亚洲欧美一区二区三区国产| 久久久久久久久久成人| 亚州av有码| 国内精品宾馆在线| 99re6热这里在线精品视频| 最新中文字幕久久久久| 高清欧美精品videossex| 日韩欧美一区视频在线观看 | 久久草成人影院| 伊人久久精品亚洲午夜| 日韩一区二区视频免费看| 国产色爽女视频免费观看| 亚洲欧美日韩卡通动漫| 久久久久精品久久久久真实原创| 又粗又硬又长又爽又黄的视频| 免费观看a级毛片全部| 久久久亚洲精品成人影院| 九九在线视频观看精品| 日韩成人伦理影院| 久久久久久久久久成人| 国产 一区 欧美 日韩| 99热6这里只有精品| 国产老妇伦熟女老妇高清| 午夜老司机福利剧场| 丰满少妇做爰视频| 亚洲高清免费不卡视频| 嫩草影院入口| 大片免费播放器 马上看| 国产高清有码在线观看视频| 91在线精品国自产拍蜜月| 亚洲av一区综合| 国产精品精品国产色婷婷| 激情五月婷婷亚洲| 亚洲18禁久久av| 婷婷六月久久综合丁香| 久久精品久久久久久噜噜老黄| 街头女战士在线观看网站| 2022亚洲国产成人精品| 国产午夜精品久久久久久一区二区三区| 永久网站在线| 99热这里只有精品一区| 菩萨蛮人人尽说江南好唐韦庄| 九九在线视频观看精品| 波多野结衣巨乳人妻| 欧美97在线视频| 91狼人影院| 少妇熟女aⅴ在线视频| av天堂中文字幕网| 午夜福利高清视频| 欧美日韩在线观看h| 蜜臀久久99精品久久宅男| 精品人妻偷拍中文字幕| 三级经典国产精品| 国产综合精华液| 国产精品99久久久久久久久| 亚洲国产最新在线播放| 床上黄色一级片| 99久久中文字幕三级久久日本| 亚洲性久久影院| 女人被狂操c到高潮| 中文字幕免费在线视频6| 久久精品国产亚洲av天美| 久久久久久久亚洲中文字幕| 天堂av国产一区二区熟女人妻| 国产毛片a区久久久久| 人人妻人人澡人人爽人人夜夜 | 成年女人看的毛片在线观看| 久久久久精品性色| 国产男人的电影天堂91| 国内精品美女久久久久久| a级毛色黄片| 欧美极品一区二区三区四区| 精品久久久久久久久久久久久| 国产在线男女| 国产一区二区三区综合在线观看 | 狂野欧美白嫩少妇大欣赏| 成人特级av手机在线观看| 非洲黑人性xxxx精品又粗又长| 大话2 男鬼变身卡| 大又大粗又爽又黄少妇毛片口| 一个人看的www免费观看视频| 九草在线视频观看| 欧美日韩在线观看h| 我要看日韩黄色一级片| 亚洲成人久久爱视频| 中文字幕久久专区| 亚洲欧美精品自产自拍| 高清日韩中文字幕在线| 美女xxoo啪啪120秒动态图| 日韩欧美三级三区| 亚洲精品久久久久久婷婷小说| 国产精品一区二区在线观看99 | 成年女人看的毛片在线观看| 免费观看av网站的网址| 亚洲av国产av综合av卡| 一级片'在线观看视频| 最近手机中文字幕大全| 国产在线一区二区三区精| h日本视频在线播放| 欧美bdsm另类| 成人漫画全彩无遮挡| 国内精品宾馆在线| 精品久久久噜噜| 高清午夜精品一区二区三区| 日韩不卡一区二区三区视频在线| 国内少妇人妻偷人精品xxx网站| 亚洲国产日韩欧美精品在线观看| 老师上课跳d突然被开到最大视频| 免费av观看视频| 99视频精品全部免费 在线| 国产有黄有色有爽视频| 哪个播放器可以免费观看大片| 国精品久久久久久国模美| 国产色婷婷99| 亚洲国产av新网站| 久久久久久久大尺度免费视频| 日本黄大片高清| 丝袜美腿在线中文| 尾随美女入室| 色哟哟·www| 丝瓜视频免费看黄片| 国产精品久久久久久久电影| 2018国产大陆天天弄谢| 卡戴珊不雅视频在线播放| 亚洲18禁久久av| 亚洲欧洲国产日韩| 精品国产露脸久久av麻豆 | 岛国毛片在线播放| 精华霜和精华液先用哪个| 老司机影院成人| 亚洲欧美日韩东京热| 少妇被粗大猛烈的视频| 在线观看美女被高潮喷水网站| 偷拍熟女少妇极品色| 久久精品国产自在天天线| 美女脱内裤让男人舔精品视频| 天天躁夜夜躁狠狠久久av| 夫妻午夜视频| 久久久精品欧美日韩精品| 少妇裸体淫交视频免费看高清| 99热全是精品| 精品熟女少妇av免费看| 18禁在线无遮挡免费观看视频| 国产成人一区二区在线| 亚洲欧洲日产国产| 亚洲在线自拍视频| 国产伦精品一区二区三区视频9| 99热6这里只有精品| 国产毛片a区久久久久| 色综合亚洲欧美另类图片| 国产亚洲91精品色在线| 在线观看一区二区三区| 国产成人精品久久久久久| 寂寞人妻少妇视频99o| 黄片wwwwww| 国产午夜福利久久久久久| 国产不卡一卡二| 亚洲国产色片| 免费观看av网站的网址| 一区二区三区乱码不卡18| 人妻一区二区av| 又粗又硬又长又爽又黄的视频| 免费黄色在线免费观看| 日日摸夜夜添夜夜添av毛片| 中文天堂在线官网| 欧美人与善性xxx| 大又大粗又爽又黄少妇毛片口| 又黄又爽又刺激的免费视频.| 日日摸夜夜添夜夜添av毛片| 国内少妇人妻偷人精品xxx网站| 特级一级黄色大片| 久久久亚洲精品成人影院| 一本久久精品| 亚洲成色77777| 18禁在线播放成人免费| 日日摸夜夜添夜夜添av毛片| 国产 亚洲一区二区三区 | 日本免费a在线| 精品久久久久久久久亚洲| 日韩强制内射视频| 国产精品精品国产色婷婷| 男人爽女人下面视频在线观看| 男人狂女人下面高潮的视频| 日本av手机在线免费观看| 高清日韩中文字幕在线| 少妇高潮的动态图| 亚洲av不卡在线观看| 极品少妇高潮喷水抽搐| 亚洲经典国产精华液单| 欧美日韩在线观看h| 国产亚洲91精品色在线| 久久精品夜色国产| 久久精品国产亚洲av涩爱| www.色视频.com| 狂野欧美白嫩少妇大欣赏| 精品久久久久久久人妻蜜臀av| 久久鲁丝午夜福利片| 国产成人福利小说| 一级二级三级毛片免费看| 一个人免费在线观看电影| 亚洲精品456在线播放app| 久久鲁丝午夜福利片| 少妇被粗大猛烈的视频| 综合色丁香网| 成人二区视频| 国产黄频视频在线观看| 亚洲国产精品成人久久小说| 亚洲av日韩在线播放| 性插视频无遮挡在线免费观看| 亚洲在久久综合| 深爱激情五月婷婷| 久久久久免费精品人妻一区二区| 免费大片18禁| 国产伦在线观看视频一区| 激情五月婷婷亚洲| 成年女人在线观看亚洲视频 | 中国美白少妇内射xxxbb| 色网站视频免费| 亚洲熟女精品中文字幕| 搡老妇女老女人老熟妇| 成人鲁丝片一二三区免费| 欧美潮喷喷水| 色综合色国产| 亚洲美女视频黄频| av在线天堂中文字幕| 在线免费十八禁| 少妇高潮的动态图| 校园人妻丝袜中文字幕| 成人一区二区视频在线观看| 少妇被粗大猛烈的视频| 亚洲精品乱码久久久久久按摩| 青春草亚洲视频在线观看| 最近手机中文字幕大全| 男女那种视频在线观看| h日本视频在线播放| 99热这里只有精品一区| av网站免费在线观看视频 | 国产免费视频播放在线视频 | av一本久久久久| 九九爱精品视频在线观看| ponron亚洲| 国产高清国产精品国产三级 | 色综合站精品国产| 久久精品国产鲁丝片午夜精品| 2022亚洲国产成人精品| 男插女下体视频免费在线播放| 在线播放无遮挡| 七月丁香在线播放| 99热这里只有是精品在线观看| 九九在线视频观看精品| 一区二区三区四区激情视频| 成年av动漫网址| 中文天堂在线官网| 欧美xxxx黑人xx丫x性爽| 亚洲,欧美,日韩| 美女主播在线视频| 老司机影院成人| 一个人看的www免费观看视频| 久久久精品欧美日韩精品| 日本一本二区三区精品| 久久精品国产自在天天线| 三级毛片av免费| 国产老妇女一区| 久久综合国产亚洲精品| 久久精品国产鲁丝片午夜精品| 中文欧美无线码| 成人av在线播放网站| 国产老妇女一区| 最近中文字幕高清免费大全6| 精品久久久噜噜| 搡女人真爽免费视频火全软件| 国产中年淑女户外野战色| 欧美三级亚洲精品| 欧美激情在线99| 真实男女啪啪啪动态图| 26uuu在线亚洲综合色| 韩国av在线不卡| 精品一区二区三区人妻视频| 91精品伊人久久大香线蕉| 十八禁网站网址无遮挡 | 成人av在线播放网站| 成人亚洲欧美一区二区av| 一级二级三级毛片免费看| 成人一区二区视频在线观看| 国产成人免费观看mmmm| 亚洲av电影不卡..在线观看| 日韩人妻高清精品专区| 日韩av在线大香蕉| 亚洲精华国产精华液的使用体验| 日韩欧美三级三区| 内地一区二区视频在线| 国产午夜精品久久久久久一区二区三区| 在线免费十八禁| 夜夜看夜夜爽夜夜摸| 国产免费视频播放在线视频 | 日韩成人av中文字幕在线观看| 国产一区有黄有色的免费视频 | 最近手机中文字幕大全| 亚洲欧美成人精品一区二区| 日韩制服骚丝袜av| 水蜜桃什么品种好| 国产有黄有色有爽视频| 成人午夜高清在线视频| 色综合色国产| 99久国产av精品国产电影| 精品人妻偷拍中文字幕| 亚洲精品456在线播放app| 热99在线观看视频| 国产色婷婷99| 偷拍熟女少妇极品色| 国产毛片a区久久久久| 能在线免费看毛片的网站| 免费观看av网站的网址| 亚洲精品成人av观看孕妇| 美女大奶头视频| 啦啦啦啦在线视频资源| 婷婷色麻豆天堂久久| 久久精品久久精品一区二区三区| 国产伦一二天堂av在线观看| 97精品久久久久久久久久精品| 日日啪夜夜撸| 男人狂女人下面高潮的视频| 亚洲av男天堂| 欧美变态另类bdsm刘玥| 国产黄片视频在线免费观看| 免费观看精品视频网站| 亚洲av男天堂| 小蜜桃在线观看免费完整版高清| 校园人妻丝袜中文字幕| 免费无遮挡裸体视频| 18禁裸乳无遮挡免费网站照片| av在线蜜桃| 狂野欧美白嫩少妇大欣赏| 久久国产乱子免费精品| 观看免费一级毛片| 夫妻午夜视频| 岛国毛片在线播放| 久久久色成人| 国产亚洲5aaaaa淫片| 午夜精品国产一区二区电影 | 亚洲伊人久久精品综合| 日韩一区二区视频免费看| 欧美日韩视频高清一区二区三区二| h日本视频在线播放| 在现免费观看毛片| 中文欧美无线码| 色尼玛亚洲综合影院| 2018国产大陆天天弄谢| 国产成人freesex在线| 一本久久精品| 2022亚洲国产成人精品| 99久久人妻综合| 亚洲自偷自拍三级| 中文资源天堂在线| 性插视频无遮挡在线免费观看| 国产免费一级a男人的天堂| 亚洲精品第二区| 精品久久久久久久久亚洲| 男女那种视频在线观看| 欧美性感艳星| 夫妻性生交免费视频一级片| 久久久久精品性色| 欧美日韩精品成人综合77777| 又爽又黄a免费视频| 国产av不卡久久| 99re6热这里在线精品视频| 好男人视频免费观看在线| 一区二区三区高清视频在线| 成人二区视频| 国产成年人精品一区二区| 久久久久久久久中文| 久久韩国三级中文字幕| 午夜福利高清视频| 精品99又大又爽又粗少妇毛片| 欧美精品国产亚洲| 国产精品不卡视频一区二区| 两个人视频免费观看高清| 国产一级毛片七仙女欲春2| 久久精品久久久久久久性| 亚洲av.av天堂| 免费av观看视频| 午夜福利在线观看吧| 国产精品久久久久久久电影| 国产乱来视频区| 亚洲国产精品专区欧美| 天堂av国产一区二区熟女人妻| 欧美zozozo另类| 国产午夜福利久久久久久| 欧美3d第一页| av免费在线看不卡| 尾随美女入室| 禁无遮挡网站| 久久99精品国语久久久| 久久精品国产鲁丝片午夜精品| a级毛片免费高清观看在线播放| 欧美激情久久久久久爽电影| 亚洲av免费高清在线观看| 国产一区二区三区av在线| 十八禁国产超污无遮挡网站| 久久久精品欧美日韩精品| 亚洲成人av在线免费| 国产黄色视频一区二区在线观看| 美女主播在线视频| 可以在线观看毛片的网站| 一级二级三级毛片免费看| 国产熟女欧美一区二区| 干丝袜人妻中文字幕| 国产一区亚洲一区在线观看| 不卡视频在线观看欧美| 美女cb高潮喷水在线观看| 国产午夜福利久久久久久| 在线免费十八禁| av在线观看视频网站免费| 亚洲熟妇中文字幕五十中出| 建设人人有责人人尽责人人享有的 | 韩国高清视频一区二区三区| 美女大奶头视频| 天堂影院成人在线观看| 亚洲av福利一区| 国产高清三级在线| 午夜激情久久久久久久| 美女被艹到高潮喷水动态| 色哟哟·www| 在线播放无遮挡| 丝袜美腿在线中文| 亚洲成色77777| 日韩av在线大香蕉| 欧美激情久久久久久爽电影| 男女视频在线观看网站免费| 成人亚洲欧美一区二区av| 久久国内精品自在自线图片| 国产成人精品久久久久久| 水蜜桃什么品种好| 日韩av不卡免费在线播放| 久久久久久久国产电影| 精品一区在线观看国产| 亚洲成人av在线免费| 日本黄色片子视频| 国产亚洲91精品色在线| 三级经典国产精品| 国产视频内射| 亚洲av福利一区| 国产成人精品福利久久| 免费黄色在线免费观看| 国产精品国产三级国产av玫瑰| 99re6热这里在线精品视频| 亚洲国产色片| www.色视频.com| 国产成人一区二区在线| 日本欧美国产在线视频| 日韩精品有码人妻一区| 国产精品不卡视频一区二区| 亚洲av免费高清在线观看| 最新中文字幕久久久久| 国产精品人妻久久久久久| 国产亚洲av嫩草精品影院| 少妇人妻一区二区三区视频| 精品一区二区三卡| 亚洲精品影视一区二区三区av| 2021天堂中文幕一二区在线观| 欧美一级a爱片免费观看看| 久久韩国三级中文字幕| 只有这里有精品99| 欧美97在线视频| 亚洲国产精品成人综合色| 国产精品国产三级专区第一集| 极品少妇高潮喷水抽搐| 日本爱情动作片www.在线观看| 国产乱人视频| 真实男女啪啪啪动态图| 69av精品久久久久久| 亚洲激情五月婷婷啪啪| 亚洲人成网站高清观看| 少妇猛男粗大的猛烈进出视频 | 美女xxoo啪啪120秒动态图| 国产免费一级a男人的天堂| 直男gayav资源| 日本免费a在线| 天天躁夜夜躁狠狠久久av| 丝袜喷水一区| 亚洲国产精品成人综合色| 国产黄频视频在线观看| 亚洲丝袜综合中文字幕| 中国国产av一级| 日韩欧美 国产精品| 中文在线观看免费www的网站|