• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment

    2022-08-24 12:56:28MahmoudRagabSamahAlshehriHaniAlhadramiFarisKatebEhabBahaudienAsharyandAbdelkhalek9
    Computers Materials&Continua 2022年7期

    Mahmoud Ragab, Samah Alshehri, Hani A.Alhadrami, Faris Kateb,Ehab Bahaudien Asharyand S.Abdel-khalek9,0

    1Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University,Jeddah, 21589, Saudi Arabia

    2Centre of Artificial Intelligence for Precision Medicines, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

    3Department of Mathematics, Faculty of Science, Al-Azhar University, Naser City, 11884, Cairo, Egypt

    4Department of Pharmacy Practice, Faculty of Pharmacy, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

    5Department of Medical Laboratory Technology, Faculty of Applied Medical Sciences, King Abdulaziz University,Jeddah, 21589, Saudi Arabia

    6Molecular Diagnostic Lab, King Abdulaziz University Hospital, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

    7Special Infectious Agent Unit, King Fahd Medical Research Center, King Abdulaziz University, Jeddah, 21589,Saudi Arabia

    8Electrical and Computer Engineering Department, Faculty of Engineering, King Abdulaziz University, Jeddah, 21589,Saudi Arabia

    9Department of Mathematics, Faculty of Science, Taif University, Taif, 21944, Saudi Arabia

    10Department of Mathematics, Faculty of Science, Sohag University, Sohag, 82524, Egypt

    Abstract: Rapid advancements of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) pose serious security issues by revealing secret data.Therefore, security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time.Practically, AI techniques can be utilized to design image steganographic techniques in IIoT.In addition, encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access.In order to accomplish secure data transmission in IIoT environment, this study presents novel encryption with image steganography based data hiding technique (EISDHT) for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization (QBWO) to competently choose the pixel values for hiding secrete data in the cover image.In addition, the multi-level discrete wavelet transform (DWT) based transformation process takes place.Besides, the secret image is divided into three R, G, and B bands which are then individually encrypted using Blowfish, Twofish, and Lorenz Hyperchaotic System.At last, the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.In order to validate the enhanced data hiding performance of the EIS-DHT technique, a set of simulation analyses take place and the results are inspected interms of different measures.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security.

    Keywords: IIoT; security; data hiding technique; image steganography;encryption; secure communication

    1 Introduction

    Industry 4.0 is the 4th generation industrial revolution that has dramatically increased from the Internet of Things (IoT) to the industrial IoT (IIoT).Such innovations have given a solution to novel problems for the industrial sectors.IoT enables linking a number of devices at once more convenient with no requirements of human interference [1].IIoT is employed in the supply chain, monitoring system, management, and manufacturing process.It handles the connectivity of machines, management systems, smart factories, and another streamlined business operation.It employs more precise and sensitive sensor nodes when compared to IoT, comprising further location aware technology on the supply chain management [2].Currently, smart device is employed in various field of industries,like sensor nodes for monitoring factories, drones for monitoring oil pipelines, tractors in agriculture,and water treating equipment.Smart cities might be an integration of commercial IoT & IIoT.Fig.1 depicts the overview of IIoT [3].

    Figure 1: Overview of IIoT

    Industry 4.0 is based on the number of new technologies.Several commercial enterprises near this reality are set on industry 4.0.It can be being utilized for building business intelligence, data management systems, realtime analyses, and scientific research [4].Image sensor based solution helps in improving work process and maintenance securely.Moreover, they considerably enhance the quality of productivity.Computer vision technologies are employed for the visual quality control of production and continuous monitoring procedures.Increasingly state-of-the-art sensors and cameras are being employed in the industry.Also, this development brought additional problems, like absence of built-in security.Such problems request secure and safe devices and applications without human interference.Cyberattacks against automation in the IIoT environments have essential impacts [5].They could disturb the manufacturing procedure, and secure information might be lost.

    The direct solution is to encrypt the information with standard encryption tool beforehand outsourcing.Although there are several high and robust secured data preserving methods, and there is an advancement to make sure the robustness and security of the approach regarding its efficiency[6].Image steganography has established an extensive application in the fields of mobile communication, content, online voting systems, personalized secure image retrieval, privacy of medical records, and surveillance system [7,8].Security is the major concern in present times, for hiding a sensitive piece of information fromhackers and intruders becomes a tedious process [9].The researcher didn’t pay much attention to the problems like, when cover image dimension isn’t appropriate for forming an image block to embed, next how to execute data hiding and either this technique is prone to different kinds of stego attack.Hence, further means should be used like modification to lesser number of pixels or transform coefficient, employ encrypted form of hidden message to be embedded so on.Still, several works in these fields are needed for choosing appropriate tradeoffs among the efficacy calculation measures like payload capacity, security, and imperceptibility

    Xiang et al.[10] proposed a privacy preserving tucker train decomposition through blockchain based encrypted IIoT information.Especially, employ blockchain methods for enabling IIoT data provider for securely and reliably allocate its information by encrypting them beforehand recording them blockchain.They utilize tucker train (TT) concept for building an effective TT decomposition according to gradient descent which greatly decreases the number of components to be upgraded at the time of Tucker decomposition.This study exploits the huge resource of clouds and fogs for implementing an effective privacy preserving tucker train decomposition system.Feng et al.[11]proposed a robust cramer shoup delay optimized fully homomorphic encryption (RCSD-DOFHE)approach.This technique consists of 3 stages.Initially, minimalize the transmission time and overhead,Kullback Leibler divergences are employed in the RCSD method.Then, to minimalize the network delay and data latency, DOFHE method is proposed.In this study, delivery delay is evaluated among the IIoT device signal and base station (BS).Lastly, privacy preserving DOFHE and RCSD were introduced for privacy preserved secure data transmission.Li et al.[12] focus on the secured method of image data on cloud servers.The experimental result and security analyses demonstrate the effectiveness and security of this system.

    In Xia et al.[13], a new detection method of encrypted traffic is presented for manually extracting the features for effective traffic classification, i.e., depending on spatio-temporal features.It consists of the classification and preprocessing phases.In preprocessing stage, raw traffic information is treated using sampling, vectorization, and flow segmentation, so on.Lin et al.[14] proposed permissioned private blockchain based solutions for securing the image when encrypting.In this system, the cryptographic pixel value of images is kept on the blockchain, ensuring the security and privacy of image data.Depending on the number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and data entropy analyses, they calculate the strength of presented image encryption method cipher regarding different attacks.

    Khan et al.[15] proposed 3 data hiding methods to protect transmission in crucial IoT framework using steganography, in which RGB image is applied as a carrier for the data.They examine experimentally and mathematically.Mathematically, they demonstrate that the adversary could not forecast the real data using analyses.Bairagi et al.[16] proposed an effective data hiding system on the basis of multi-dimension mini SuDoKu reference matrix (RM).The presented RM has higher difficulty and could efficiently enhance the security of data hiding.Moreover, this work determines a range locator function that could considerably enhance the embedding efficacy of multi-dimension RM.

    Horng et al.[17] proposed an interpolation-based reversible data hiding (IRDH) system which enhances Lee and Huang’s scheme and Malik et al.’s system by integrating its embedding methods and the optimal pixel adjustment process (OPAP) rises the embedding capability and the visual quality of the systems.In this proposed work, they begin by stretching the size of the original image with the present enhanced neighbor mean interpolation (ENMI) interpolation approach later the data is embedded to the interpolated pixel with this new embedding technique which is based on the intensity of the pixel and the maximized variance value.Hassan et al.[18] proposed a technique named Harris hawks optimization-integer wavelet transform (HHO-IWT) for hidden data and transmission in the IIoT environments on the basis of digital image steganography.The technique embedded hidden information in the cover imageswith a Meta heuristic optimization method namedHHOfor effectively selecting image pixels which are employed for hiding bits of hidden information within integer wavelet transform.The HHO based pixel election process utilizes an objective function calculation based on succeeding 2 stages: exploration and exploitation.The objective functions are used for determining optimum encoding vectors to convert hidden information to an encoded version made using HHO approach.

    This study presents novel encryption with image steganography based data hiding technique (EISDHT) for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization (QBWO) for optimal pixel selection to hide secrete data in the cover image.In addition, the multi-level discrete wavelet transform (DWT) based transformation process takes place.Besides, the secret image is divided as to three R, G, and B bands which are then individually encrypted using Blowfish, Twofish, and Lorenz Hyperchaotic System.Finally, the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.For examining the improved data hiding performance of the EIS-DHT technique, a set of experimentation were carried out and the results are examined based on distinct metrics.

    2 The Proposed EIS-DHT Technique

    In this study, an efficient EIS-DHT technique has been developed for secure communication in IIoT environment.The presented model involves different stages of operations such as channel extraction, decomposition, optimal pixel selection, encryption, and embedding process.Firstly, the input cover image is divided into RGB channels to better understand the color space.Next to that, the multilevel DWT based transformation process takes place to generate a set of vector coefficients to determine the location of the pixels in the cover image.Besides, the optimal pixel selection process is carried out using the QBWO algorithm over the encrypted R, G, and B channels.On the other hand,the channel separation and encryption of the three channels of the secret image also take place.The encryption of the three R, G, and B channels takes place by the use of three encryption techniques.Finally, the encrypted images are embedded as to optimal pixel locations of the cover image and generate the stego image for secure data transmission.Fig.2 illustrates the overall process of proposed EIS-DHT model.

    2.1 Multi-level DWT Based Decomposition Process

    At the initial stage, the multi-level DWT technique is applied to decompose the image into diverse sets of vector coefficients.The 2D-DWTis themost significant spatial to frequency domain conversion method.The partition is made with two processes namely, vertical and horizontal processes.The horizontal function decomposes an image to High (H) and Low (L) frequency bands.The RGB cover image is divided on the basis of HH, LH, LL, and HL bands for finding pixel position.Later,the vertical function decomposes the image to HH1LL1, LH1, and HL1, frequency bands.For next decompositions, LL1band decompose to LL2, LH2, HL2, and HH2, where the image size represents‘M * N’.Initially, to down sample and filter the image, the horizontal decomposition decreases an image toM×size.

    Figure 2: Overall process of EIS-DHT model

    The vertical one decrease down-sample the images to.The single level decomposition outcomes are done using Eq.(1)

    Whereas‘C1’,‘C2’,‘C3’,and‘C4’denotes coefficient numbers of decomposing frequency band.‘C1’denotes low level frequency band i.e., additionally decomposing for extracting subbands as provided under as [19]:

    The coefficient in lower frequency bandis over decomposed, since it produces the edge and texture interrelated details of an image.The following decompositions are executed on low band LL1.The decomposition formation of frequency bands is presented by:

    2.2 Optimal Pixel Selection (OPS) Using QBWO Algorithm

    The multi-level DWT transformed image offers a set of vector coefficients and the optimal pixel values are elected by the use of QBWO algorithm.The BWO technique starts with a primary spider’s population, therefore, all the spiders are referred to as feasible solutions.In pairs, these primary spiders are obvious for reproducing the novel generation.As premature as 11 days following being laid, during the egg sacs, the spiderling performs.In order to various days, it can be alive composed on parental web; the sibling cannibalism has been exposed at that period.Consequently, it takes offmy life focused on the wind.

    With the intention of resolving an optimized problem, this challenge of variables values must set up an appropriate structure for current issue solution.In BWO algorithm, a feasible solution to all problems is allocated to Black widow spider.All the black widow spider displays the problem variables value [20].During theNvar- optimized problem, the widow signified as array of 1×Nvarreferring the problem solution and it can be demonstrated as under:

    All the variable values (y1,y2,...yNvar) signifies the floating-point number.The fitness of widow is reached utilizing assessment of fitness methodfat a widow of (y1,y2,...yNvar).Therefore

    The candidate widow matrix of sizeNpop×Nvaris generated with primary spider’s population for establishing the optimized method.Next, by mating, couples of parents randomly were elected for performing the procreating method, where the female black widow eats the male during or succeeding to that.

    Since they are self-governing, it starts formating with the purpose of replicating a new generation, in correspond, obviously, all the couple mates in their web, individually from the options.During all the mating, nearly a thousand eggs were created in the real-world; but, eventually, some spider babies have been continued that is burly.Currently, during this manner with the purpose of repeating, an array called as alpha necessity more created giving widow array with random numbers including, afterward offspring has been created by developing α with succeeding to Eq.(6) wherey1andy2represents the parentsz1andz2are offspring.

    This process is reiterated for,if the randomly elected numbers are essential not be reproduced.Eventually, the mother as well as children are continuous as array and considered utilizing its fitness function, at the current reliable with cannibalism rating; some of optimum those are comprised in the presently formed population.These steps are provided to every couple.

    At this point, three types of cannibalism are present.A primary one has been sexual cannibalism, where during or succeeding for mating, the male black widow has been eaten by female.During this technique, distinguish the male as well as female are predictably utilizing its fitness values.More than one group has been sibling cannibalism where the burly spiderlings utilize their smaller siblings.During this technique, the CR is set reliable that survivor number has been obvious.In some situations, the third kind of cannibalism are often experiential which the child spider utilizes its mother.

    During the mutation phase,Mutepopdemonstrates the number of individualswas elected arbitrarily in the population.During the array, all elected solutions randomly swap 2 elements.Utilizing the mutation rateMutepopwas calculated.Same as other evolutionary manners, 3 stop conditions are dealt with: i) an existing number of iterations, ii) a few iterations,compliance ofno change in value of fitness to optimum widow, iii) obtaining to specific level of accuracy.

    The QBWO algorithm is designed by the incorporation of quantum computing into the BWO algorithm.Quantum Computingis a new kind of processing model which accepts the concept relevant to quantum modules like quantum entanglement, state superposition, and measurements.The basic component of quantum computing is qubit.The 2 fundamental conditions |0〉and |1〉make a qubit which is stated by linear integration as given by

    where |α|2denotes the likelihood of observing condition |0〉, |β|2and |1〉, where |α|2+ |β|2= 1.A quantum is comprised ofnqubits.Due to the quantum superposition nature, each quantum has 2npossible values.A set of n qubits quantum is represented by

    Quantum gates could change the qubit states like rotation gate, NOT gate, Hadamard gate, and so on.The rotation gate is determined by mutation function to make quanta approach an optimum solution and finally, detect global optimum solutions.The rotation gate is determined by

    △θd=△×S(αd,βd),△θdrepresents the rotation angle of qubit, when△andS(αd,βd) denotes direction and size of rotations, respectively.The QBWO algorithm derives an objective function depending upon the fitness function.The major goal of the QBWO algorithm is to design an image steganography technique in such a way that the mean square error (MSE) gets minimized and peak signal to noise ratio (PSNR) gets maximized.It can be denoted by

    I vividly1 recall entering their driveway and being overwhelmed by the size of their home, the beauty of the furnishings, the manicured grounds and the pecan orchard2

    The preferable maximum and minimum values are attained by the use of QBWO algorithm.

    2.3 Encryption and Embedding Process

    During the encryption process, the secret image gets converted into three elements namely R, G, and B.They are separately encrypted by the Blowfish, Twofish, and Lorenz Hyperchaotic System.Finally, the encryptedRGB elements get embed into the optimal chosen pixel points in the cover image to ensure security.

    2.3.1 R Band Encryption Using Blowfish

    The R band of the secret image is primarily encrypted by the use of Blowfish technique.The blowfish is a symmetric block cipher which encrypts data from 8-byte blocks.The Blowfish technique contains 2 parts: data encryption as well as key expansion.The key expansion connections a variablelength key as a maximum of 64 bytes (512 bits) as to arrays of subkeys totaling 4168 bytes [21].

    A huge amount of subkeys is utilized by Blowfish technique where these keys were pre-computed previously some data encrypted/decrypted.TheP-array have 1832-bit subkeys.There are also 4 32-bitS-boxes with 256 entries.

    The point of view behind the Blowfish is the simplicity of this technique planned and this produces simplicity for implementation.Utilizing a streamlined Feistel network, an easyS-Box exchange and easyP-box substitution creates the body of Blowfish as easy as feasible, but preserving the chosen encryption features of the framework.All bits of xL have been utilized only as input for oneSbox that is importantly improved the technique against different attacks.The functionFis given as follows:

    Divide XL into 4 eight-bit quarters:a,b,c, andd.Afterward,

    2.3.2 G Band Encryption Using Blowfish

    Then, the G band image is encrypted by the Twofish technique.It is a symmetric block cipher;a single key is employed for decryption and encryption.It has a block size of 128 bits and accepts a key of some length upto 256 bits.(National Institute of Standards and Technology (NIST) needed the approach for accepting 128-, 192-, and 256-bit keys.) It is fast on 32 and 8-bits CPU (embedded chips, smart cards,), and in hardware.Also, it is flexible; it is employed in the network application in which keys are altered continuously and in applications where there is slightly or no read only memory(ROM) and random access memory (RAM) accessible.Twofish is a Feistel network.It implies that in all the rounds, half of the text blocks are transmitted with an F function, and later XORed using another half of the text blocks.Data encryption standard (DES) is a Feistel network.Blowfish (other Schneier approach) is a Feistel network.Five of the advanced encryption standard (AES) submission is a Feistel network.Feistel networks have been studied long in cryptography, and we all know how they work.In all rounds of Twofish, 2 thirty two bit words (the 2 vertical lines with the left) serves as an input to the F function.All the words are divided into 4 bytes.These 4 bytes are transmitted via 4 distinct key based S-box.The 4 output bytes (the S-box has eight bit output and input) are integrated with a Maximum Distance Separable (MDS) matrix and integrated with thirty two-bit words.Next the 2 thirty two-bit words are integrated with a PHT, included in 2 round sub-keys, later XORed using the right half of the text.Also, it consists of 2 one-bit rotations, one after and before the XOR.As well,Twofish has somewhat named“postwhitening”&“prewhitening”; further subkeys are XORed to the text block beforehand of the initial and final rounds.The approach could seem random, however, they performed all for the purpose.Not anything is in Twofish accidentally.Everything in the approach cannot describe.The results are mean algorithm, lean i.e., simple and stronger.

    All steps of the round functions are bijective.Specifically, each output is probable.We have seen numerous attacks against cipher that does not do not pose these properties to add it.The round functions mix-up the operation from distinct arithmetical sets: MDSmatrix, S-box substitution, along with Galois field (GF) 2 (known as XOR), 1-bit rotations, and addition in GF (232).This makes the approach complex to attack arithmetically.The key based S-boxes are made to be strong against the 2 bigger attacks of the earlier 1990s—linear and differential cryptanalyses—and strong against any unknown attacks that occur.Numerous approach designer optimizes their design against certain attacks, without considering resistance against the unknown.This designed philosophy was quite distinct: good enough nastiness to (hopefully) resists unknown attacks and enough against known attacks.Key based S-boxes weren’t randomly elected, since they are in Blowfish.Rather, they carefully design S-box construction rules and verified them with each probable 128-bit keys (and a subset of probable longer keys) to ensure that each S-box is quite stronger.This method allows to integration of the strong S-box, strength of fixed with the strength of secret S-box.Also, Twofish has no weaker keys, since Blowfish ensures in decreased round variant.

    2.3.3 B Band Encryption Using Blowfish

    Next, the encryption of‘B’band takes place by the use of Lorenz Hyperchaotic system.The chaotic methods are extremely utilized in the data encryption field as its primary value and parameter were sensitive as well as pseudorandom.The low-dimension chaotic models are small key space and weak pseudorandom.So, several researchers are enhanced on low-dimension chaotic models by rising chaotic techniques to superior dimension.These enhanced high-dimension chaotic techniques are named hyperchaotic schemes.For generating the 4 pseudorandom orders which are needed by the encryption technique, it can implement the Lorenz hyperchaotic method for encrypting technique[22].The Lorenz hyperchaotic scheme was explained as follows.

    wherea,b,c, andrrefers the 4 parameters of Lorenz hyperchaotic model.Ifa= 10,b= 8/3,c= 28,and -1.52≤r≤0.06, the Lorenz hyperchaotic method is a hyperchaotic state.The hyperchaotic technique was restated by utilizing Runge-Kutta approach ifr= -1.

    3 Performance Validation

    The performance of the EIS-DHT technique is investigated using a benchmark USC-SIPI image dataset [23].It contains a numerous collection of digital images with varying sizes of 256 * 256, 512* 512, and 1024 * 1024 pixels.The results are investigated interms of PSNR, structural similarity(SSIM),MSE, quality index (QI), embedding capacity, and execution time.Fig.3 illustrates the sample images [24].

    Figure 3: Sample images

    Tab.1 and Fig.4 demonstrate the results analysis of the EIS-DHT technique under different images (256 * 256) pixels.The table values denoted that the effective performance of the EIS-DHT technique with the higher PSNR, SSIM, andQI values along with lowerMSE.For instance, with Lena cover image, the EIS-DHT technique has gained an increased PSNR of 56.50 dB, SSIM of 0.9971, and QI of 1.000 along with the reduced MSE of 0.1456.Simultaneously, with Baboon cover image, the EIS-DHT method has reached an improved PSNR of 56.76 dB, SSIM of 0.9992, and QI of 1.000 along with the lower MSE of 0.1372.Besides, with Barbara cover image, the EIS-DHT method has reached a maximum PSNR of 56.60 dB, SSIM of 0.9987, and QI of 1.000 along with the decreased MSE of 0.1423.Also, with Airplane cover image, the EIS-DHT technique has gained a higher PSNR of 55.95 dB, SSIM of 0.9979, and QI of 1.000 along with the reduced MSE of 0.1652.Moreover, with Boat cover image, the EIS-DHT methodology has obtained an increased PSNR of 55.70 dB, SSIM of 0.9995, and QI of 1.000 along with the minimal MSE of 0.1752.

    Table 1: Performance of proposed EIS-DHT method on different images (256 * 256)

    Figure 4: Result analysis of EIS-DHT model with different measures

    Tab.2 and Fig.5 showcases the embedding capacity of the EIS-DHT technique under different test images.The EIS-DHT technique has resulted in effective performance with the maximum embedding capacities on all the applied images.For instance, the EIS-DHT technique has achieved an embedding capacity of 16.34% on the‘Lena’image.Furthermore, the EIS-DHT manner has reached an embedding capacity of 15.58% on the‘Baboon’image.In line with, the EIS-DHT manner has obtained an embedding capacity of 16.33% on the‘Barbara’image.Along with that, the EIS-DHT approach has gained an embedding capacity of 16.40% on the‘Aeroplane’image.Eventually, the EISDHT algorithm has reached an embedding capacity of 17.37% on the‘Boat’image.

    Table 2: Embedding capacity analysis of EIS-DHT method

    Tab.3 and Fig.6 investigates the execution time analysis of the EIS-DHT technique on different test images.The results ensured that the EIS-DHT technique has demonstrated effective performance with a reduced embedding, extraction, and total time.For instance, on the test ‘Lena’ image, the EISDHTapproach has obtained a lower embedding, extraction, and total time of 33.75, 17.82, and 51.57 s respectively.Concurrently, on the test ‘Barbara’ image, the EIS-DHT approach has reached a lesser embedding, extraction, and total time of 34.56, 18.72, and 53.28 s correspondingly.Simultaneously,on the test‘Boat’image, the EIS-DHT methodology has achieved a minimum embedding, extraction,and total time of 35.06, 18.57, and 53.63s respectively.

    Figure 5: Embedding capacity analysis of EIS-DHT model

    Table 3: Execution time analysis of the EIS-DHT technique on applied test images

    A brief comparative study of the EIS-DHT technique with existing methods take place in Fig.7 and Tab.4.The results denoted that Goa et al.have shownworse performance on all the applied images with the least PSNR value.Likewise, the techniques devised by Hou et al., Ou et al., and Dragoi and Coltuc have reached a moderately significant performance over the earlier methods.However, the proposed EIS-DHT technique has resulted in a superior outcome over the existing techniques with the higher PSNR value on the applied test images.

    In order to showcase the improved security performance of the EIS-DHT technique, a brief comparison study is made under varying kinds of attacks in Tab.5.The results exhibited that the EISDHT technique has accomplished proficient results with the minimal MSE and RMSE values and maximum PSNR and normalized correlation coefficient (NCC) values.Under the Erosion attack, the EIS-DHT technique has offered an MSE of 127.0332, RMSE of 11.2709, PSNR of 27.0916dB, and NCC of 0.9625.In line with, under the Gaussian Noise attack, the EIS-DHT approach has obtainable an MSE of 47.0116, RMSE of 6.8565, PSNR of 31.4088dB, and NCC of 0.9998.Likewise, under the Dilation attack, the EIS-DHT method has existed an MSE of 137.1452, RMSE of 11.7109, PSNR of 26.7590dB, and NCC of 0.9614.Meanwhile, under the S&P noise attack, the EIS-DHT manner has offered an MSE of 160.1414, RMSE of 12.6547, PSNR of 26.0858dB, and NCC of 0.9997.Additionally,under the Speckle attack, the EIS-DHT method has offered anMSE of317.1320,RMSE of 17.8082, PSNR of 23.1184dB, and NCC of 0.9982.At last, under the Poisson noise attack, the EISDHT methodology has accessible an MSE of 117.8354, RMSE of 10.8552, PSNR of 27.4180dB, and NCC of 1.0000.The experimental analysis ensured that the EIS-HDT technique has found to be an effective tool to accomplish secure data transmission in IIoT environment.

    Figure 6: Execution time analysis of EIS-DHT method

    Figure 7: PSNR analysis of EIS-DHT model with existing techniques

    Table 4: Performance of existing with proposed EIS-DHT method on different images (512 * 512)

    Table 5: Results analysis of EIS-DHT with existing techniques under different attacks

    4 Conclusion

    In this study, an efficient EIS-DHT technique has been developed for secure communication in IIoT environment.The EIS-DHT technique can be designed to hide the secret image into the cover image to accomplish secrecy.The presented model involves different stages of operations such as channel extraction, decomposition, QBWO based optimal pixel selection, encryption, and embedding process.The QBWO algorithm derives an objective function to design an image steganography technique in such a way that the MSE gets minimized and PSNR gets maximized.For examining the improved data hiding performance of the EIS-DHT technique, a set of experimentation were carried out and the results are examined based on distinct metrics.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security.As a part of future scope, the performance of the EIS-DHT technique can be improved by the use of hybrid metaheuristics for optimal pixel selection.

    Acknowledgement:This work was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, under grant No.(D-336-611-1443).The authors, therefore, gratefully acknowledge DSR technical and financial support.

    Funding Statement:This research work was funded by Institution Fund projects under Grant No.(IFPRC-215-249-2020) Therefore, authors gratefully acknowledge technical and financial support from the Ministry of Education and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    多毛熟女@视频| 国产精品一国产av| 少妇人妻精品综合一区二区| 日本爱情动作片www.在线观看| 日本免费在线观看一区| 最近的中文字幕免费完整| 欧美日韩视频高清一区二区三区二| 亚洲欧洲国产日韩| 男女无遮挡免费网站观看| 久久人人爽av亚洲精品天堂| 少妇被粗大猛烈的视频| 大陆偷拍与自拍| 咕卡用的链子| 免费观看a级毛片全部| 国产在线免费精品| 成年女人在线观看亚洲视频| 91在线精品国自产拍蜜月| av在线观看视频网站免费| 国产高清不卡午夜福利| 黄色配什么色好看| 一二三四在线观看免费中文在| 久久热在线av| 亚洲国产av影院在线观看| 国产一区二区三区综合在线观看| 新久久久久国产一级毛片| 中文乱码字字幕精品一区二区三区| 一区二区av电影网| 久久久久国产网址| 亚洲精华国产精华液的使用体验| 水蜜桃什么品种好| 黑人猛操日本美女一级片| av网站在线播放免费| 人体艺术视频欧美日本| av线在线观看网站| 亚洲五月色婷婷综合| www.精华液| 巨乳人妻的诱惑在线观看| 久久久久精品性色| 欧美bdsm另类| 赤兔流量卡办理| 亚洲精品成人av观看孕妇| 亚洲精品日本国产第一区| 18禁裸乳无遮挡动漫免费视频| 亚洲美女黄色视频免费看| 精品国产乱码久久久久久男人| 晚上一个人看的免费电影| 中文字幕精品免费在线观看视频| 国产综合精华液| 中文天堂在线官网| 久热这里只有精品99| 久久久久久人人人人人| www.精华液| 国产熟女午夜一区二区三区| 亚洲精品久久久久久婷婷小说| 18+在线观看网站| 极品少妇高潮喷水抽搐| 国产片特级美女逼逼视频| 久久久国产一区二区| 国产成人91sexporn| 国产在线视频一区二区| 国产精品av久久久久免费| 日日啪夜夜爽| 精品亚洲成国产av| av电影中文网址| 亚洲av男天堂| 亚洲av国产av综合av卡| 在线天堂最新版资源| 国产精品国产三级专区第一集| 天天躁夜夜躁狠狠久久av| 18+在线观看网站| 建设人人有责人人尽责人人享有的| 国产精品国产三级国产专区5o| 久久午夜综合久久蜜桃| av免费观看日本| 亚洲美女视频黄频| 90打野战视频偷拍视频| 欧美精品一区二区大全| 国产精品一二三区在线看| av免费在线看不卡| 亚洲一级一片aⅴ在线观看| 在线观看一区二区三区激情| 午夜精品国产一区二区电影| 国产成人免费观看mmmm| 这个男人来自地球电影免费观看 | 亚洲欧洲国产日韩| 国产高清不卡午夜福利| 99国产综合亚洲精品| 国产亚洲av片在线观看秒播厂| 欧美 亚洲 国产 日韩一| 9191精品国产免费久久| 国产成人免费观看mmmm| 爱豆传媒免费全集在线观看| 久久99一区二区三区| 精品国产乱码久久久久久男人| 久久国产精品男人的天堂亚洲| 中文乱码字字幕精品一区二区三区| 久久国内精品自在自线图片| 在线观看三级黄色| 在线观看免费日韩欧美大片| av在线观看视频网站免费| 两个人免费观看高清视频| 精品国产乱码久久久久久男人| 欧美日本中文国产一区发布| 国产精品久久久久久久久免| 午夜日韩欧美国产| av卡一久久| 国产成人91sexporn| 久久久久久久久久久久大奶| 寂寞人妻少妇视频99o| 一区福利在线观看| 如何舔出高潮| 精品99又大又爽又粗少妇毛片| 在现免费观看毛片| 水蜜桃什么品种好| 两个人看的免费小视频| 久久久精品国产亚洲av高清涩受| 成年女人毛片免费观看观看9 | 欧美 日韩 精品 国产| 精品亚洲成国产av| 777久久人妻少妇嫩草av网站| 亚洲国产精品成人久久小说| 成人漫画全彩无遮挡| 99香蕉大伊视频| 免费在线观看黄色视频的| 肉色欧美久久久久久久蜜桃| 午夜福利一区二区在线看| 久久精品国产亚洲av涩爱| 男人舔女人的私密视频| 99热全是精品| 丝袜脚勾引网站| 在线观看美女被高潮喷水网站| 91在线精品国自产拍蜜月| 少妇人妻久久综合中文| 男女边摸边吃奶| 哪个播放器可以免费观看大片| 欧美日韩综合久久久久久| 精品人妻熟女毛片av久久网站| 精品视频人人做人人爽| 国产一级毛片在线| 91成人精品电影| 亚洲欧美中文字幕日韩二区| 久久久久网色| 亚洲 欧美一区二区三区| 亚洲国产欧美在线一区| 国产精品女同一区二区软件| 亚洲国产av影院在线观看| 精品久久蜜臀av无| 一区二区三区精品91| 大陆偷拍与自拍| 超色免费av| 99精国产麻豆久久婷婷| 99香蕉大伊视频| 亚洲欧洲日产国产| 91在线精品国自产拍蜜月| 美女国产视频在线观看| 亚洲激情五月婷婷啪啪| 亚洲成av片中文字幕在线观看 | 男女边摸边吃奶| 国产免费现黄频在线看| 国产免费福利视频在线观看| 深夜精品福利| 国产精品国产av在线观看| 久久久精品免费免费高清| 亚洲国产成人一精品久久久| 国产又爽黄色视频| 丝袜在线中文字幕| 亚洲精华国产精华液的使用体验| 新久久久久国产一级毛片| 在线观看免费视频网站a站| 女的被弄到高潮叫床怎么办| 一级黄片播放器| 欧美成人精品欧美一级黄| 欧美 亚洲 国产 日韩一| av不卡在线播放| 男男h啪啪无遮挡| 最近中文字幕高清免费大全6| 亚洲婷婷狠狠爱综合网| 成人漫画全彩无遮挡| 欧美 亚洲 国产 日韩一| 亚洲,一卡二卡三卡| 热99国产精品久久久久久7| 最近中文字幕高清免费大全6| 国产亚洲最大av| 国产一区二区 视频在线| 亚洲精品国产色婷婷电影| 久久青草综合色| 欧美精品av麻豆av| 午夜日韩欧美国产| 国产精品女同一区二区软件| 欧美日韩精品网址| 国产免费视频播放在线视频| 高清av免费在线| 制服诱惑二区| av又黄又爽大尺度在线免费看| 观看av在线不卡| 久久久久久久久免费视频了| 国产亚洲欧美精品永久| 久久影院123| 一边亲一边摸免费视频| 中文字幕最新亚洲高清| 日韩av免费高清视频| 久久久久国产一级毛片高清牌| 国产片内射在线| 又粗又硬又长又爽又黄的视频| 国产1区2区3区精品| 爱豆传媒免费全集在线观看| 日韩免费高清中文字幕av| 午夜福利视频精品| 老司机影院成人| 一级毛片我不卡| 高清欧美精品videossex| 不卡av一区二区三区| 春色校园在线视频观看| 人妻系列 视频| 亚洲欧美日韩另类电影网站| 丝瓜视频免费看黄片| 啦啦啦在线观看免费高清www| 制服诱惑二区| 国产高清国产精品国产三级| 国产成人91sexporn| av一本久久久久| 亚洲av福利一区| 男男h啪啪无遮挡| 黄色怎么调成土黄色| 日本爱情动作片www.在线观看| 青春草亚洲视频在线观看| 一级毛片电影观看| 免费观看性生交大片5| 亚洲av电影在线观看一区二区三区| 丰满少妇做爰视频| 日本av手机在线免费观看| 久久影院123| 综合色丁香网| 青青草视频在线视频观看| videossex国产| 日日摸夜夜添夜夜爱| 亚洲欧美精品综合一区二区三区 | 亚洲精品久久成人aⅴ小说| 久久久a久久爽久久v久久| 国产毛片在线视频| 少妇的逼水好多| 中文字幕人妻丝袜一区二区 | 18禁动态无遮挡网站| 国产午夜精品一二区理论片| 18禁观看日本| 国产免费又黄又爽又色| 中文字幕另类日韩欧美亚洲嫩草| 国产极品天堂在线| 日本色播在线视频| 两性夫妻黄色片| 男女边吃奶边做爰视频| 自拍欧美九色日韩亚洲蝌蚪91| 黄色毛片三级朝国网站| 久久青草综合色| 性色av一级| 一区二区三区激情视频| 成年女人在线观看亚洲视频| 欧美在线黄色| 国产精品av久久久久免费| 免费高清在线观看日韩| 日本午夜av视频| 香蕉国产在线看| 久久人人爽av亚洲精品天堂| 青春草亚洲视频在线观看| 亚洲av免费高清在线观看| av不卡在线播放| 亚洲国产成人一精品久久久| 自线自在国产av| 久久av网站| 亚洲成色77777| 国产免费福利视频在线观看| 免费高清在线观看视频在线观看| 久久99蜜桃精品久久| 日韩不卡一区二区三区视频在线| 国产男女内射视频| 成人漫画全彩无遮挡| 亚洲综合精品二区| 曰老女人黄片| 伊人久久国产一区二区| 国产精品麻豆人妻色哟哟久久| 国产av精品麻豆| 亚洲国产精品一区二区三区在线| 久久久久视频综合| 多毛熟女@视频| 欧美国产精品va在线观看不卡| 人妻少妇偷人精品九色| 青春草视频在线免费观看| 免费看不卡的av| 久久久久久久久久久久大奶| 日产精品乱码卡一卡2卡三| 午夜久久久在线观看| 啦啦啦中文免费视频观看日本| 美女主播在线视频| 国产极品粉嫩免费观看在线| 免费观看性生交大片5| 色播在线永久视频| 国产精品蜜桃在线观看| 老熟女久久久| 不卡视频在线观看欧美| 最近中文字幕2019免费版| 欧美日韩成人在线一区二区| 亚洲av成人精品一二三区| 亚洲精品国产色婷婷电影| 久久 成人 亚洲| 人妻系列 视频| 亚洲精品一区蜜桃| 欧美黄色片欧美黄色片| 中文字幕人妻丝袜制服| 亚洲精品久久久久久婷婷小说| 日韩不卡一区二区三区视频在线| av一本久久久久| 亚洲成人手机| 激情视频va一区二区三区| 丁香六月天网| 亚洲人成网站在线观看播放| 国产精品不卡视频一区二区| 久久久久久久久久久免费av| 高清视频免费观看一区二区| 成年人免费黄色播放视频| 人人妻人人爽人人添夜夜欢视频| 亚洲中文av在线| 黄片无遮挡物在线观看| 国产一区二区在线观看av| 最近中文字幕高清免费大全6| 99久久精品国产国产毛片| 国产欧美日韩一区二区三区在线| 精品视频人人做人人爽| 五月开心婷婷网| 人成视频在线观看免费观看| 26uuu在线亚洲综合色| 夫妻午夜视频| 男男h啪啪无遮挡| 国产亚洲一区二区精品| 伊人久久国产一区二区| 深夜精品福利| 久久精品国产亚洲av高清一级| 亚洲欧美成人综合另类久久久| 亚洲精品国产一区二区精华液| 亚洲一区中文字幕在线| 中文字幕制服av| 伦理电影大哥的女人| 丝袜美腿诱惑在线| 亚洲精品乱久久久久久| 我的亚洲天堂| 97在线人人人人妻| 国产成人午夜福利电影在线观看| 大话2 男鬼变身卡| 日韩中字成人| 久久久精品94久久精品| 99九九在线精品视频| 999精品在线视频| 国产淫语在线视频| 1024视频免费在线观看| 亚洲国产av影院在线观看| 免费日韩欧美在线观看| 久久久久久久大尺度免费视频| 色网站视频免费| 欧美日韩一级在线毛片| 国产男女内射视频| 久久精品夜色国产| 欧美日本中文国产一区发布| 婷婷色综合大香蕉| √禁漫天堂资源中文www| 欧美 日韩 精品 国产| 成人午夜精彩视频在线观看| 母亲3免费完整高清在线观看 | 亚洲欧洲精品一区二区精品久久久 | 人人澡人人妻人| 老熟女久久久| 亚洲在久久综合| 看十八女毛片水多多多| 在线天堂最新版资源| 国产精品无大码| 国产视频首页在线观看| av一本久久久久| 国产老妇伦熟女老妇高清| 曰老女人黄片| 在线观看免费视频网站a站| 90打野战视频偷拍视频| 性少妇av在线| 免费观看无遮挡的男女| 久久精品夜色国产| 午夜福利一区二区在线看| 中文字幕另类日韩欧美亚洲嫩草| 亚洲内射少妇av| 在线观看免费高清a一片| 少妇精品久久久久久久| 国产在线免费精品| 少妇被粗大猛烈的视频| 在线观看美女被高潮喷水网站| a 毛片基地| 成年动漫av网址| 你懂的网址亚洲精品在线观看| 制服人妻中文乱码| 免费日韩欧美在线观看| 青春草视频在线免费观看| 十八禁网站网址无遮挡| 18在线观看网站| av在线播放精品| 韩国av在线不卡| 国产在线视频一区二区| 汤姆久久久久久久影院中文字幕| 欧美国产精品一级二级三级| 国产精品熟女久久久久浪| 97在线人人人人妻| 99精国产麻豆久久婷婷| 搡女人真爽免费视频火全软件| 丰满迷人的少妇在线观看| 五月天丁香电影| 欧美老熟妇乱子伦牲交| 日韩人妻精品一区2区三区| 少妇的丰满在线观看| 9热在线视频观看99| 免费黄频网站在线观看国产| 只有这里有精品99| 亚洲欧洲精品一区二区精品久久久 | 免费在线观看完整版高清| 久久久久久伊人网av| 丝袜美足系列| 一区二区日韩欧美中文字幕| 精品人妻熟女毛片av久久网站| 日韩大片免费观看网站| 91精品伊人久久大香线蕉| 久久狼人影院| 久久人妻熟女aⅴ| 各种免费的搞黄视频| 久久久久精品性色| 免费少妇av软件| 免费在线观看黄色视频的| 久久 成人 亚洲| 免费黄网站久久成人精品| 亚洲第一区二区三区不卡| 亚洲国产av新网站| 国产日韩欧美视频二区| 尾随美女入室| freevideosex欧美| 人人澡人人妻人| 欧美亚洲日本最大视频资源| 国产成人精品无人区| www.熟女人妻精品国产| 下体分泌物呈黄色| 人人妻人人澡人人爽人人夜夜| 成人手机av| 好男人视频免费观看在线| 99久久人妻综合| 亚洲成人av在线免费| 日韩成人av中文字幕在线观看| 亚洲人成网站在线观看播放| 大片电影免费在线观看免费| 午夜福利视频在线观看免费| 国产麻豆69| 成年av动漫网址| 亚洲色图 男人天堂 中文字幕| 91在线精品国自产拍蜜月| 午夜精品国产一区二区电影| 日韩人妻精品一区2区三区| 精品一区在线观看国产| 久久久久久免费高清国产稀缺| 亚洲欧洲日产国产| 老司机亚洲免费影院| 一区二区日韩欧美中文字幕| 18在线观看网站| 男人爽女人下面视频在线观看| 成年动漫av网址| 最新的欧美精品一区二区| 色婷婷久久久亚洲欧美| 最新的欧美精品一区二区| 中文天堂在线官网| 丰满迷人的少妇在线观看| 自线自在国产av| 天堂中文最新版在线下载| 啦啦啦视频在线资源免费观看| av在线app专区| 亚洲一码二码三码区别大吗| 9191精品国产免费久久| 在线观看人妻少妇| a级毛片在线看网站| 国产成人a∨麻豆精品| 少妇精品久久久久久久| 免费观看a级毛片全部| 日韩欧美精品免费久久| 国产淫语在线视频| 一本色道久久久久久精品综合| 国产精品熟女久久久久浪| 国产精品国产av在线观看| 久久这里只有精品19| 亚洲一区中文字幕在线| 国产在线免费精品| 亚洲av福利一区| 精品国产超薄肉色丝袜足j| 满18在线观看网站| 精品第一国产精品| 久久精品国产鲁丝片午夜精品| 免费高清在线观看视频在线观看| 亚洲,一卡二卡三卡| 国产色婷婷99| 欧美人与性动交α欧美精品济南到 | 大香蕉久久成人网| 王馨瑶露胸无遮挡在线观看| 午夜福利,免费看| 日韩一卡2卡3卡4卡2021年| 最近的中文字幕免费完整| 国产男女超爽视频在线观看| www.精华液| 老女人水多毛片| 男人操女人黄网站| 婷婷色综合www| 五月开心婷婷网| 夫妻午夜视频| 999久久久国产精品视频| 男人操女人黄网站| 女性被躁到高潮视频| 国产一区二区三区综合在线观看| 久久热在线av| 一个人免费看片子| 欧美精品一区二区免费开放| 亚洲欧美日韩另类电影网站| 大陆偷拍与自拍| 日本爱情动作片www.在线观看| 在线观看免费视频网站a站| 观看av在线不卡| 五月天丁香电影| 午夜福利网站1000一区二区三区| 亚洲色图综合在线观看| 亚洲国产看品久久| 自拍欧美九色日韩亚洲蝌蚪91| 美女视频免费永久观看网站| 国产免费福利视频在线观看| 日韩欧美精品免费久久| 深夜精品福利| 又粗又硬又长又爽又黄的视频| 91成人精品电影| 日本午夜av视频| 欧美精品亚洲一区二区| 国产成人精品久久久久久| 精品第一国产精品| 午夜影院在线不卡| 日韩三级伦理在线观看| 18禁动态无遮挡网站| 久久久亚洲精品成人影院| 国产精品熟女久久久久浪| 亚洲av电影在线进入| 亚洲欧洲精品一区二区精品久久久 | 在线观看免费日韩欧美大片| 激情视频va一区二区三区| 亚洲欧美一区二区三区黑人 | 人人妻人人爽人人添夜夜欢视频| 日韩大片免费观看网站| 欧美 日韩 精品 国产| 日本午夜av视频| 国产精品免费视频内射| 国产av精品麻豆| 高清欧美精品videossex| 九草在线视频观看| 中文字幕最新亚洲高清| 国产精品国产av在线观看| 中文精品一卡2卡3卡4更新| 久久人人97超碰香蕉20202| 国产精品偷伦视频观看了| 侵犯人妻中文字幕一二三四区| 中文字幕人妻丝袜制服| 国产1区2区3区精品| 久久女婷五月综合色啪小说| 国产精品女同一区二区软件| 日韩精品免费视频一区二区三区| 欧美国产精品一级二级三级| 亚洲国产毛片av蜜桃av| av免费观看日本| 国产精品久久久久久久久免| 亚洲人成电影观看| 国产片特级美女逼逼视频| 精品国产一区二区三区久久久樱花| 午夜福利视频精品| 欧美+日韩+精品| 欧美少妇被猛烈插入视频| 日韩一区二区视频免费看| 国产精品亚洲av一区麻豆 | 妹子高潮喷水视频| 欧美精品一区二区大全| 亚洲精品日本国产第一区| 久久人妻熟女aⅴ| 午夜老司机福利剧场| 国产白丝娇喘喷水9色精品| 最近手机中文字幕大全| 亚洲成色77777| 亚洲,一卡二卡三卡| 欧美日本中文国产一区发布| 久久久久久久精品精品| 考比视频在线观看| 2018国产大陆天天弄谢| 巨乳人妻的诱惑在线观看| av免费在线看不卡| 亚洲伊人色综图| 在线观看三级黄色| av在线老鸭窝| 七月丁香在线播放| 97在线人人人人妻| 少妇人妻久久综合中文| 纯流量卡能插随身wifi吗| 两性夫妻黄色片| 天堂俺去俺来也www色官网| 国产极品天堂在线| 少妇 在线观看| 午夜av观看不卡| 999精品在线视频| 国产精品一国产av| 亚洲av综合色区一区| 最新的欧美精品一区二区| 97精品久久久久久久久久精品| 老鸭窝网址在线观看| 日韩中文字幕欧美一区二区 | 日本欧美国产在线视频| 中文字幕人妻丝袜制服| 99久久精品国产国产毛片| 亚洲第一区二区三区不卡|