• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment

    2022-08-24 12:56:28MahmoudRagabSamahAlshehriHaniAlhadramiFarisKatebEhabBahaudienAsharyandAbdelkhalek9
    Computers Materials&Continua 2022年7期

    Mahmoud Ragab, Samah Alshehri, Hani A.Alhadrami, Faris Kateb,Ehab Bahaudien Asharyand S.Abdel-khalek9,0

    1Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University,Jeddah, 21589, Saudi Arabia

    2Centre of Artificial Intelligence for Precision Medicines, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

    3Department of Mathematics, Faculty of Science, Al-Azhar University, Naser City, 11884, Cairo, Egypt

    4Department of Pharmacy Practice, Faculty of Pharmacy, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

    5Department of Medical Laboratory Technology, Faculty of Applied Medical Sciences, King Abdulaziz University,Jeddah, 21589, Saudi Arabia

    6Molecular Diagnostic Lab, King Abdulaziz University Hospital, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

    7Special Infectious Agent Unit, King Fahd Medical Research Center, King Abdulaziz University, Jeddah, 21589,Saudi Arabia

    8Electrical and Computer Engineering Department, Faculty of Engineering, King Abdulaziz University, Jeddah, 21589,Saudi Arabia

    9Department of Mathematics, Faculty of Science, Taif University, Taif, 21944, Saudi Arabia

    10Department of Mathematics, Faculty of Science, Sohag University, Sohag, 82524, Egypt

    Abstract: Rapid advancements of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) pose serious security issues by revealing secret data.Therefore, security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time.Practically, AI techniques can be utilized to design image steganographic techniques in IIoT.In addition, encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access.In order to accomplish secure data transmission in IIoT environment, this study presents novel encryption with image steganography based data hiding technique (EISDHT) for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization (QBWO) to competently choose the pixel values for hiding secrete data in the cover image.In addition, the multi-level discrete wavelet transform (DWT) based transformation process takes place.Besides, the secret image is divided into three R, G, and B bands which are then individually encrypted using Blowfish, Twofish, and Lorenz Hyperchaotic System.At last, the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.In order to validate the enhanced data hiding performance of the EIS-DHT technique, a set of simulation analyses take place and the results are inspected interms of different measures.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security.

    Keywords: IIoT; security; data hiding technique; image steganography;encryption; secure communication

    1 Introduction

    Industry 4.0 is the 4th generation industrial revolution that has dramatically increased from the Internet of Things (IoT) to the industrial IoT (IIoT).Such innovations have given a solution to novel problems for the industrial sectors.IoT enables linking a number of devices at once more convenient with no requirements of human interference [1].IIoT is employed in the supply chain, monitoring system, management, and manufacturing process.It handles the connectivity of machines, management systems, smart factories, and another streamlined business operation.It employs more precise and sensitive sensor nodes when compared to IoT, comprising further location aware technology on the supply chain management [2].Currently, smart device is employed in various field of industries,like sensor nodes for monitoring factories, drones for monitoring oil pipelines, tractors in agriculture,and water treating equipment.Smart cities might be an integration of commercial IoT & IIoT.Fig.1 depicts the overview of IIoT [3].

    Figure 1: Overview of IIoT

    Industry 4.0 is based on the number of new technologies.Several commercial enterprises near this reality are set on industry 4.0.It can be being utilized for building business intelligence, data management systems, realtime analyses, and scientific research [4].Image sensor based solution helps in improving work process and maintenance securely.Moreover, they considerably enhance the quality of productivity.Computer vision technologies are employed for the visual quality control of production and continuous monitoring procedures.Increasingly state-of-the-art sensors and cameras are being employed in the industry.Also, this development brought additional problems, like absence of built-in security.Such problems request secure and safe devices and applications without human interference.Cyberattacks against automation in the IIoT environments have essential impacts [5].They could disturb the manufacturing procedure, and secure information might be lost.

    The direct solution is to encrypt the information with standard encryption tool beforehand outsourcing.Although there are several high and robust secured data preserving methods, and there is an advancement to make sure the robustness and security of the approach regarding its efficiency[6].Image steganography has established an extensive application in the fields of mobile communication, content, online voting systems, personalized secure image retrieval, privacy of medical records, and surveillance system [7,8].Security is the major concern in present times, for hiding a sensitive piece of information fromhackers and intruders becomes a tedious process [9].The researcher didn’t pay much attention to the problems like, when cover image dimension isn’t appropriate for forming an image block to embed, next how to execute data hiding and either this technique is prone to different kinds of stego attack.Hence, further means should be used like modification to lesser number of pixels or transform coefficient, employ encrypted form of hidden message to be embedded so on.Still, several works in these fields are needed for choosing appropriate tradeoffs among the efficacy calculation measures like payload capacity, security, and imperceptibility

    Xiang et al.[10] proposed a privacy preserving tucker train decomposition through blockchain based encrypted IIoT information.Especially, employ blockchain methods for enabling IIoT data provider for securely and reliably allocate its information by encrypting them beforehand recording them blockchain.They utilize tucker train (TT) concept for building an effective TT decomposition according to gradient descent which greatly decreases the number of components to be upgraded at the time of Tucker decomposition.This study exploits the huge resource of clouds and fogs for implementing an effective privacy preserving tucker train decomposition system.Feng et al.[11]proposed a robust cramer shoup delay optimized fully homomorphic encryption (RCSD-DOFHE)approach.This technique consists of 3 stages.Initially, minimalize the transmission time and overhead,Kullback Leibler divergences are employed in the RCSD method.Then, to minimalize the network delay and data latency, DOFHE method is proposed.In this study, delivery delay is evaluated among the IIoT device signal and base station (BS).Lastly, privacy preserving DOFHE and RCSD were introduced for privacy preserved secure data transmission.Li et al.[12] focus on the secured method of image data on cloud servers.The experimental result and security analyses demonstrate the effectiveness and security of this system.

    In Xia et al.[13], a new detection method of encrypted traffic is presented for manually extracting the features for effective traffic classification, i.e., depending on spatio-temporal features.It consists of the classification and preprocessing phases.In preprocessing stage, raw traffic information is treated using sampling, vectorization, and flow segmentation, so on.Lin et al.[14] proposed permissioned private blockchain based solutions for securing the image when encrypting.In this system, the cryptographic pixel value of images is kept on the blockchain, ensuring the security and privacy of image data.Depending on the number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and data entropy analyses, they calculate the strength of presented image encryption method cipher regarding different attacks.

    Khan et al.[15] proposed 3 data hiding methods to protect transmission in crucial IoT framework using steganography, in which RGB image is applied as a carrier for the data.They examine experimentally and mathematically.Mathematically, they demonstrate that the adversary could not forecast the real data using analyses.Bairagi et al.[16] proposed an effective data hiding system on the basis of multi-dimension mini SuDoKu reference matrix (RM).The presented RM has higher difficulty and could efficiently enhance the security of data hiding.Moreover, this work determines a range locator function that could considerably enhance the embedding efficacy of multi-dimension RM.

    Horng et al.[17] proposed an interpolation-based reversible data hiding (IRDH) system which enhances Lee and Huang’s scheme and Malik et al.’s system by integrating its embedding methods and the optimal pixel adjustment process (OPAP) rises the embedding capability and the visual quality of the systems.In this proposed work, they begin by stretching the size of the original image with the present enhanced neighbor mean interpolation (ENMI) interpolation approach later the data is embedded to the interpolated pixel with this new embedding technique which is based on the intensity of the pixel and the maximized variance value.Hassan et al.[18] proposed a technique named Harris hawks optimization-integer wavelet transform (HHO-IWT) for hidden data and transmission in the IIoT environments on the basis of digital image steganography.The technique embedded hidden information in the cover imageswith a Meta heuristic optimization method namedHHOfor effectively selecting image pixels which are employed for hiding bits of hidden information within integer wavelet transform.The HHO based pixel election process utilizes an objective function calculation based on succeeding 2 stages: exploration and exploitation.The objective functions are used for determining optimum encoding vectors to convert hidden information to an encoded version made using HHO approach.

    This study presents novel encryption with image steganography based data hiding technique (EISDHT) for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization (QBWO) for optimal pixel selection to hide secrete data in the cover image.In addition, the multi-level discrete wavelet transform (DWT) based transformation process takes place.Besides, the secret image is divided as to three R, G, and B bands which are then individually encrypted using Blowfish, Twofish, and Lorenz Hyperchaotic System.Finally, the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.For examining the improved data hiding performance of the EIS-DHT technique, a set of experimentation were carried out and the results are examined based on distinct metrics.

    2 The Proposed EIS-DHT Technique

    In this study, an efficient EIS-DHT technique has been developed for secure communication in IIoT environment.The presented model involves different stages of operations such as channel extraction, decomposition, optimal pixel selection, encryption, and embedding process.Firstly, the input cover image is divided into RGB channels to better understand the color space.Next to that, the multilevel DWT based transformation process takes place to generate a set of vector coefficients to determine the location of the pixels in the cover image.Besides, the optimal pixel selection process is carried out using the QBWO algorithm over the encrypted R, G, and B channels.On the other hand,the channel separation and encryption of the three channels of the secret image also take place.The encryption of the three R, G, and B channels takes place by the use of three encryption techniques.Finally, the encrypted images are embedded as to optimal pixel locations of the cover image and generate the stego image for secure data transmission.Fig.2 illustrates the overall process of proposed EIS-DHT model.

    2.1 Multi-level DWT Based Decomposition Process

    At the initial stage, the multi-level DWT technique is applied to decompose the image into diverse sets of vector coefficients.The 2D-DWTis themost significant spatial to frequency domain conversion method.The partition is made with two processes namely, vertical and horizontal processes.The horizontal function decomposes an image to High (H) and Low (L) frequency bands.The RGB cover image is divided on the basis of HH, LH, LL, and HL bands for finding pixel position.Later,the vertical function decomposes the image to HH1LL1, LH1, and HL1, frequency bands.For next decompositions, LL1band decompose to LL2, LH2, HL2, and HH2, where the image size represents‘M * N’.Initially, to down sample and filter the image, the horizontal decomposition decreases an image toM×size.

    Figure 2: Overall process of EIS-DHT model

    The vertical one decrease down-sample the images to.The single level decomposition outcomes are done using Eq.(1)

    Whereas‘C1’,‘C2’,‘C3’,and‘C4’denotes coefficient numbers of decomposing frequency band.‘C1’denotes low level frequency band i.e., additionally decomposing for extracting subbands as provided under as [19]:

    The coefficient in lower frequency bandis over decomposed, since it produces the edge and texture interrelated details of an image.The following decompositions are executed on low band LL1.The decomposition formation of frequency bands is presented by:

    2.2 Optimal Pixel Selection (OPS) Using QBWO Algorithm

    The multi-level DWT transformed image offers a set of vector coefficients and the optimal pixel values are elected by the use of QBWO algorithm.The BWO technique starts with a primary spider’s population, therefore, all the spiders are referred to as feasible solutions.In pairs, these primary spiders are obvious for reproducing the novel generation.As premature as 11 days following being laid, during the egg sacs, the spiderling performs.In order to various days, it can be alive composed on parental web; the sibling cannibalism has been exposed at that period.Consequently, it takes offmy life focused on the wind.

    With the intention of resolving an optimized problem, this challenge of variables values must set up an appropriate structure for current issue solution.In BWO algorithm, a feasible solution to all problems is allocated to Black widow spider.All the black widow spider displays the problem variables value [20].During theNvar- optimized problem, the widow signified as array of 1×Nvarreferring the problem solution and it can be demonstrated as under:

    All the variable values (y1,y2,...yNvar) signifies the floating-point number.The fitness of widow is reached utilizing assessment of fitness methodfat a widow of (y1,y2,...yNvar).Therefore

    The candidate widow matrix of sizeNpop×Nvaris generated with primary spider’s population for establishing the optimized method.Next, by mating, couples of parents randomly were elected for performing the procreating method, where the female black widow eats the male during or succeeding to that.

    Since they are self-governing, it starts formating with the purpose of replicating a new generation, in correspond, obviously, all the couple mates in their web, individually from the options.During all the mating, nearly a thousand eggs were created in the real-world; but, eventually, some spider babies have been continued that is burly.Currently, during this manner with the purpose of repeating, an array called as alpha necessity more created giving widow array with random numbers including, afterward offspring has been created by developing α with succeeding to Eq.(6) wherey1andy2represents the parentsz1andz2are offspring.

    This process is reiterated for,if the randomly elected numbers are essential not be reproduced.Eventually, the mother as well as children are continuous as array and considered utilizing its fitness function, at the current reliable with cannibalism rating; some of optimum those are comprised in the presently formed population.These steps are provided to every couple.

    At this point, three types of cannibalism are present.A primary one has been sexual cannibalism, where during or succeeding for mating, the male black widow has been eaten by female.During this technique, distinguish the male as well as female are predictably utilizing its fitness values.More than one group has been sibling cannibalism where the burly spiderlings utilize their smaller siblings.During this technique, the CR is set reliable that survivor number has been obvious.In some situations, the third kind of cannibalism are often experiential which the child spider utilizes its mother.

    During the mutation phase,Mutepopdemonstrates the number of individualswas elected arbitrarily in the population.During the array, all elected solutions randomly swap 2 elements.Utilizing the mutation rateMutepopwas calculated.Same as other evolutionary manners, 3 stop conditions are dealt with: i) an existing number of iterations, ii) a few iterations,compliance ofno change in value of fitness to optimum widow, iii) obtaining to specific level of accuracy.

    The QBWO algorithm is designed by the incorporation of quantum computing into the BWO algorithm.Quantum Computingis a new kind of processing model which accepts the concept relevant to quantum modules like quantum entanglement, state superposition, and measurements.The basic component of quantum computing is qubit.The 2 fundamental conditions |0〉and |1〉make a qubit which is stated by linear integration as given by

    where |α|2denotes the likelihood of observing condition |0〉, |β|2and |1〉, where |α|2+ |β|2= 1.A quantum is comprised ofnqubits.Due to the quantum superposition nature, each quantum has 2npossible values.A set of n qubits quantum is represented by

    Quantum gates could change the qubit states like rotation gate, NOT gate, Hadamard gate, and so on.The rotation gate is determined by mutation function to make quanta approach an optimum solution and finally, detect global optimum solutions.The rotation gate is determined by

    △θd=△×S(αd,βd),△θdrepresents the rotation angle of qubit, when△andS(αd,βd) denotes direction and size of rotations, respectively.The QBWO algorithm derives an objective function depending upon the fitness function.The major goal of the QBWO algorithm is to design an image steganography technique in such a way that the mean square error (MSE) gets minimized and peak signal to noise ratio (PSNR) gets maximized.It can be denoted by

    I vividly1 recall entering their driveway and being overwhelmed by the size of their home, the beauty of the furnishings, the manicured grounds and the pecan orchard2

    The preferable maximum and minimum values are attained by the use of QBWO algorithm.

    2.3 Encryption and Embedding Process

    During the encryption process, the secret image gets converted into three elements namely R, G, and B.They are separately encrypted by the Blowfish, Twofish, and Lorenz Hyperchaotic System.Finally, the encryptedRGB elements get embed into the optimal chosen pixel points in the cover image to ensure security.

    2.3.1 R Band Encryption Using Blowfish

    The R band of the secret image is primarily encrypted by the use of Blowfish technique.The blowfish is a symmetric block cipher which encrypts data from 8-byte blocks.The Blowfish technique contains 2 parts: data encryption as well as key expansion.The key expansion connections a variablelength key as a maximum of 64 bytes (512 bits) as to arrays of subkeys totaling 4168 bytes [21].

    A huge amount of subkeys is utilized by Blowfish technique where these keys were pre-computed previously some data encrypted/decrypted.TheP-array have 1832-bit subkeys.There are also 4 32-bitS-boxes with 256 entries.

    The point of view behind the Blowfish is the simplicity of this technique planned and this produces simplicity for implementation.Utilizing a streamlined Feistel network, an easyS-Box exchange and easyP-box substitution creates the body of Blowfish as easy as feasible, but preserving the chosen encryption features of the framework.All bits of xL have been utilized only as input for oneSbox that is importantly improved the technique against different attacks.The functionFis given as follows:

    Divide XL into 4 eight-bit quarters:a,b,c, andd.Afterward,

    2.3.2 G Band Encryption Using Blowfish

    Then, the G band image is encrypted by the Twofish technique.It is a symmetric block cipher;a single key is employed for decryption and encryption.It has a block size of 128 bits and accepts a key of some length upto 256 bits.(National Institute of Standards and Technology (NIST) needed the approach for accepting 128-, 192-, and 256-bit keys.) It is fast on 32 and 8-bits CPU (embedded chips, smart cards,), and in hardware.Also, it is flexible; it is employed in the network application in which keys are altered continuously and in applications where there is slightly or no read only memory(ROM) and random access memory (RAM) accessible.Twofish is a Feistel network.It implies that in all the rounds, half of the text blocks are transmitted with an F function, and later XORed using another half of the text blocks.Data encryption standard (DES) is a Feistel network.Blowfish (other Schneier approach) is a Feistel network.Five of the advanced encryption standard (AES) submission is a Feistel network.Feistel networks have been studied long in cryptography, and we all know how they work.In all rounds of Twofish, 2 thirty two bit words (the 2 vertical lines with the left) serves as an input to the F function.All the words are divided into 4 bytes.These 4 bytes are transmitted via 4 distinct key based S-box.The 4 output bytes (the S-box has eight bit output and input) are integrated with a Maximum Distance Separable (MDS) matrix and integrated with thirty two-bit words.Next the 2 thirty two-bit words are integrated with a PHT, included in 2 round sub-keys, later XORed using the right half of the text.Also, it consists of 2 one-bit rotations, one after and before the XOR.As well,Twofish has somewhat named“postwhitening”&“prewhitening”; further subkeys are XORed to the text block beforehand of the initial and final rounds.The approach could seem random, however, they performed all for the purpose.Not anything is in Twofish accidentally.Everything in the approach cannot describe.The results are mean algorithm, lean i.e., simple and stronger.

    All steps of the round functions are bijective.Specifically, each output is probable.We have seen numerous attacks against cipher that does not do not pose these properties to add it.The round functions mix-up the operation from distinct arithmetical sets: MDSmatrix, S-box substitution, along with Galois field (GF) 2 (known as XOR), 1-bit rotations, and addition in GF (232).This makes the approach complex to attack arithmetically.The key based S-boxes are made to be strong against the 2 bigger attacks of the earlier 1990s—linear and differential cryptanalyses—and strong against any unknown attacks that occur.Numerous approach designer optimizes their design against certain attacks, without considering resistance against the unknown.This designed philosophy was quite distinct: good enough nastiness to (hopefully) resists unknown attacks and enough against known attacks.Key based S-boxes weren’t randomly elected, since they are in Blowfish.Rather, they carefully design S-box construction rules and verified them with each probable 128-bit keys (and a subset of probable longer keys) to ensure that each S-box is quite stronger.This method allows to integration of the strong S-box, strength of fixed with the strength of secret S-box.Also, Twofish has no weaker keys, since Blowfish ensures in decreased round variant.

    2.3.3 B Band Encryption Using Blowfish

    Next, the encryption of‘B’band takes place by the use of Lorenz Hyperchaotic system.The chaotic methods are extremely utilized in the data encryption field as its primary value and parameter were sensitive as well as pseudorandom.The low-dimension chaotic models are small key space and weak pseudorandom.So, several researchers are enhanced on low-dimension chaotic models by rising chaotic techniques to superior dimension.These enhanced high-dimension chaotic techniques are named hyperchaotic schemes.For generating the 4 pseudorandom orders which are needed by the encryption technique, it can implement the Lorenz hyperchaotic method for encrypting technique[22].The Lorenz hyperchaotic scheme was explained as follows.

    wherea,b,c, andrrefers the 4 parameters of Lorenz hyperchaotic model.Ifa= 10,b= 8/3,c= 28,and -1.52≤r≤0.06, the Lorenz hyperchaotic method is a hyperchaotic state.The hyperchaotic technique was restated by utilizing Runge-Kutta approach ifr= -1.

    3 Performance Validation

    The performance of the EIS-DHT technique is investigated using a benchmark USC-SIPI image dataset [23].It contains a numerous collection of digital images with varying sizes of 256 * 256, 512* 512, and 1024 * 1024 pixels.The results are investigated interms of PSNR, structural similarity(SSIM),MSE, quality index (QI), embedding capacity, and execution time.Fig.3 illustrates the sample images [24].

    Figure 3: Sample images

    Tab.1 and Fig.4 demonstrate the results analysis of the EIS-DHT technique under different images (256 * 256) pixels.The table values denoted that the effective performance of the EIS-DHT technique with the higher PSNR, SSIM, andQI values along with lowerMSE.For instance, with Lena cover image, the EIS-DHT technique has gained an increased PSNR of 56.50 dB, SSIM of 0.9971, and QI of 1.000 along with the reduced MSE of 0.1456.Simultaneously, with Baboon cover image, the EIS-DHT method has reached an improved PSNR of 56.76 dB, SSIM of 0.9992, and QI of 1.000 along with the lower MSE of 0.1372.Besides, with Barbara cover image, the EIS-DHT method has reached a maximum PSNR of 56.60 dB, SSIM of 0.9987, and QI of 1.000 along with the decreased MSE of 0.1423.Also, with Airplane cover image, the EIS-DHT technique has gained a higher PSNR of 55.95 dB, SSIM of 0.9979, and QI of 1.000 along with the reduced MSE of 0.1652.Moreover, with Boat cover image, the EIS-DHT methodology has obtained an increased PSNR of 55.70 dB, SSIM of 0.9995, and QI of 1.000 along with the minimal MSE of 0.1752.

    Table 1: Performance of proposed EIS-DHT method on different images (256 * 256)

    Figure 4: Result analysis of EIS-DHT model with different measures

    Tab.2 and Fig.5 showcases the embedding capacity of the EIS-DHT technique under different test images.The EIS-DHT technique has resulted in effective performance with the maximum embedding capacities on all the applied images.For instance, the EIS-DHT technique has achieved an embedding capacity of 16.34% on the‘Lena’image.Furthermore, the EIS-DHT manner has reached an embedding capacity of 15.58% on the‘Baboon’image.In line with, the EIS-DHT manner has obtained an embedding capacity of 16.33% on the‘Barbara’image.Along with that, the EIS-DHT approach has gained an embedding capacity of 16.40% on the‘Aeroplane’image.Eventually, the EISDHT algorithm has reached an embedding capacity of 17.37% on the‘Boat’image.

    Table 2: Embedding capacity analysis of EIS-DHT method

    Tab.3 and Fig.6 investigates the execution time analysis of the EIS-DHT technique on different test images.The results ensured that the EIS-DHT technique has demonstrated effective performance with a reduced embedding, extraction, and total time.For instance, on the test ‘Lena’ image, the EISDHTapproach has obtained a lower embedding, extraction, and total time of 33.75, 17.82, and 51.57 s respectively.Concurrently, on the test ‘Barbara’ image, the EIS-DHT approach has reached a lesser embedding, extraction, and total time of 34.56, 18.72, and 53.28 s correspondingly.Simultaneously,on the test‘Boat’image, the EIS-DHT methodology has achieved a minimum embedding, extraction,and total time of 35.06, 18.57, and 53.63s respectively.

    Figure 5: Embedding capacity analysis of EIS-DHT model

    Table 3: Execution time analysis of the EIS-DHT technique on applied test images

    A brief comparative study of the EIS-DHT technique with existing methods take place in Fig.7 and Tab.4.The results denoted that Goa et al.have shownworse performance on all the applied images with the least PSNR value.Likewise, the techniques devised by Hou et al., Ou et al., and Dragoi and Coltuc have reached a moderately significant performance over the earlier methods.However, the proposed EIS-DHT technique has resulted in a superior outcome over the existing techniques with the higher PSNR value on the applied test images.

    In order to showcase the improved security performance of the EIS-DHT technique, a brief comparison study is made under varying kinds of attacks in Tab.5.The results exhibited that the EISDHT technique has accomplished proficient results with the minimal MSE and RMSE values and maximum PSNR and normalized correlation coefficient (NCC) values.Under the Erosion attack, the EIS-DHT technique has offered an MSE of 127.0332, RMSE of 11.2709, PSNR of 27.0916dB, and NCC of 0.9625.In line with, under the Gaussian Noise attack, the EIS-DHT approach has obtainable an MSE of 47.0116, RMSE of 6.8565, PSNR of 31.4088dB, and NCC of 0.9998.Likewise, under the Dilation attack, the EIS-DHT method has existed an MSE of 137.1452, RMSE of 11.7109, PSNR of 26.7590dB, and NCC of 0.9614.Meanwhile, under the S&P noise attack, the EIS-DHT manner has offered an MSE of 160.1414, RMSE of 12.6547, PSNR of 26.0858dB, and NCC of 0.9997.Additionally,under the Speckle attack, the EIS-DHT method has offered anMSE of317.1320,RMSE of 17.8082, PSNR of 23.1184dB, and NCC of 0.9982.At last, under the Poisson noise attack, the EISDHT methodology has accessible an MSE of 117.8354, RMSE of 10.8552, PSNR of 27.4180dB, and NCC of 1.0000.The experimental analysis ensured that the EIS-HDT technique has found to be an effective tool to accomplish secure data transmission in IIoT environment.

    Figure 6: Execution time analysis of EIS-DHT method

    Figure 7: PSNR analysis of EIS-DHT model with existing techniques

    Table 4: Performance of existing with proposed EIS-DHT method on different images (512 * 512)

    Table 5: Results analysis of EIS-DHT with existing techniques under different attacks

    4 Conclusion

    In this study, an efficient EIS-DHT technique has been developed for secure communication in IIoT environment.The EIS-DHT technique can be designed to hide the secret image into the cover image to accomplish secrecy.The presented model involves different stages of operations such as channel extraction, decomposition, QBWO based optimal pixel selection, encryption, and embedding process.The QBWO algorithm derives an objective function to design an image steganography technique in such a way that the MSE gets minimized and PSNR gets maximized.For examining the improved data hiding performance of the EIS-DHT technique, a set of experimentation were carried out and the results are examined based on distinct metrics.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security.As a part of future scope, the performance of the EIS-DHT technique can be improved by the use of hybrid metaheuristics for optimal pixel selection.

    Acknowledgement:This work was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, under grant No.(D-336-611-1443).The authors, therefore, gratefully acknowledge DSR technical and financial support.

    Funding Statement:This research work was funded by Institution Fund projects under Grant No.(IFPRC-215-249-2020) Therefore, authors gratefully acknowledge technical and financial support from the Ministry of Education and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美精品啪啪一区二区三区| 午夜久久久久精精品| 国产在视频线在精品| 国产aⅴ精品一区二区三区波| 久久人妻av系列| av在线老鸭窝| 91狼人影院| 国产探花极品一区二区| 欧美三级亚洲精品| 在线观看av片永久免费下载| 搡女人真爽免费视频火全软件 | 午夜亚洲福利在线播放| 无人区码免费观看不卡| 亚洲精品乱码久久久v下载方式| 国产在线精品亚洲第一网站| 亚洲欧美日韩东京热| 一区二区三区激情视频| 人人妻,人人澡人人爽秒播| 婷婷精品国产亚洲av| 亚洲国产高清在线一区二区三| 日本黄大片高清| 熟女电影av网| 身体一侧抽搐| 中文字幕av成人在线电影| 又紧又爽又黄一区二区| 欧美精品啪啪一区二区三区| 国产探花极品一区二区| 伊人久久精品亚洲午夜| 成人永久免费在线观看视频| 亚洲国产日韩欧美精品在线观看| 老司机午夜福利在线观看视频| 精品无人区乱码1区二区| 一个人观看的视频www高清免费观看| 亚洲av日韩精品久久久久久密| 久久人人爽人人爽人人片va| 日本 av在线| 成人三级黄色视频| 欧美日韩综合久久久久久 | 国产极品精品免费视频能看的| 久久久久免费精品人妻一区二区| 91精品国产九色| 在线看三级毛片| 少妇猛男粗大的猛烈进出视频 | 色av中文字幕| 三级毛片av免费| av女优亚洲男人天堂| 日韩高清综合在线| 欧美在线一区亚洲| 久久精品国产亚洲av香蕉五月| 国产真实伦视频高清在线观看 | 亚洲第一区二区三区不卡| 久久香蕉精品热| 国产精品久久久久久久电影| 中文亚洲av片在线观看爽| 神马国产精品三级电影在线观看| 一进一出好大好爽视频| 欧美日韩精品成人综合77777| 18禁黄网站禁片免费观看直播| 成人鲁丝片一二三区免费| 欧美精品国产亚洲| 欧美日韩综合久久久久久 | eeuss影院久久| 伦精品一区二区三区| 亚洲成av人片在线播放无| av在线老鸭窝| 中文字幕久久专区| 变态另类成人亚洲欧美熟女| 成人av一区二区三区在线看| 国产 一区精品| 88av欧美| 精品免费久久久久久久清纯| 午夜爱爱视频在线播放| 色av中文字幕| 亚洲人成网站高清观看| 美女被艹到高潮喷水动态| 十八禁国产超污无遮挡网站| 国产麻豆成人av免费视频| 久久久久国内视频| 日本爱情动作片www.在线观看 | 99久久九九国产精品国产免费| 麻豆成人av在线观看| 久久久久久久久久成人| 九九在线视频观看精品| 2021天堂中文幕一二区在线观| 成人国产一区最新在线观看| 精品人妻偷拍中文字幕| 久久99热这里只有精品18| 亚洲18禁久久av| 给我免费播放毛片高清在线观看| 国产精品野战在线观看| 亚洲真实伦在线观看| 国产伦精品一区二区三区视频9| 国产av麻豆久久久久久久| 欧美日韩亚洲国产一区二区在线观看| 乱系列少妇在线播放| www.www免费av| 久久久久久国产a免费观看| 内地一区二区视频在线| 亚洲精品影视一区二区三区av| 我要搜黄色片| or卡值多少钱| 色哟哟·www| 欧美精品国产亚洲| АⅤ资源中文在线天堂| 亚洲美女视频黄频| 97人妻精品一区二区三区麻豆| 国产 一区精品| 一区二区三区激情视频| 免费观看人在逋| 亚洲乱码一区二区免费版| 九色国产91popny在线| 51国产日韩欧美| 日本a在线网址| 九色成人免费人妻av| 国产精品久久久久久精品电影| 日本 av在线| 久久亚洲精品不卡| 一a级毛片在线观看| eeuss影院久久| 国产精品av视频在线免费观看| 亚洲国产精品sss在线观看| 最好的美女福利视频网| 男女啪啪激烈高潮av片| 亚洲成人久久性| 精品国内亚洲2022精品成人| 色5月婷婷丁香| 一区二区三区高清视频在线| 精品午夜福利在线看| 国产伦人伦偷精品视频| 在线看三级毛片| 啦啦啦韩国在线观看视频| h日本视频在线播放| 亚洲真实伦在线观看| 九色成人免费人妻av| 18禁裸乳无遮挡免费网站照片| 男插女下体视频免费在线播放| 性欧美人与动物交配| 国产精品电影一区二区三区| 三级男女做爰猛烈吃奶摸视频| 亚洲成人精品中文字幕电影| 搡老妇女老女人老熟妇| 欧美丝袜亚洲另类 | 又黄又爽又刺激的免费视频.| 成人高潮视频无遮挡免费网站| 国产女主播在线喷水免费视频网站 | 91麻豆精品激情在线观看国产| 黄色视频,在线免费观看| 国产精品一区www在线观看 | 久久欧美精品欧美久久欧美| 成人av一区二区三区在线看| 色哟哟哟哟哟哟| 成人二区视频| 在线观看美女被高潮喷水网站| 在线免费观看的www视频| 国产主播在线观看一区二区| 黄片wwwwww| 高清日韩中文字幕在线| 欧美黑人欧美精品刺激| 欧美性猛交黑人性爽| 免费大片18禁| 丝袜美腿在线中文| 亚洲av第一区精品v没综合| 亚洲七黄色美女视频| 一区二区三区免费毛片| 真人一进一出gif抽搐免费| 毛片女人毛片| 成人一区二区视频在线观看| 不卡视频在线观看欧美| 国产乱人视频| 精品午夜福利在线看| 性色avwww在线观看| 国产v大片淫在线免费观看| 亚洲av中文字字幕乱码综合| 赤兔流量卡办理| 亚洲天堂国产精品一区在线| 日韩欧美精品v在线| 日本成人三级电影网站| 国语自产精品视频在线第100页| 精品一区二区三区av网在线观看| 国产欧美日韩精品一区二区| 国内精品一区二区在线观看| 人妻制服诱惑在线中文字幕| 99热精品在线国产| 国产精品一区二区免费欧美| 色av中文字幕| 国产成人aa在线观看| 免费在线观看成人毛片| 给我免费播放毛片高清在线观看| 午夜精品久久久久久毛片777| 熟女人妻精品中文字幕| 亚洲一区高清亚洲精品| 亚洲第一电影网av| 婷婷精品国产亚洲av在线| 国内精品美女久久久久久| 国产蜜桃级精品一区二区三区| 校园人妻丝袜中文字幕| 成年免费大片在线观看| 国内精品久久久久精免费| av天堂中文字幕网| 亚洲中文字幕一区二区三区有码在线看| 成人鲁丝片一二三区免费| 久久久久久久久久久丰满 | 久久久久久久久久久丰满 | 色5月婷婷丁香| 国产女主播在线喷水免费视频网站 | a级毛片免费高清观看在线播放| 一级av片app| 亚洲第一区二区三区不卡| 欧美一区二区亚洲| 欧美一级a爱片免费观看看| 自拍偷自拍亚洲精品老妇| 午夜老司机福利剧场| a级一级毛片免费在线观看| 亚洲精品成人久久久久久| 久久九九热精品免费| 日日摸夜夜添夜夜添av毛片 | av专区在线播放| 久久精品国产自在天天线| 亚洲国产色片| 国产乱人伦免费视频| 亚洲国产欧美人成| 国产色爽女视频免费观看| 午夜免费成人在线视频| 午夜精品在线福利| 精品福利观看| 校园人妻丝袜中文字幕| 日韩欧美在线乱码| 国产成年人精品一区二区| 国产中年淑女户外野战色| 网址你懂的国产日韩在线| 久久久久久国产a免费观看| 国产精品伦人一区二区| 看十八女毛片水多多多| 在线免费观看的www视频| 午夜老司机福利剧场| 国产精品永久免费网站| 亚洲av二区三区四区| 男女下面进入的视频免费午夜| 国产高清有码在线观看视频| 亚洲一区高清亚洲精品| 白带黄色成豆腐渣| 少妇丰满av| 欧美在线一区亚洲| 老女人水多毛片| 在线天堂最新版资源| 免费电影在线观看免费观看| 成人无遮挡网站| 黄色丝袜av网址大全| 亚洲经典国产精华液单| 在线免费观看的www视频| 春色校园在线视频观看| 看黄色毛片网站| 神马国产精品三级电影在线观看| 欧美激情在线99| 欧洲精品卡2卡3卡4卡5卡区| 成人毛片a级毛片在线播放| 中亚洲国语对白在线视频| 在线观看舔阴道视频| 国产精品一区二区三区四区久久| 如何舔出高潮| 精品久久久久久,| 国产精华一区二区三区| 特级一级黄色大片| 亚洲av免费在线观看| aaaaa片日本免费| 国产免费一级a男人的天堂| 亚洲aⅴ乱码一区二区在线播放| 免费一级毛片在线播放高清视频| 婷婷六月久久综合丁香| 精品欧美国产一区二区三| 免费人成在线观看视频色| 全区人妻精品视频| 九九在线视频观看精品| 久久人人精品亚洲av| 国产一区二区在线av高清观看| 午夜福利视频1000在线观看| 99热精品在线国产| 嫩草影视91久久| 天美传媒精品一区二区| 亚洲avbb在线观看| 日本成人三级电影网站| 国产国拍精品亚洲av在线观看| 一级黄片播放器| 伦精品一区二区三区| 国产高清激情床上av| 成年人黄色毛片网站| 中文字幕高清在线视频| 亚洲成人精品中文字幕电影| 91久久精品国产一区二区成人| 午夜久久久久精精品| 麻豆久久精品国产亚洲av| 啪啪无遮挡十八禁网站| 少妇高潮的动态图| 超碰av人人做人人爽久久| 99精品在免费线老司机午夜| 少妇丰满av| 干丝袜人妻中文字幕| 97碰自拍视频| 热99re8久久精品国产| 国产午夜福利久久久久久| 性插视频无遮挡在线免费观看| av在线亚洲专区| 99在线人妻在线中文字幕| 级片在线观看| 久久久久久伊人网av| 特大巨黑吊av在线直播| 人人妻人人澡欧美一区二区| 一级黄片播放器| 国产精品综合久久久久久久免费| 免费观看的影片在线观看| 免费无遮挡裸体视频| 一级毛片久久久久久久久女| 韩国av一区二区三区四区| 变态另类丝袜制服| 久久久久久久亚洲中文字幕| 国产精品,欧美在线| 亚洲avbb在线观看| ponron亚洲| 偷拍熟女少妇极品色| 国产久久久一区二区三区| 免费观看在线日韩| 超碰av人人做人人爽久久| 久久久久久久久久久丰满 | 精品久久久久久久久av| 国产v大片淫在线免费观看| 精品不卡国产一区二区三区| 黄色视频,在线免费观看| 亚洲男人的天堂狠狠| 三级男女做爰猛烈吃奶摸视频| 免费不卡的大黄色大毛片视频在线观看 | 内射极品少妇av片p| 婷婷六月久久综合丁香| 18禁黄网站禁片午夜丰满| 一个人看视频在线观看www免费| 亚洲av中文av极速乱 | 日韩av在线大香蕉| 欧美zozozo另类| 最后的刺客免费高清国语| 国产日本99.免费观看| 午夜福利成人在线免费观看| 国产av麻豆久久久久久久| 欧美日韩瑟瑟在线播放| 久久欧美精品欧美久久欧美| 99久久中文字幕三级久久日本| 亚洲国产色片| 亚洲精华国产精华液的使用体验 | 久久草成人影院| 亚洲精品一卡2卡三卡4卡5卡| 九色成人免费人妻av| 人妻久久中文字幕网| 12—13女人毛片做爰片一| 亚洲最大成人手机在线| 成年女人看的毛片在线观看| 国产亚洲av嫩草精品影院| 在线天堂最新版资源| 最后的刺客免费高清国语| 亚洲av二区三区四区| 亚洲黑人精品在线| 日韩,欧美,国产一区二区三区 | 在线a可以看的网站| 天天躁日日操中文字幕| 亚洲精品一卡2卡三卡4卡5卡| 啪啪无遮挡十八禁网站| 又紧又爽又黄一区二区| www.www免费av| 欧美日韩综合久久久久久 | 亚洲最大成人中文| 两个人视频免费观看高清| 亚洲va日本ⅴa欧美va伊人久久| 日本免费a在线| 国产午夜精品论理片| 18禁在线播放成人免费| 伊人久久精品亚洲午夜| 少妇猛男粗大的猛烈进出视频 | 在线观看舔阴道视频| 我要看日韩黄色一级片| 内射极品少妇av片p| 欧美日韩乱码在线| 日本熟妇午夜| 欧美zozozo另类| 白带黄色成豆腐渣| 午夜老司机福利剧场| 欧美区成人在线视频| 欧美xxxx黑人xx丫x性爽| 日本成人三级电影网站| 国产亚洲av嫩草精品影院| 亚洲第一区二区三区不卡| 亚洲最大成人手机在线| 国产乱人伦免费视频| 亚洲性夜色夜夜综合| 级片在线观看| av天堂在线播放| www.www免费av| 国产精品野战在线观看| 久久精品久久久久久噜噜老黄 | 麻豆成人午夜福利视频| 午夜福利在线观看免费完整高清在 | 日韩精品有码人妻一区| 精品人妻一区二区三区麻豆 | a级毛片a级免费在线| 赤兔流量卡办理| 中文字幕熟女人妻在线| 久久精品国产亚洲av涩爱 | 成人特级av手机在线观看| 看黄色毛片网站| 99九九线精品视频在线观看视频| 搞女人的毛片| 国产高清有码在线观看视频| av天堂中文字幕网| 在现免费观看毛片| 日本免费一区二区三区高清不卡| 国产中年淑女户外野战色| 亚洲精品一区av在线观看| 久久99热6这里只有精品| 亚洲国产精品sss在线观看| 午夜福利成人在线免费观看| 久久精品国产清高在天天线| 99热精品在线国产| 欧美性猛交╳xxx乱大交人| 韩国av一区二区三区四区| 国产伦人伦偷精品视频| 免费av不卡在线播放| 国模一区二区三区四区视频| 一级黄色大片毛片| 久9热在线精品视频| 一进一出抽搐gif免费好疼| 午夜福利视频1000在线观看| 国产乱人视频| 亚洲精品456在线播放app | 黄色丝袜av网址大全| 日日撸夜夜添| 国产探花在线观看一区二区| 欧美性猛交╳xxx乱大交人| 免费看光身美女| 毛片一级片免费看久久久久 | 69av精品久久久久久| 在线观看66精品国产| a在线观看视频网站| 身体一侧抽搐| 国产视频内射| 日本 av在线| 国产色爽女视频免费观看| 床上黄色一级片| 国产精品不卡视频一区二区| 狠狠狠狠99中文字幕| 变态另类成人亚洲欧美熟女| 麻豆成人午夜福利视频| 村上凉子中文字幕在线| 欧美国产日韩亚洲一区| АⅤ资源中文在线天堂| 欧美日韩国产亚洲二区| 欧美zozozo另类| 国产视频一区二区在线看| 99在线视频只有这里精品首页| 日韩人妻高清精品专区| 中出人妻视频一区二区| 丰满的人妻完整版| 99久久精品一区二区三区| 成熟少妇高潮喷水视频| 日本免费一区二区三区高清不卡| 99riav亚洲国产免费| 成人高潮视频无遮挡免费网站| 黄色视频,在线免费观看| 亚洲av成人精品一区久久| 婷婷色综合大香蕉| 99久久精品国产国产毛片| 欧美日韩黄片免| 三级毛片av免费| 亚洲成人中文字幕在线播放| 久久久久精品国产欧美久久久| 精品午夜福利在线看| 18+在线观看网站| 亚洲欧美日韩卡通动漫| 国产精品久久久久久久电影| 亚洲人成伊人成综合网2020| 精品国产三级普通话版| 亚洲在线观看片| 亚洲狠狠婷婷综合久久图片| 国语自产精品视频在线第100页| 亚洲四区av| 婷婷精品国产亚洲av在线| 欧美日韩亚洲国产一区二区在线观看| 精品久久久久久久久av| 久久久久免费精品人妻一区二区| 色精品久久人妻99蜜桃| 国内少妇人妻偷人精品xxx网站| 成人鲁丝片一二三区免费| 色综合亚洲欧美另类图片| 欧美潮喷喷水| 岛国在线免费视频观看| 麻豆成人av在线观看| 午夜爱爱视频在线播放| www日本黄色视频网| 一本精品99久久精品77| a级毛片a级免费在线| 国产精品国产高清国产av| 欧美成人a在线观看| 国产免费一级a男人的天堂| 美女高潮的动态| 一进一出好大好爽视频| 午夜日韩欧美国产| 欧美在线一区亚洲| 日韩欧美 国产精品| 久久草成人影院| 国产精品国产三级国产av玫瑰| 午夜免费男女啪啪视频观看 | 97超级碰碰碰精品色视频在线观看| 美女免费视频网站| 亚洲不卡免费看| 亚洲av成人av| 两性午夜刺激爽爽歪歪视频在线观看| 禁无遮挡网站| 国产男靠女视频免费网站| 直男gayav资源| 国产一区二区亚洲精品在线观看| 亚洲精华国产精华液的使用体验 | 热99在线观看视频| 国产精品伦人一区二区| 精品人妻1区二区| 午夜福利在线观看吧| 看免费成人av毛片| 嫩草影院新地址| 不卡视频在线观看欧美| 欧美成人a在线观看| 免费av不卡在线播放| 亚洲黑人精品在线| 亚洲欧美日韩东京热| 欧美精品国产亚洲| 97超级碰碰碰精品色视频在线观看| 永久网站在线| 久久国内精品自在自线图片| 成人国产综合亚洲| 嫩草影院入口| 看免费成人av毛片| 日本 欧美在线| 亚洲人成网站在线播放欧美日韩| 美女cb高潮喷水在线观看| 少妇熟女aⅴ在线视频| 午夜亚洲福利在线播放| 少妇熟女aⅴ在线视频| 夜夜爽天天搞| 国产精品亚洲一级av第二区| 久久久久国内视频| 亚洲专区国产一区二区| 18禁在线播放成人免费| 亚洲三级黄色毛片| 国产免费av片在线观看野外av| 亚洲成a人片在线一区二区| 熟女电影av网| 亚洲av熟女| 国产av麻豆久久久久久久| 色综合亚洲欧美另类图片| 99热这里只有是精品在线观看| 99国产极品粉嫩在线观看| 欧美3d第一页| 久久亚洲精品不卡| 国产精品一区二区免费欧美| 精品久久国产蜜桃| 在线播放无遮挡| 国产伦人伦偷精品视频| 欧美不卡视频在线免费观看| 一区二区三区免费毛片| 三级国产精品欧美在线观看| 国产中年淑女户外野战色| 午夜免费成人在线视频| 国产单亲对白刺激| 黄色女人牲交| 免费在线观看日本一区| 欧美性猛交╳xxx乱大交人| 黄色配什么色好看| 欧美xxxx黑人xx丫x性爽| 人妻夜夜爽99麻豆av| 成人性生交大片免费视频hd| av中文乱码字幕在线| 人妻久久中文字幕网| 国产精品国产三级国产av玫瑰| 成人一区二区视频在线观看| 国内毛片毛片毛片毛片毛片| 亚洲经典国产精华液单| 国产亚洲精品久久久com| 嫩草影视91久久| 如何舔出高潮| 97超视频在线观看视频| 高清在线国产一区| 久久99热这里只有精品18| 色播亚洲综合网| 又爽又黄a免费视频| 99热网站在线观看| 午夜精品一区二区三区免费看| 色综合站精品国产| 亚洲国产日韩欧美精品在线观看| 日日干狠狠操夜夜爽| 在线a可以看的网站| 亚洲欧美清纯卡通| 日本-黄色视频高清免费观看| 亚洲av免费高清在线观看| 国产亚洲精品久久久久久毛片| 午夜免费激情av| 999久久久精品免费观看国产| 最近在线观看免费完整版| 欧美+亚洲+日韩+国产| 干丝袜人妻中文字幕| 亚洲综合色惰| 99精品在免费线老司机午夜| 国产精品自产拍在线观看55亚洲| 少妇的逼水好多| 免费大片18禁| 伦理电影大哥的女人| 色精品久久人妻99蜜桃| 国产高潮美女av| 桃色一区二区三区在线观看| 草草在线视频免费看| 十八禁国产超污无遮挡网站| or卡值多少钱| 婷婷亚洲欧美|