Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things

Mobile edge computing provides high computing power, data storage capacity and bandwidth requirements for Internet of Things (IoT) through edge servers that process data close to data sources or users. In practical, mobile edge computing can be used to implement image steganography in IoT. Consideri...

Full description

Bibliographic Details
Main Authors: Xuyang Ding, Ying Xie, Pengxiao Li, Mengtian Cui, Jianying Chen
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9144637/
id doaj-8dec456e71e64170b1b5ad182d07b712
record_format Article
spelling doaj-8dec456e71e64170b1b5ad182d07b7122021-03-30T03:20:52ZengIEEEIEEE Access2169-35362020-01-01813618613619710.1109/ACCESS.2020.30105139144637Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of ThingsXuyang Ding0https://orcid.org/0000-0002-8785-9015Ying Xie1https://orcid.org/0000-0001-8382-2656Pengxiao Li2Mengtian Cui3Jianying Chen4School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaNational Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, ChinaKey Laboratory for Computer Systems of State Ethnic Affairs Commission, Southwest Minzu University, Chengdu, ChinaKey Laboratory for Computer Systems of State Ethnic Affairs Commission, Southwest Minzu University, Chengdu, ChinaMobile edge computing provides high computing power, data storage capacity and bandwidth requirements for Internet of Things (IoT) through edge servers that process data close to data sources or users. In practical, mobile edge computing can be used to implement image steganography in IoT. Considering imperceptibility, security and capacity are important indicators for image steganography, this paper propose an image steganography based on evolutionary multi-objective optimization (EMOsteg). The EMOsteg preprocesses the image through a high-pass filters bank to find noise and texture regions that are difficult to model. By perturbing the image on noise and texture regions in multiple directions, the embedded capacity is increased. By defining the imperceptibility and security as an antigen, defining the perturbation positions of the cover image as an antibody, the EMOsteg uses the artificial immune principle to heuristically obtain the perturbation population through feature extraction of the perturbation and adaptive evolution operations. And the Pareto optimal is used to find the optimal perturbation in the last generation population. The simulation experiments analyze the convergence of the algorithm and the diversity of the solutions. In simulation experiments, the MSE, PSNR and SSIM were adopted to evaluate the imperceptibility, and the results show that the MSE value of our algorithm is 0.000308, the PSNR is 82.7501 and the SSIM approaches 1, they are better than comparison algorithms. The average detection error $P_{E}$ under SPA was adopted to detect the security, and the results show that our algorithm is more robust against anti-SPA steganalysis. In order to evaluate the performance of real-time, the embedding time of the same secret under different algorithms were compared, and the results show that our algorithm is faster than comparison algorithms in the terminal. In summary, the proposed algorithm can maintain the image quality while resist steganalysis tools, and realize real-time processing.https://ieeexplore.ieee.org/document/9144637/IoT securitymobile edge computingimage steganographyevolutionary multi-objective optimizationartificial immune
collection DOAJ
language English
format Article
sources DOAJ
author Xuyang Ding
Ying Xie
Pengxiao Li
Mengtian Cui
Jianying Chen
spellingShingle Xuyang Ding
Ying Xie
Pengxiao Li
Mengtian Cui
Jianying Chen
Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things
IEEE Access
IoT security
mobile edge computing
image steganography
evolutionary multi-objective optimization
artificial immune
author_facet Xuyang Ding
Ying Xie
Pengxiao Li
Mengtian Cui
Jianying Chen
author_sort Xuyang Ding
title Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things
title_short Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things
title_full Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things
title_fullStr Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things
title_full_unstemmed Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things
title_sort image steganography based on artificial immune in mobile edge computing with internet of things
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description Mobile edge computing provides high computing power, data storage capacity and bandwidth requirements for Internet of Things (IoT) through edge servers that process data close to data sources or users. In practical, mobile edge computing can be used to implement image steganography in IoT. Considering imperceptibility, security and capacity are important indicators for image steganography, this paper propose an image steganography based on evolutionary multi-objective optimization (EMOsteg). The EMOsteg preprocesses the image through a high-pass filters bank to find noise and texture regions that are difficult to model. By perturbing the image on noise and texture regions in multiple directions, the embedded capacity is increased. By defining the imperceptibility and security as an antigen, defining the perturbation positions of the cover image as an antibody, the EMOsteg uses the artificial immune principle to heuristically obtain the perturbation population through feature extraction of the perturbation and adaptive evolution operations. And the Pareto optimal is used to find the optimal perturbation in the last generation population. The simulation experiments analyze the convergence of the algorithm and the diversity of the solutions. In simulation experiments, the MSE, PSNR and SSIM were adopted to evaluate the imperceptibility, and the results show that the MSE value of our algorithm is 0.000308, the PSNR is 82.7501 and the SSIM approaches 1, they are better than comparison algorithms. The average detection error $P_{E}$ under SPA was adopted to detect the security, and the results show that our algorithm is more robust against anti-SPA steganalysis. In order to evaluate the performance of real-time, the embedding time of the same secret under different algorithms were compared, and the results show that our algorithm is faster than comparison algorithms in the terminal. In summary, the proposed algorithm can maintain the image quality while resist steganalysis tools, and realize real-time processing.
topic IoT security
mobile edge computing
image steganography
evolutionary multi-objective optimization
artificial immune
url https://ieeexplore.ieee.org/document/9144637/
work_keys_str_mv AT xuyangding imagesteganographybasedonartificialimmuneinmobileedgecomputingwithinternetofthings
AT yingxie imagesteganographybasedonartificialimmuneinmobileedgecomputingwithinternetofthings
AT pengxiaoli imagesteganographybasedonartificialimmuneinmobileedgecomputingwithinternetofthings
AT mengtiancui imagesteganographybasedonartificialimmuneinmobileedgecomputingwithinternetofthings
AT jianyingchen imagesteganographybasedonartificialimmuneinmobileedgecomputingwithinternetofthings
_version_ 1724183658297819136