Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things
Mobile edge computing provides high computing power, data storage capacity and bandwidth requirements for Internet of Things (IoT) through edge servers that process data close to data sources or users. In practical, mobile edge computing can be used to implement image steganography in IoT. Consideri...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9144637/ |
id |
doaj-8dec456e71e64170b1b5ad182d07b712 |
---|---|
record_format |
Article |
spelling |
doaj-8dec456e71e64170b1b5ad182d07b7122021-03-30T03:20:52ZengIEEEIEEE Access2169-35362020-01-01813618613619710.1109/ACCESS.2020.30105139144637Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of ThingsXuyang Ding0https://orcid.org/0000-0002-8785-9015Ying Xie1https://orcid.org/0000-0001-8382-2656Pengxiao Li2Mengtian Cui3Jianying Chen4School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSchool of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaNational Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, ChinaKey Laboratory for Computer Systems of State Ethnic Affairs Commission, Southwest Minzu University, Chengdu, ChinaKey Laboratory for Computer Systems of State Ethnic Affairs Commission, Southwest Minzu University, Chengdu, ChinaMobile edge computing provides high computing power, data storage capacity and bandwidth requirements for Internet of Things (IoT) through edge servers that process data close to data sources or users. In practical, mobile edge computing can be used to implement image steganography in IoT. Considering imperceptibility, security and capacity are important indicators for image steganography, this paper propose an image steganography based on evolutionary multi-objective optimization (EMOsteg). The EMOsteg preprocesses the image through a high-pass filters bank to find noise and texture regions that are difficult to model. By perturbing the image on noise and texture regions in multiple directions, the embedded capacity is increased. By defining the imperceptibility and security as an antigen, defining the perturbation positions of the cover image as an antibody, the EMOsteg uses the artificial immune principle to heuristically obtain the perturbation population through feature extraction of the perturbation and adaptive evolution operations. And the Pareto optimal is used to find the optimal perturbation in the last generation population. The simulation experiments analyze the convergence of the algorithm and the diversity of the solutions. In simulation experiments, the MSE, PSNR and SSIM were adopted to evaluate the imperceptibility, and the results show that the MSE value of our algorithm is 0.000308, the PSNR is 82.7501 and the SSIM approaches 1, they are better than comparison algorithms. The average detection error $P_{E}$ under SPA was adopted to detect the security, and the results show that our algorithm is more robust against anti-SPA steganalysis. In order to evaluate the performance of real-time, the embedding time of the same secret under different algorithms were compared, and the results show that our algorithm is faster than comparison algorithms in the terminal. In summary, the proposed algorithm can maintain the image quality while resist steganalysis tools, and realize real-time processing.https://ieeexplore.ieee.org/document/9144637/IoT securitymobile edge computingimage steganographyevolutionary multi-objective optimizationartificial immune |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xuyang Ding Ying Xie Pengxiao Li Mengtian Cui Jianying Chen |
spellingShingle |
Xuyang Ding Ying Xie Pengxiao Li Mengtian Cui Jianying Chen Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things IEEE Access IoT security mobile edge computing image steganography evolutionary multi-objective optimization artificial immune |
author_facet |
Xuyang Ding Ying Xie Pengxiao Li Mengtian Cui Jianying Chen |
author_sort |
Xuyang Ding |
title |
Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things |
title_short |
Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things |
title_full |
Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things |
title_fullStr |
Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things |
title_full_unstemmed |
Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things |
title_sort |
image steganography based on artificial immune in mobile edge computing with internet of things |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
Mobile edge computing provides high computing power, data storage capacity and bandwidth requirements for Internet of Things (IoT) through edge servers that process data close to data sources or users. In practical, mobile edge computing can be used to implement image steganography in IoT. Considering imperceptibility, security and capacity are important indicators for image steganography, this paper propose an image steganography based on evolutionary multi-objective optimization (EMOsteg). The EMOsteg preprocesses the image through a high-pass filters bank to find noise and texture regions that are difficult to model. By perturbing the image on noise and texture regions in multiple directions, the embedded capacity is increased. By defining the imperceptibility and security as an antigen, defining the perturbation positions of the cover image as an antibody, the EMOsteg uses the artificial immune principle to heuristically obtain the perturbation population through feature extraction of the perturbation and adaptive evolution operations. And the Pareto optimal is used to find the optimal perturbation in the last generation population. The simulation experiments analyze the convergence of the algorithm and the diversity of the solutions. In simulation experiments, the MSE, PSNR and SSIM were adopted to evaluate the imperceptibility, and the results show that the MSE value of our algorithm is 0.000308, the PSNR is 82.7501 and the SSIM approaches 1, they are better than comparison algorithms. The average detection error $P_{E}$ under SPA was adopted to detect the security, and the results show that our algorithm is more robust against anti-SPA steganalysis. In order to evaluate the performance of real-time, the embedding time of the same secret under different algorithms were compared, and the results show that our algorithm is faster than comparison algorithms in the terminal. In summary, the proposed algorithm can maintain the image quality while resist steganalysis tools, and realize real-time processing. |
topic |
IoT security mobile edge computing image steganography evolutionary multi-objective optimization artificial immune |
url |
https://ieeexplore.ieee.org/document/9144637/ |
work_keys_str_mv |
AT xuyangding imagesteganographybasedonartificialimmuneinmobileedgecomputingwithinternetofthings AT yingxie imagesteganographybasedonartificialimmuneinmobileedgecomputingwithinternetofthings AT pengxiaoli imagesteganographybasedonartificialimmuneinmobileedgecomputingwithinternetofthings AT mengtiancui imagesteganographybasedonartificialimmuneinmobileedgecomputingwithinternetofthings AT jianyingchen imagesteganographybasedonartificialimmuneinmobileedgecomputingwithinternetofthings |
_version_ |
1724183658297819136 |