A Hybrid Optimization-Based Medical Data Hiding Scheme for Industrial Internet of Things Security

被引:16
|
作者
Anand, Ashima [1 ]
Singh, Amit Kumar [2 ]
机构
[1] Thapar Inst Engn & Technol, Dept CSE, Patiala 147004, Punjab, India
[2] Natl Inst Technol Patna, Dept CSE, Patna 800005, Bihar, India
关键词
Watermarking; Security; Discrete wavelet transforms; Encryption; Robustness; Medical services; Transforms; Cloud; copyright; healthcare; industrial Internet technology; optimization; security; watermarking;
D O I
10.1109/TII.2022.3164732
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the industrial internet technology, the medical data exchange in IoT systems has become more prosperous. Specially, more and more medical images produced by industrial and intelligent devices are outsourced to the cloud for convenient use. However, IoT systems deployment poses several medical data security challenges. To address this issue, in this article, a robust medical data hiding scheme based on secure hybrid optimization for industrial scenario image is presented. Specifically, the marked image is obtained through non-subsampled shearlet transform-multiresolution singular value decomposition. In order to generate the dual marks, we employ the Fisher-Yates permutation to produce the scrambled system watermark address for embedding into the mark image. Afterward, the generated mark image is embedded in the chosen coefficients of the cover in an invisible way. After the watermarking, a hybrid optimization-based encryption scheme is utilized to secure the marked image. Extensive experiments demonstrate the invisibility, security, and robustness of our scheme. Further, the superiority of the scheme is elaborated through making the comparison with the other similar algorithms. The solution not only performs the robust exchange of medical data but also protects the privacy of patients.
引用
收藏
页码:1051 / 1058
页数:8
相关论文
共 50 条
  • [31] Lightweight Security Scheme for Internet of Things
    Ahmed Aziz
    Karan Singh
    Wireless Personal Communications, 2019, 104 : 577 - 593
  • [32] A Simple Federated Learning-Based Scheme for Security Enhancement Over Internet of Medical Things
    Xu, Zhiang
    Guo, Yijia
    Chakraborty, Chinmay
    Hua, Qiaozhi
    Chen, Shengbo
    Yu, Keping
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2023, 27 (02) : 652 - 663
  • [33] Protocol Security in the Industrial Internet of Things
    Dahlmanns, Markus
    Wehrle, Klaus
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [34] A Secure and Lightweight Data Sharing Scheme for Internet of Medical Things
    Lu, Xiuqing
    Cheng, Xiangguo
    IEEE ACCESS, 2020, 8 : 5022 - 5030
  • [35] Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment
    Anupama, C. S. S.
    Alsini, Raed
    Supriya, N.
    Lydia, E. Laxmi
    Kadry, Seifedine
    Yeo, Sang-Soo
    Kim, Yongsung
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 3219 - 3233
  • [36] CD-BISHAC: Cross-Domain Scheme for Blockchain-Based Industrial Internet of Things Security Hybrid Access Control
    He, Buzhen
    Feng, Tao
    Liu, Chunyan
    Su, Chunhua
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 7164 - 7179
  • [37] Security Scheme for an RFID Access Control based on Internet of Things
    Isidro Alamillo-Montes, Genaro
    Martinez-Cruz, Alfonso
    Feregrino Uribe, Claudia
    2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [38] A Sharding Scheme-Based Many-Objective Optimization Algorithm for Enhancing Security in Blockchain-Enabled Industrial Internet of Things
    Cai, Xingjuan
    Geng, Shaojin
    Zhang, Jingbo
    Wu, Di
    Cui, Zhihua
    Zhang, Wensheng
    Chen, Jinjun
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) : 7650 - 7658
  • [39] Data Security in Internet of Things
    Rani, T.P.
    Suganthi, K.
    Smart Innovation, Systems and Technologies, 2022, 248 : 593 - 601
  • [40] Sensitive Data Hiding Scheme for Internet of Things using Function Call Obfuscation Techniques
    Shin, Jeongmi
    Ryu, Yeonseung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 169 - 180