A Hybrid Optimization-Based Medical Data Hiding Scheme for Industrial Internet of Things Security

被引:16
|
作者
Anand, Ashima [1 ]
Singh, Amit Kumar [2 ]
机构
[1] Thapar Inst Engn & Technol, Dept CSE, Patiala 147004, Punjab, India
[2] Natl Inst Technol Patna, Dept CSE, Patna 800005, Bihar, India
关键词
Watermarking; Security; Discrete wavelet transforms; Encryption; Robustness; Medical services; Transforms; Cloud; copyright; healthcare; industrial Internet technology; optimization; security; watermarking;
D O I
10.1109/TII.2022.3164732
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the industrial internet technology, the medical data exchange in IoT systems has become more prosperous. Specially, more and more medical images produced by industrial and intelligent devices are outsourced to the cloud for convenient use. However, IoT systems deployment poses several medical data security challenges. To address this issue, in this article, a robust medical data hiding scheme based on secure hybrid optimization for industrial scenario image is presented. Specifically, the marked image is obtained through non-subsampled shearlet transform-multiresolution singular value decomposition. In order to generate the dual marks, we employ the Fisher-Yates permutation to produce the scrambled system watermark address for embedding into the mark image. Afterward, the generated mark image is embedded in the chosen coefficients of the cover in an invisible way. After the watermarking, a hybrid optimization-based encryption scheme is utilized to secure the marked image. Extensive experiments demonstrate the invisibility, security, and robustness of our scheme. Further, the superiority of the scheme is elaborated through making the comparison with the other similar algorithms. The solution not only performs the robust exchange of medical data but also protects the privacy of patients.
引用
收藏
页码:1051 / 1058
页数:8
相关论文
共 50 条
  • [41] A puncturable attribute-based data sharing scheme for the Internet of Medical Robotic Things
    Basudan, Sultan
    LIBRARY HI TECH, 2022, 40 (04) : 1064 - 1080
  • [42] THE APPLICATION OF CLOUD DATA INTEGRITY VERIFICATION SCHEME IN INTERNET OF THINGS SECURITY
    Sai, Wei
    Zhang, Xinpeng
    Xie, Chengyang
    Li, Hong
    Zhang, Hui
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 268 - 273
  • [43] Authentication scheme for industrial Internet of things based on DAG blockchain
    Fei T.
    Kun D.
    Zhangtao Y.
    Guowei L.
    Fei, Tang (tangfei@cqupt.edu.cn), 1600, Beijing University of Posts and Telecommunications (28): : 1 - 12
  • [44] Authentication scheme for industrial Internet of things based on DAG blockchain
    Tang Fei
    Dong Kun
    Ye Zhangtao
    Ling Guowei
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2021, 28 (06) : 1 - 12
  • [45] fABElous: An Attribute-Based Scheme for Industrial Internet of Things
    La Manna, Michele
    Perazzo, Pericle
    Rasori, Marco
    Dini, Gianluca
    2019 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2019), 2019, : 33 - 38
  • [46] A Hybrid RF-FSO Offloading Scheme for Autonomous Industrial Internet of Things
    Pliatsios, Dimitrios
    Lagkas, Thomas
    Argyriou, Vasileios
    Sarigiannidis, Antonios
    Margounakis, Dimitrios
    Saoulidis, Theocharis
    Sarigiannidis, Panagiotis
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [47] Privacy Information Security Classification for Internet of Things Based on Internet Data
    Lu, Xiaofeng
    Qu, Zhaowei
    Li, Qi
    Hui, Pan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [48] Ontology-Based Security Recommendation for the Internet of Medical Things
    Alsubaei, Faisal
    Abuhussein, Abdullah
    Shiva, Sajjan
    IEEE ACCESS, 2019, 7 : 48948 - 48960
  • [49] Blockchain-based Security for Internet of Medical Things Application
    Ramzan, Taha
    Zafar, Saima
    2022 INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS), 2022, : 69 - 74
  • [50] Robust Optimization-Based Watermarking Scheme for Sequential Data
    Ayday, Erman
    Yilmaz, Emre
    Yilmaz, Arif
    PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 323 - 336