{"id":"https://openalex.org/W3122279026","doi":"https://doi.org/10.1109/tii.2021.3053595","title":"A Novel Image Steganography Method for Industrial Internet of Things Security","display_name":"A Novel Image Steganography Method for Industrial Internet of Things Security","publication_year":2021,"publication_date":"2021-01-22","ids":{"openalex":"https://openalex.org/W3122279026","doi":"https://doi.org/10.1109/tii.2021.3053595","mag":"3122279026"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2021.3053595","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3053595","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001499305","display_name":"M. Hassaballah","orcid":"https://orcid.org/0000-0001-5655-8511"},"institutions":[{"id":"https://openalex.org/I189575948","display_name":"South Valley University","ror":"https://ror.org/00jxshx33","country_code":"EG","type":"education","lineage":["https://openalex.org/I189575948"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"M. Hassaballah","raw_affiliation_strings":["Department of Computer Science, Faculty of Computers and Information, South Valley University, Qena, Egypt"],"raw_orcid":"https://orcid.org/0000-0001-5655-8511","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computers and Information, South Valley University, Qena, Egypt","institution_ids":["https://openalex.org/I189575948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086485725","display_name":"Mohamed Abdel Hameed","orcid":"https://orcid.org/0000-0002-2911-770X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohamed Abdel Hameed","raw_affiliation_strings":["Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor, Egypt","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062247805","display_name":"Ali Ismail Awad","orcid":"https://orcid.org/0000-0002-3800-0757"},"institutions":[{"id":"https://openalex.org/I184834183","display_name":"Al-Azhar University","ror":"https://ror.org/05fnp1145","country_code":"EG","type":"education","lineage":["https://openalex.org/I184834183"]},{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"education","lineage":["https://openalex.org/I190632392"]},{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["EG","GB","SE"],"is_corresponding":false,"raw_author_name":"Ali Ismail Awad","raw_affiliation_strings":["Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, U.K","Department of Computer Science, Electrical and Space Engineering, Lule\u00e5 University of Technology, Lule\u00e5, Sweden","Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Qena, Egypt"],"raw_orcid":"https://orcid.org/0000-0002-3800-0757","affiliations":[{"raw_affiliation_string":"Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, U.K","institution_ids":["https://openalex.org/I897542642"]},{"raw_affiliation_string":"Department of Computer Science, Electrical and Space Engineering, Lule\u00e5 University of Technology, Lule\u00e5, Sweden","institution_ids":["https://openalex.org/I190632392"]},{"raw_affiliation_string":"Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Qena, Egypt","institution_ids":["https://openalex.org/I184834183"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018267985","display_name":"Khan Muhammad","orcid":"https://orcid.org/0000-0002-5302-1150"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Khan Muhammad","raw_affiliation_strings":["Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-5302-1150","affiliations":[{"raw_affiliation_string":"Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul, South Korea","institution_ids":["https://openalex.org/I848706"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001499305"],"corresponding_institution_ids":["https://openalex.org/I189575948"],"apc_list":null,"apc_paid":null,"fwci":11.3596,"has_fulltext":false,"cited_by_count":154,"citation_normalized_percentile":{"value":0.9903537,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"17","issue":"11","first_page":"7743","last_page":"7751"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7735220789909363},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6960864067077637},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.6186751127243042},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.4742911458015442},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4465121626853943},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41718220710754395},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4139106273651123},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.37086713314056396}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7735220789909363},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6960864067077637},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.6186751127243042},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.4742911458015442},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4465121626853943},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41718220710754395},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4139106273651123},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.37086713314056396},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2021.3053595","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3053595","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1582596871","https://openalex.org/W2001994758","https://openalex.org/W2066178754","https://openalex.org/W2122942551","https://openalex.org/W2133665775","https://openalex.org/W2146621575","https://openalex.org/W2161022751","https://openalex.org/W2167436768","https://openalex.org/W2514128653","https://openalex.org/W2515172089","https://openalex.org/W2556536142","https://openalex.org/W2790316916","https://openalex.org/W2792905960","https://openalex.org/W2794584741","https://openalex.org/W2802611747","https://openalex.org/W2810150785","https://openalex.org/W2811266402","https://openalex.org/W2902106343","https://openalex.org/W2903968376","https://openalex.org/W2919979744","https://openalex.org/W2950464638","https://openalex.org/W2963828702","https://openalex.org/W2972714212","https://openalex.org/W2974429275","https://openalex.org/W2991197450","https://openalex.org/W2995366209","https://openalex.org/W2996234703","https://openalex.org/W2998816190","https://openalex.org/W3013707901","https://openalex.org/W3015253035","https://openalex.org/W3030941702","https://openalex.org/W3105479728","https://openalex.org/W3130652510","https://openalex.org/W6775711390"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2930153478","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W3154843532","https://openalex.org/W2068740952","https://openalex.org/W2182496537","https://openalex.org/W2792878404"],"abstract_inverted_index":{"The":[0,86,121,140,187],"rapid":[1],"development":[2],"of":[3,7,36,114,172,198,210],"the":[4,33,48,54,78,92,133,161,170,173,192,201,222,231],"Industrial":[5],"Internet":[6],"Things":[8],"(IIoT)":[9],"and":[10,21,38,42,53,74,138,183,204,225],"artificial":[11],"intelligence":[12],"(AI)":[13],"brings":[14],"new":[15],"security":[16,26,41,184,199,228],"threats":[17],"by":[18,160],"exposing":[19],"secret":[20,89,115,153],"private":[22],"data.":[23],"Thus,":[24,212],"information":[25,224],"has":[27],"become":[28],"a":[29,51,62,96],"major":[30],"concern":[31],"in":[32,77,91,230],"communication":[34,73],"environment":[35,80],"IIoT":[37,79],"AI,":[39],"where":[40],"privacy":[43],"must":[44],"be":[45,109],"ensured":[46],"for":[47,71],"messages":[49],"between":[50],"sender":[52],"intended":[55],"recipient.":[56],"In":[57],"this":[58,214],"article,":[59],"we":[60],"propose":[61],"method":[63,87,175,194],"called":[64,100],"Harris":[65],"hawks":[66],"optimization-integer":[67],"wavelet":[68,119],"transform":[69,152],"(HHO-IWT)":[70],"covert":[72],"secure":[75],"data":[76,90,116,154],"based":[81],"on":[82,132],"digital":[83],"image":[84,105],"steganography.":[85],"embeds":[88],"cover":[93],"images":[94],"using":[95],"metaheuristic":[97],"optimization":[98],"algorithm":[99],"HHO":[101,162],"to":[102,111,145,151,168,178],"efficiently":[103],"select":[104],"pixels":[106],"that":[107,191,205],"can":[108,216],"used":[110],"hide":[112],"bits":[113],"within":[117],"integer":[118],"transforms.":[120],"HHO-based":[122],"pixel":[123],"selection":[124],"operation":[125],"uses":[126],"an":[127,147,156],"objective":[128,141],"function":[129,142],"evaluation":[130],"depending":[131],"following":[134],"two":[135],"phases:":[136],"exploitation":[137],"exploration.":[139],"is":[143],"employed":[144],"determine":[146],"optimal":[148],"encoding":[149],"vector":[150],"into":[155],"encoded":[157],"form":[158],"generated":[159],"algorithm.":[163],"Several":[164],"experiments":[165],"are":[166],"conducted":[167],"validate":[169],"performance":[171],"proposed":[174],"with":[176],"respect":[177],"visual":[179],"quality,":[180],"payload":[181],"capacity,":[182],"against":[185],"attacks.":[186],"obtained":[188],"results":[189],"reveal":[190],"HHO-IWT":[193],"achieves":[195],"higher":[196],"levels":[197],"than":[200],"state-of-the-art":[202],"methods":[203],"it":[206],"resists":[207],"various":[208],"forms":[209],"steganalysis.":[211],"utilizing":[213],"approach":[215],"keep":[217],"unauthorized":[218],"individuals":[219],"away":[220],"from":[221],"transmitted":[223],"solve":[226],"some":[227],"challenges":[229],"IIoT.":[232]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":35},{"year":2024,"cited_by_count":39},{"year":2023,"cited_by_count":34},{"year":2022,"cited_by_count":29},{"year":2021,"cited_by_count":15}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
