{"id":"https://openalex.org/W7124985680","doi":"https://doi.org/10.1109/cloudcom67567.2025.11331536","title":"Smart City IoT Security Approach through Fuzzy-Tuned Intelligent Edge-based Image Steganography","display_name":"Smart City IoT Security Approach through Fuzzy-Tuned Intelligent Edge-based Image Steganography","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7124985680","doi":"https://doi.org/10.1109/cloudcom67567.2025.11331536"},"language":null,"primary_location":{"id":"doi:10.1109/cloudcom67567.2025.11331536","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom67567.2025.11331536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034971902","display_name":"AFM Zainul Abadin","orcid":"https://orcid.org/0009-0001-5647-8770"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"AFM Zainul Abadin","raw_affiliation_strings":["Center for Cyber Security, Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123379479","display_name":"Mohammad Kamrul Hasan","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohammad Kamrul Hasan","raw_affiliation_strings":["Center for Cyber Security, Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123437133","display_name":"Rossilawati Sulaiman","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Rossilawati Sulaiman","raw_affiliation_strings":["Center for Cyber Security, Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041854978","display_name":"Thippa Reddy Gadekallu","orcid":null},"institutions":[{"id":"https://openalex.org/I1284762954","display_name":"Zhejiang A & F University","ror":"https://ror.org/02vj4rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I1284762954"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Thippa Reddy Gadekallu","raw_affiliation_strings":["College of Mathematics and Computer Science, Zhejiang A&#x0026;F University,Hangzhou,China,311300"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Zhejiang A&#x0026;F University,Hangzhou,China,311300","institution_ids":["https://openalex.org/I1284762954"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5034971902"],"corresponding_institution_ids":["https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67372868,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.3785000145435333,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.3785000145435333,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12702","display_name":"Brain Tumor Detection and Classification","score":0.0737999975681305,"subfield":{"id":"https://openalex.org/subfields/2808","display_name":"Neurology"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.04349999874830246,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6448000073432922},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.6316999793052673},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5861999988555908},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.527999997138977},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4657999873161316},{"id":"https://openalex.org/keywords/smart-city","display_name":"Smart city","score":0.4392000138759613},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.4124000072479248},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.3919999897480011}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6657999753952026},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6448000073432922},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.6316999793052673},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5861999988555908},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.527999997138977},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4702000021934509},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4657999873161316},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4503999948501587},{"id":"https://openalex.org/C2777103469","wikidata":"https://www.wikidata.org/wiki/Q1231558","display_name":"Smart city","level":3,"score":0.4392000138759613},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.4124000072479248},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.3919999897480011},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.38690000772476196},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.382999986410141},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.35030001401901245},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.33719998598098755},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.3334999978542328},{"id":"https://openalex.org/C193536780","wikidata":"https://www.wikidata.org/wiki/Q1513153","display_name":"Edge detection","level":4,"score":0.32760000228881836},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3109000027179718},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.29499998688697815},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cloudcom67567.2025.11331536","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom67567.2025.11331536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3390176800","display_name":null,"funder_award_id":"FRGS/1/2020/ICT01/UKM/02/4","funder_id":"https://openalex.org/F4320321147","funder_display_name":"Ministry of Higher Education"},{"id":"https://openalex.org/G4859817618","display_name":null,"funder_award_id":"2023\u2013010","funder_id":"https://openalex.org/F4320322699","funder_display_name":"Universiti Kebangsaan Malaysia"}],"funders":[{"id":"https://openalex.org/F4320321147","display_name":"Ministry of Higher Education","ror":"https://ror.org/0512bh102"},{"id":"https://openalex.org/F4320322699","display_name":"Universiti Kebangsaan Malaysia","ror":"https://ror.org/00bw8d226"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2570248523","https://openalex.org/W2804653448","https://openalex.org/W2890733587","https://openalex.org/W2910016065","https://openalex.org/W2995861917","https://openalex.org/W3001128173","https://openalex.org/W3095412585","https://openalex.org/W3122279026","https://openalex.org/W3185504986","https://openalex.org/W3213358096","https://openalex.org/W4226310015","https://openalex.org/W4313459378","https://openalex.org/W4379514128","https://openalex.org/W4383423838","https://openalex.org/W4385707774","https://openalex.org/W4393110979","https://openalex.org/W4394985556","https://openalex.org/W4401400039","https://openalex.org/W4401640383","https://openalex.org/W4402447877","https://openalex.org/W4404075290","https://openalex.org/W4412196226","https://openalex.org/W4415153536","https://openalex.org/W4415153598","https://openalex.org/W7125790544"],"related_works":[],"abstract_inverted_index":{"In":[0,148],"the":[1,68,169],"era":[2],"of":[3,12,70,140],"smart":[4,204],"cities,":[5],"securing":[6],"sensitive":[7],"data":[8,106,174],"transmitted":[9],"through":[10],"Internet":[11],"Things":[13],"(IoT)":[14],"devices":[15],"has":[16],"become":[17],"a":[18,24,42,53,76,84],"critical":[19],"challenge.":[20],"This":[21,189],"paper":[22],"presents":[23],"novel":[25],"Fuzzy-Tuned":[26],"Intelligent":[27],"Edge-based":[28],"Image":[29],"Steganography":[30],"framework":[31],"designed":[32],"to":[33,47,63,92],"enhance":[34],"IoT":[35,200],"communication":[36],"security.":[37],"The":[38,104,165],"proposed":[39],"method":[40],"employs":[41],"weighted":[43],"fuzzy":[44],"logic":[45],"system":[46],"detect":[48],"meaningful":[49],"edge":[50,65,73,96,113],"regions":[51],"in":[52,75,198],"cover":[54],"image,":[55],"guided":[56],"by":[57],"gradient":[58],"magnitude":[59],"and":[60,101,143,158,177,185],"local":[61],"entropy":[62,159],"assign":[64],"strength,":[66],"enabling":[67],"selection":[69],"fine,":[71],"imperceptible":[72],"pixels":[74],"4-MSB":[77],"image.":[78],"To":[79],"ensure":[80],"optimal":[81],"embedding":[82,102,187],"locations,":[83],"Particle":[85],"Swarm":[86],"Optimization":[87],"(PSO)":[88],"algorithm":[89],"is":[90,107],"applied":[91],"intelligently":[93],"select":[94],"high-entropy":[95],"pixels,":[97],"maximizing":[98],"both":[99],"imperceptibility":[100],"capacity.":[103],"secret":[105],"then":[108],"embedded":[109],"within":[110],"these":[111],"optimized":[112],"regions,":[114],"preserving":[115],"visual":[116,138],"fidelity":[117],"while":[118],"ensuring":[119],"robust":[120],"concealment.":[121],"Comprehensive":[122],"testing":[123],"was":[124],"carried":[125],"out":[126],"on":[127,135],"widely":[128],"used":[129],"benchmark":[130],"datasets,":[131],"with":[132,182],"evaluation":[133],"based":[134],"indicators":[136],"like":[137],"analysis":[139],"cover-stego":[141],"image":[142,178],"their":[144],"corresponding":[145],"histogram":[146],"plots.":[147],"addition,":[149],"Peak":[150],"Signal-to-Noise":[151],"Ratio":[152],"(PSNR),":[153],"Structural":[154],"Similarity":[155],"Index":[156],"(SSIM),":[157],"are":[160],"evaluated":[161],"for":[162,194],"further":[163],"analysis.":[164],"findings":[166],"reveal":[167],"that":[168],"introduced":[170],"approach":[171],"provides":[172],"enhanced":[173],"protection,":[175],"robustness,":[176],"quality":[179],"when":[180],"compared":[181],"conventional":[183],"edge-detection":[184],"random":[186],"techniques.":[188],"model":[190],"proves":[191],"highly":[192],"effective":[193],"secure":[195],"information":[196],"exchange":[197],"low-resource":[199],"systems":[201],"integrated":[202],"into":[203],"city":[205],"networks.":[206]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-21T00:00:00"}
