Next Article in Journal
Influence of Artificial Soft Tissue on Intra-Operative Vibration Analysis Method for Primary Fixation Monitoring in Cementless Total Hip Arthroplasty
Next Article in Special Issue
Steganalysis of Context-Aware Image Steganography Techniques Using Convolutional Neural Network
Previous Article in Journal
Experimental Study on Frost Crystal Morphologies and Frosting Characteristics under Different Working Pressures
Previous Article in Special Issue
An Approach to Build e-Health IoT Reactive Multi-Services Based on Technologies around Cloud Computing for Elderly Care in Smart City Homes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment

by
Ibrahim Abunadi
1,
Hanan Abdullah Mengash
2,
Saud S. Alotaibi
3,
Mashael M. Asiri
4,
Manar Ahmed Hamza
5,*,
Abu Sarwar Zamani
5,
Abdelwahed Motwakel
5 and
Ishfaq Yaseen
5
1
Department of Information Systems, College of Computer and Information Sciences, Prince Sultan University, Riyadh 12435, Saudi Arabia
2
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
3
Department of Information Systems, College of Computing and Information System, Umm Al-Qura University, Mecca 24382, Saudi Arabia
4
Department of Computer Science, College of Science & Art at Mahayil, King Khalid University, Abha 62529, Saudi Arabia
5
Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(8), 4026; https://doi.org/10.3390/app12084026
Submission received: 19 February 2022 / Revised: 18 March 2022 / Accepted: 6 April 2022 / Published: 15 April 2022
(This article belongs to the Special Issue Development of IoE Applications for Multimedia Security)

Abstract

:
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of Things (IoT) which finds helpful in several applications namely smart city, smart home, precise agriculture, healthcare, logistics, etc. Despite the benefits of IoE, it is limited to processing and storage abilities, resulting in the degradation of device safety, privacy, and efficiency. Security and privacy become major concerns in the transmission of multimedia data over the IoE network. Encryption and image steganography is considered effective solutions to accomplish secure data transmission in the IoE environment. For resolving the limitations of the existing works, this article proposes an optimal multikey homomorphic encryption with steganography approach for multimedia security (OMKHES-MS) technique in the IoE environment. Primarily, singular value decomposition (SVD) model is applied for the separation of cover images into RGB elements. Besides, optimum pixel selection process is carried out using coyote optimization algorithm (COA). At the same time, the encryption of secret images is performed using poor and rich optimization (PRO) with multikey homomorphic encryption (MKHE) technique. Finally, the cipher image is embedded into the chosen pixel values of the cover image to generate stego image. For assessing the better outcomes of the OMKHES-MS model, a wide range of experiments were carried out. The extensive comparative analysis reported the supremacy of the proposed model over the rennet approaches interms of different measures.

1. Introduction

Internet of Everything (IoE) represents a fantastic vision in the future, where everything is interconnected to the Internet, thus facilitating decision-making and offering intelligent service. IoE application based on interdisciplinary technological innovation includes low power communications, big data analytics, sensor, and embedded techniques [1]. Over the years, increasing new technologies are emerged to provide new bricks to construct IoE. Firstly, the advancement in sensor and embedded techniques have made the Internet of Things (IoT) node being less energy consumption and more portable [2]. The IoT involves the interconnectivity of physical objects and data input and output, whereas the IoE is a comprehensive term that refers to the interconnectivity of various technologies, processes, and people. Next, the presence of Lower Power Wide Area Network (LPWAN) technology empowers the ubiquitous network connection of lower power IoT nodes [3]. Further, the availability of massive IoT data and the innovation in artificial intelligence have driven the intelligence of IoE. Thus, IoE is employed in wide-ranging applications like intelligent transportation systems, smart manufacturing, and smart agriculture. Figure 1 depicts the process of IoE.
Many possible security risks are experienced in IoE, attributed to the vulnerability of transmission protocol and resource limitation of IoE node [4]. Especially, the existing IoE mainly adopts the lower-cost and simplified access protocols for reducing cost of the network whereas it makes the communication vulnerable to malicious attacks like forging and eavesdropping. On the contrary, the data emitted from end node is eavesdropped (or wiretapped) by malicious node; at the same time, and pseudo-base-station could easily forge the standard IoE transmission connections to attain IoE data [5]. Thus, an efficient and easy-deployed security method is needed for protecting IoE communication from malicious attacks. Typically, encryption is utilized for ensuring data privacy and confidentiality, at the expense of utility (for example, searching on ciphertext becomes challenging and costly). Generally, Current encryption solution assumes that the cloud server is honest-but-curious, that implements search operation according to the agreed protocol however it might be interested in potentially learning sensitive data [6]. But in a real-time scenario the cloud server is highly possible to be semi-trusted in the sense that it never accessed or might delete rarely information to conduct partial search operation, output a fraction of inaccurate search results, cut costs (for example, minimizing computation overhead and storage space), etc. [7].
Steganography represents the fabrication technique that is utilized as digital information to the cover media. It provides security to the hidden and sensitive data existing in the image that is undetectable by human vision [8]. Still, several studies in this field are needed for selecting appropriate tradeoffs among the performance evaluations like payload capacity, security, and imperceptibility. Now, secure information is transmitted through text messages, images, audio, and videos files. To transmit this message in a hidden method, there is necessity for steganography. In this approach, the embedded secret message in the file is transported to the user alternatively, whereby the message is unconcealed [9]. Even though there is much software accessible online for data security, there is another software that is in usage by hackers for decrypting the hidden information [10].
This article proposes an optimal multikey homomorphic encryption with steganography approach for multimedia security (OMKHES-MS) technique in the IoE environment. The OMKHES-MS model initially uses singular value decomposition (SVD) model. In addition, the optimal pixel points in the cover image are chosen by the use of coyote optimization algorithm (COA). Moreover, the encryption of secret images is performed using poor and rich optimization (PRO) with multikey homomorphic encryption techniques. Furthermore, the cipher image is embedded into the chosen pixel values of the cover image to generate stego image. To investigate the enhanced performance of the OMKHES-MS model, a comprehensive simulation analysis is performed and the results are investigated under several aspects.

2. Related Works

In [11], a machine learning (ML) based structure was presented for identifying benign and malicious nodes from an IoE network functioning with big data. A new technique to co-operate of extreme gradient boosting (XGBoost) and deep learning (DL) techniques together with genetic particle swarm optimization (GPSO) technique for discovering the optimum structures of individual ML techniques are presented. But the simulation, it can be demonstrated that GPSO based learning techniques offer reliable, robust, and scalable solutions. The authors in [12] analyzed the existing structures utilized to develop secure IoE with big data analytics. Big data is a group of data created in the sensor embedding from nearby physical objects. This data was utilized to analyze surrounding and development depending upon the inference. IoE utilizes this information to automation of electronic equipment from the surrounding environments.
Mohanty et al. [13] presented a novel blockchain structure named as PUFchain and presents a novel consensus technique named “Proof of physical unclonable functions (PUF)-Enabled Authentication” (PoP) to be utilized from PUFchain. The presented PoP is the PUF combined as to before presented Proof-of-Authentication (PoAh) consensus technique is named as “HardwareAssisted PoAh (HA-PoAh)”. Miao et al. [14] introduced a fair and dynamic data sharing framework (FairDynDSF) from the multi-owner setting. Utilizing FairDynDSF, one is to verify the correctness of searching outcomes, dynamic update, attain fair arbitration, and multi-keyword search.
Singh et al. [15] proposed a secure structure Blockchain and Fog-based Architecture Network (BFAN) for IoE application from the smart city. The presented infrastructure secures sensitive information with Blockchain, encryption, and authentication. It supports the System-developer and Architect for deploying the application from smart city paradigm. The purpose of presented infrastructure is for reducing the latency and energy, and make sure enhanced security features with Blockchain technologies. Li et al. [16] presented a privacy-enhanced federated learning model for IoE. 2 processes that were executed in our systems such as local adaptive differential privacy (LADP) and randomized response (RR) processes. The RR was implemented for preventing the server from discovering if upgrades are gathered from all the rounds.

3. The Proposed Model

In this study, a new OMKHES-MS technique has been developed to accomplish security and privacy in the IoE environment. The OMKHES-MS model involves a series of processes namely SVD, COA based optimum pixel selection, MKHE based encryption, and PRO based key generation. Finally, the cipher image from the MKHE technique is embedded into the chosen pixel values of the cover image to generate stego image. The design of PRO algorithm helps in choosing optimum keys for the generation of cipher images. Figure 2 demonstrates the overall process of OMKHES-MS technique.

3.1. Singular Value Decomposition

SVD is an influential tool that takes several applications like pattern detection and data compression. SVD allows robust and reliable matrix factorizes for extracting the algebraic and geometric invariant features of images. The SVD factorization a square/non-square matrices as to 2 orthogonal matrices and singular value (SV) matrix. The spatial domain feature of images of the size 100 × 100 is demonstrated utilizing SVD by feature vector group of size 1 ×   100 . It can be predictable for speeding up the computational procedure by removing irrelevant features but preserving as a lot of data as feasible from the images. The SVD of rectangular real complex matrix A has been formulated as follows [17].
A = U Σ V T = [ u 11 u 1 m u 21 u 2 m u m 1 u m m ] × [ s 1 0 0 0 s 2 0 0 0 s m ] × [ v 11 v 1 n v 21 v 2 n v n 1 v n n ] n × n ,
where
U U T = I .  
V V T = I .
s 1 s 2 s 3 . s m .
where A refers to the m × n matrices, U implies the m × m orthonormal matrices, V signifies the n × n orthonormal matrices, and Σ defines the diagonal matrices of sizes m × n that is collected of SVs of A such that it holds non-negative number.
The diagonal entry of Σ matrix signifies the SV and it can be superior values related to the entries of U and V so that matrix of size m × n is decreased to vector of sizes n . The SV is ranked in descending order; a primary entry of SV matrix contains the best substantial data but the final entry at the vector comprises the least significant data. The SV has the energy data but the orthogonal matrices contain the essential data. U T and V T are the transpose of matrices U and V correspondingly. I demonstrates the identity matrix. The column of U is termed as left singular vector of A whereas the column of V is named as the right singular vector of A.

3.2. Optimal Pixel Selection Using COA

For selecting the pixel points in the cover image optimally, the COA is applied. A current metaheuristic method for global optimization named COA is adapted. The main concept is depending on canis latrans species that mostly exist in North America. The process is adopted for considering the social organization of the agent named coyotes that serves as an algorithmic construction. The social behavior of coyote serves as a design variable and it is determined in the following [18]:
s o c c p , t = x = ( x 1 ,   x 2 ,   x 3 ,   . ,   x D ) .  
This social condition includes adopting the coyote to the environment name f i t c p , t . The adaptation of the coyotes to the present social situation was evaluated by:
f i t c p , t = f ( s o c c p , t ) .  
Initially, the coyotes are arbitrarily allocated to the packs though the detail that they might leave sometimes their packs and developed solitary or affiliated to other packs. The coyote’s transfer among packs increases the interaction of population with their culture. An alpha is selected from the three COA alphas:
a l p h a = { s o c c p , t | a r g c = { 1 , 2 , .. N c } m i n f ( s o c c p , t )   } .  
With respect to the COA, it is assumed that each coyote has been ordered for exchanging the social culture. Thus, the present data of coyotes are interrelated and estimated as follows.
c u l t j p , t = { O ( N c + 1 ) 2 p , t N c   i s   o d d o N c 2 , j p , t + o ( N c 2 + 1 ) , j p t 2 o t h e r w i s e .  
The social condition ranking of each coyote at t instant is offered by variable O p , t . In another word, the median social condition of each coyote from that certain pack is applied for determining the cultural tendency. The birth of coyote represented as a g e c p , t , is a function of social grouping of two parents who are selected arbitrarily with regards to the effect of environment. Figure 3 demonstrates the flowchart of COA.
p u p j p , t = { s o c r 1 , j p , t   r n d j P s   o r   j = j 1 s o c r 2 , j p , t   r n d j P s + P a   o r   j = j 2 ,                                       R j   o t h e r w i s e
where s o c r 1 , j p , t and s o c r 2 , j p , t denotes the social condition of two coyotes r 1 and r 2 are randomly chosen and include the p t h pack at time t . j 1 and j 2 denote the dimension of optimization problem that is chosen arbitrarily. P s and P a represents the possibility of scattering and the possibility of association, correspondingly. R j is an arbitrarily created value in the range of variable bound. The cultural diversity of coyotes from the pack is performed by the two probabilities P s and P a , in the following:
P s = 1 D ,  
P a = 1 P s D ,  
where D show the problem dimension inside the pack. The coyote under alpha effect δ 1 and pack effect δ 2 , is defined in the following:
δ 1 = a l p h a p , t s o c c r 2 p , t ,
δ 2 = c u l t p , t s o c c r 2 p , t ,  
The alpha and pack effect remains significant parameter in the update of social coyote condition as follows:
s o c c p , t , n e w = s o c c p , t ,   o l d + r 1 · δ 1 + r 2 · δ 2 ,
The update procedure of the social condition can be accomplished by considering the subsequent condition:
s o c c p , t + 1 = { s o c c p , t , n e w   f i t c p , t , n e w   f i t c p , t s o c c p , t   o t h e r w i s e ,

3.3. Secret Image Encryption Using MKHE Technique

In order to effectually encrypt the secret image before steganography, the MKHE technique is applied. An MKHE is a cryptosystem that permits us for evaluating an arithmetic circuit on cipher-text, maybe encrypting in several keys. Assume that remains the message space with arithmetic infrastructure [19]. An MKHE method has 5 PPT techniques (Eval, Setup, Enc, KeyGen, and Dec). It is considered that all contributing parties have a reference (index) to their public and confidential keys. A multi-key cipher-text implicitly has an arranged set T = { i d 1 ,   ,   i d k } of connected references. For instance, a fresh cipher-text c t MKHE. E n c ( μ ; p k i d ) equals to single-element set T = { i d } but the size of references fixed obtains superior to the computation amongst cipher-text in various party developments.
  • Setup: p p MKHE. S e t u p ( 1 λ ) . Proceeds the secured parameter as input and returned the public parameterization. It can be considered that every other technique implicitly gets p p as input.
  • Key Generation: ( s k ,   p k ) MKHE. K e y G e n ( p p ) . Resultants a pair of confidential and public keys.
  • Encryption: c t <KHE. E n c ( μ ; p k ) . Encrypting a plaintext μ and resultants a cipher-text c t { 0 , 1 } * .
  • Decryption: μ MKHE. D e c ( c t ¯ ; { s k i d } i d T ) . To provide a cipher-text c t ¯ with equivalent order of confidential keys, outcomes a plaintext μ .
The Homomorphic estimation is defined as follows:
c t ¯ MKHE . E v a 1 ( C ,   ( c t ¯ ,   ,   c t ¯ l ) ,   { p k i d } i d T ) .  
To provide a circuit C , a tuple of multi-key cipher-text ( c t ¯ ,   ,   c t ¯ l ) and the equivalent group of public keys { p k i d } i d T , resultants a cipher-text c t ¯ . Its reference set is union T = T 1     T of reference sets T j of input cipher-text c t ¯ j for 1 j .
Semantic Security. To some 2 messages μ 0 , μ 1 , the distribution {MKHE. E n c ( μ i ; pk)} for i = 0 , 1 can be computationally indistinguishable whereas p p MKHE. S e t u p ( 1 λ ) and ( s k ,   p k ) MKHE. K e y G e n ( p p ) . Correctness and Compactness. An MKHE technique was compact once the size of cipher-texts related to k parties is bounded by poly ( λ ,   k ) to set a polynomial poly ( · . · ) . For 1 j , assume c t j be cipher-text (with reference set T j ) so that MKHE. D e c ( c t ¯ ,   { s k i d } i d T j ) = μ j Assume C : be circuit and c t ¯ MKHE . E v a l ( C ,   ( c t ¯ ,   , c t ¯ ) ,   { p k i d } i d T ) for T = T 1     T . Afterward,
MKHE .   D e c ( c t ¯ ,   { s k i d } i d T ) = C ( μ 1 ,   ,   μ ) .
The equality is replaced by estimated equality same as the Cheon, Kim, Kim and Song (CKKS) technique to estimate arithmetic [16].

3.4. Key Generation Using PRO Algorithm

For optimal key generation process, the PRO algorithm is applied, which depends on people’s wealth behavior in the society. Generally, it is classified into two financial groups within a society. Initially, it comprises of wealthier person (wealth is greater when compared to average). Second, it comprises poor people (wealth is lesser when compared to average). Rich economical class people attempt to extend the class gap by observing them from poor economical groups. During the optimization problem, every solution from the Poor population moves towards the global optimum solution in the searching space by learning from the rich solution from the rich population [20].
  • Solution encoding
Here, each Solution or Person in the population is characterized as binary vector. The person χ is characterized as χ = [ η 1 ,   η 2 ,   η 3 ,   ,   η n ] whereas n indicates the amount of features in text corpus. Each location of the solution or person α is binary value. η j { 0 ,   1 } , For instance, a solution or person determined as [0, 1, 0, 1, 0, 0, 1, 1, 1, 0] represents that the features or terms with index 2, 4, 7, 8 and 9 are chosen.
  • Initial population
The set of solutions from the present generation is named a population. The candidate solution in the population consists of the rich and poor economical solution or person. Consider ‘N’ is the population size. We arbitrarily create ‘N’ solutions with arbitrary numbers within [0, 1]. Next, the digitization procedure is employed to every location of solution to convert real value to binary values as follows
χ i , j = { 1 ,   χ i , j > r a n d 0 ,   o t h e r w i s e ,
where rand represents an arbitrary value among 0 and 1. The candidate solution in the population is ordered according to the objective function. The topmost part of the population is denoted as rich economic class of people and the bottom part of the population is represented as poor economic class of people.
P O P M a i n = P O P r i c h + P O P p o o r .
  • Fitness Function
The COA intends to derive an objective function depending upon the fitness function. The major intention of the COA is to design a novel image steganography technique with the minimization of error (MSE) and maximization of PNSR. It is evaluated as
F = { m i n ( M S E ) ,   m a x ( P S N R ) } .  
The desired minimized and maximized value is obtained by the use of the inspired Whale optimization technique.
  • Generating new solutions
The rich people move towards to rise the economic class gap by observing them from the poor economical group. The poor economical class people move towards to decrease the economic class gap by learning from the rich economical class for increasing the financial condition. The general behavior of rich and poor people can be utilized for generating a new solution.
χ n e w = χ r i c h ,   i , j o l d + α [ χ r i c h , i , j o l d | χ p o o r , b e s t , j o l d ] .
χ p o o r , i , j n e w = χ p o o r , i , j o l d + α [ ( χ r i c h , b e s t , j 0 + χ r i c h , m e a n , j 0 + χ r i c h , w o r s t , j 0 3 ) χ p o o r , i , j 0 ] .
To improve the level of security, the optimal keys of the MKHE technique are generated by the use of PRO algorithm.

4. Experimental Validation

4.1. Implementation Data

This section validates the performance of the OMKHES-MS technique using benchmark test images. The results are assessed under distinct such as Peak Signal Noise Ratio (PSNR), Maximum Difference (MD), Mean Squared Error (MSE), Root Mean Square Error (RMSE), Normalized Cross-Correlation (NCC), Average Difference (AD), maximum difference (MD), Normalized absolute Error (NAE), and Structural Content (SC). For enhanced performance, the values of PSNR, SC, and NCC should be as high as possible whereas MSE, RMSE, AD, NAE, and MD should be as low as possible.
Figure 4 shows the sample set of benchmark images used as secret images and the respective image histograms are offered in Figure 5.

4.2. Discussion

Table 1 reports the MSE and RMSE examination of the OMKHES-MS model under distinct images. The experimental results indicated the improvements of the OMKHES-MS model interms of MSE and RMSE.
Figure 6 illustrates the MSE inspection of the OMKHES-MS model with existing models on distinct images. The results indicated that the OMKHES-MS model has offered effectual outcomes with minimal values of MSE over the other WOA-EBS and GWO-EBS models. For instance, with Barbara image, the OMKHES-MS model has obtained lower MSE of 0.2715 whereas the WOA-EBS and GWO-EBS models have offered higher MSE of 0.2840 and 0.5407 respectively. Followed by, with Peppers image, the OMKHES-MS model has gained reduced MSE of 0.1937 whereas the WOA-EBS and GWO-EBS models have provided increased MSE of 0.2262 and 0.3053 respectively.
Figure 7 exemplifies the RMSE examination of the OMKHES-MS model with existing models on diverse images. The experimental values reported that the OMKHES-MS model has resulted in improved performance with lower values of RMSE over the other WOA-EBS and GWO-EBS models. For instance, with Barbara image, the OMKHES-MS model has attained decreased RMSE of 0.5211 whereas the WOA-EBS and GWO-EBS models have achieved increased RMSE of 0.5329 and 0.7353 respectively. In line with, Peppers image, the OMKHES-MS model has depicted minimal RMSE of 0.4401 whereas the WOA-EBS and GWO-EBS models have exhibited maximum RMSE of 0.4756 and 0.5525 respectively.
A comprehensive SC and PSNR assessment of the OMKHES-MS model is compared with recent methods in Table 2. The experimental values notified that the OMKHES-MS model has gained effectual outcome with maximum values of SC and PSNR. For instance, the OMKHES-MS model has offered higher SC of 0.9986, 0.9991, 0.9991, 0.9986, 0.9986, and 0.9987 on the test Barbara, Boat, Foreman, House, Isabe, and Peppers images respectively. At the same time, the OMKHES-MS model has provided increased PSNR of 59.4556 dB, 58.1759 dB, 63.5057 dB, 72.6470 dB, 58.2083 dB, and 62.3885 dB on the test Barbara, Boat, Foreman, House, Isabe, and Peppers images respectively.
A comparative SC analysis of the OMKHES-MS model with existing techniques under distinct test images is performed in Figure 8. The figure portrayed that the OMKHES-MS model has resulted in superior SC values under every image. For instance, with Barbara image, the OMKHES-MS model has accomplished higher SC of 0.9986 whereas the whale optimization algorithm (WOA)-EBS and grey wolf optimizer (GWO)-EBS models have attained lower SC of 0.9984 and 0.9984 respectively. Similarly, with Peppers image, the OMKHES-MS model has reached improved SC of 0.9987 whereas the WOA-EBS and GWO-EBS models have resulted in reduced SC of 0.9984 and 0.9985 respectively.
An extensive PSNR investigation of the OMKHES-MS model with recent approaches under distinct test images is made in Figure 9. The experimental values highlighted that the OMKHES-MS model has led to enhanced performance with increased PSNR values under every image. For instance, with Barbara image, the OMKHES-MS model has depicted superior PSNR of 59.4556 dB whereas the WOA-EBS and GWO-EBS models have exhibited inferior PSNR of 59.0647 dB and 53.4721 dB respectively. Likewise, with Peppers image, the OMKHES-MS model has exhibited increased PSNR of 62.3885 dB whereas the WOA-EBS and GWO-EBS models have implied decreased PSNR of 61.0412 dB and 58.4367 dB respectively.
A comprehensive AD and MD assessment of the OMKHES-MS model is compared with recent methods in Table 3. The experimental values notified that the OMKHES-MS model has gained effectual outcome with maximum values of AD and MD.
Figure 10 demonstrates the AD assessment of the OMKHES-MS model with existing models on dissimilar images. The results designated that the OMKHES-MS model has presented capable results with negligible values of AD over the other WOA-EBS and GWO-EBS models. For instance, with Barbara image, the OMKHES-MS model has gotten lesser AD of 0.0053 whereas the WOA-EBS and GWO-EBS models have presented greater AD of 0.0066 and 0.0067 respectively. Besides, with Pepper’s image, the OMKHES-MS model has extended decreased AD of 0.0005 whereas the WOA-EBS and GWO-EBS models have delivered enlarged AD of 0.0007 and 0.008 respectively.
Figure 11 represents the MD inspection of the OMKHES-MS model with existing models on diverse images. The experimental values reported that the OMKHES-MS model has accomplished better performance with lower values of MD over the other WOA-EBS and GWO-EBS models. For instance, with Barbara image, the OMKHES-MS model has reached lessened MD of 45.4132 whereas the WOA-EBS and GWO-EBS models have realized increased MD of 47.2942 and 46.6040 respectively. In line with, Peppers image, the OMKHES-MS model has depicted insignificant MD of 47.0321 whereas the WOA-EBS and GWO-EBS models have revealed maximum MD of 48.3379 and 49.8736 respectively.
A comprehensive NCC and NAE assessment of the OMKHES-MS model is compared with recent methods in Table 4. The experimental values notified that the OMKHES-MS model has gained effectual outcome with maximum values of NCC and NAE. A broad NCC assessment of the OMKHES-MS model with compared methods under several test images is provided in Figure 12. The figure portrayed that the OMKHES-MS model has resulted in better outcomes with improved NCC values under every image.
For instance, with Barbara image, the OMKHES-MS model has reached superior NCC of 0.9985 whereas the WOA-EBS and GWO-EBS models have shown lesser NCC of 0.9897 and 0.9905 respectively. Equally, with Peppers image, the OMKHES-MS model has displayed increased NCC of 0.9998 whereas the WOA-EBS and GWO-EBS models have inferred diminished NCC of 0.9918 and 0.9903 correspondingly.
Figure 13 illustrates the NAE analysis of the OMKHES-MS model with present models on diverse images. The simulation outcome revealed that the OMKHES-MS model has outperformed the other methods with least NAE values. For instance, with Barbara image, the OMKHES-MS model has reached decreased NAE of 0.0002 whereas the WOA-EBS and GWO-EBS models have realized increased NAE of 0.0016 and 0.0017 respectively. Moreover, with Peppers image, the OMKHES-MS model has portrayed negligible NAE of 0.0008 whereas the WOA-EBS and GWO-EBS techniques have presented supreme NAE of 0.0017 and 0.0020 respectively.
From the detailed results and discussion, it can be clear that the OMKHES-MS model has reached superior results over the other methods interms of different measures. Therefore, the OMKHES-MS model can be utilized as an effective tool for accomplishing multimedia security in the IoE environment.

5. Conclusions

In this study, a new OMKHES-MS technique has been developed to accomplish security and privacy in the IoE environment. The OMKHES-MS model involves a series of processes namely SVD, COA based optimum pixel selection, MKHE based encryption, and PRO based key generation. Finally, the cipher image from the MKHE technique is embedded into the chosen pixel values of the cover image to generate stego image. The design of PRO algorithm helps in choosing optimum keys for the generation of cipher images. To investigate the enhanced performance of the OMKHES-MS model, a comprehensive simulation analysis is performed and the results are investigated under several aspects. The extensive comparative analysis reported the supremacy of the proposed model over the rennet approaches interms of different measures. Therefore, the OMKHES-MS model can be utilized as an effective tool to accomplish security in the IoE environment. In future, lightweight crytographic techniques can be designed for IoE environment. Besides, detailed security analysis of the OMKHES-MS model will be made in our future work.

Author Contributions

Conceptualization, I.A. and A.M.; methodology, H.A.M.; software, I.Y.; validation, S.S.A., M.M.A. and A.S.Z.; formal analysis, M.A.H.; investigation, I.A.; resources, M.A.H.; data curation, I.Y.; writing—original draft preparation, H.A.M.; writing—review and editing, A.M; visualization, A.M.; supervision, S.S.A.; project administration, M.A.H.; funding acquisition, H.A.M. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (RGP 2/45/43). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R114), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code: (22UQU4210118DSR05). The authors would like to thank Prince Sultan University for its support in paying the Article Processing Charges.

Data Availability Statement

Data sharing not applicable to this article as no datasets were generated during the current study.

Conflicts of Interest

The authors declare no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.

References

  1. Dudeja, R.K.; Bali, R.S.; Aujla, G.S. Internet of Everything: Background and Challenges. In Software Defined Internet of Everything; Springer: Cham, Switzerland, 2022; pp. 3–12. [Google Scholar]
  2. Lu, H.; Su, S.; Tian, Z.; Zhu, C. A novel search engine for Internet of Everything based on dynamic prediction. China Commun. 2019, 16, 42–52. [Google Scholar]
  3. Juneja, S.; Gahlan, M.; Dhiman, G.; Kautish, S. Futuristic cyber-twin architecture for 6G technology to support internet of everything. Sci. Program. 2021, 2021, 9101782. [Google Scholar] [CrossRef]
  4. Petrescu, M.; Krishen, A.; Bui, M. The internet of everything: Implications of marketing analytics from a consumer policy perspective. J. Consum. Mark. 2020, 37, 675–686. [Google Scholar] [CrossRef]
  5. Sajid, M.; Harris, A.; Habib, S. Internet of Everything: Applications, and Security Challenges. In Proceedings of the 2021 International Conference on Innovative Computing (ICIC), Lahore, Pakistan, 9–10 November 2021; pp. 1–9. [Google Scholar]
  6. Padhi, P.; Charrua-Santos, F. 6G Enabled Industrial Internet of Everything: Towards a Theoretical Framework. Appl. Syst. Innov. 2021, 4, 11. [Google Scholar] [CrossRef]
  7. Wang, M.; Zhou, Z.; Ding, C. Blockchain-Based Decentralized Reputation Management System for Internet of Everything in 6G-Enabled Cybertwin Architecture. J. New Media 2021, 3, 137–150. [Google Scholar] [CrossRef]
  8. Sadi, M. Homomorphic encryption. In Emerging Topics in Hardware Security; Springer: Cham, Switzerland, 2021; pp. 281–307. [Google Scholar]
  9. Zhang, Z.; Cao, S.; Yang, X.; Liu, X.; Han, L. An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments. Peer-to-Peer Netw. Appl. 2021, 14, 3488–3501. [Google Scholar] [CrossRef]
  10. Srivastava, V.; Debnath, S.K.; Stǎnicǎ, P.; Pal, S.K. A multivariate identity-based broadcast encryption with applications to the internet of things. Adv. Math. Commun. 2021. [Google Scholar] [CrossRef]
  11. Pant, S.; Sharma, M.; Sharma, D.K.; Gupta, D.; Rodrigues, J.J.P.C. Enforcing Intelligent Learning-Based Security in the Internet of Everything. IEEE Internet Things J. 2021, 1. [Google Scholar] [CrossRef]
  12. Karthiban, M.K.; Raj, J.S. Big data analytics for developing secure internet of everything. J. ISMAC 2019, 1, 129–136. [Google Scholar]
  13. Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E.; Puthal, D. PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). IEEE Consum. Electron. Mag. 2020, 9, 8–16. [Google Scholar] [CrossRef] [Green Version]
  14. Miao, Y.; Liu, X.; Choo, K.-K.R.; Deng, R.H.; Wu, H.; Li, H. Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything. IEEE Internet Things J. 2019, 6, 7201–7212. [Google Scholar] [CrossRef]
  15. Singh, P.; Nayyar, A.; Kaur, A.; Ghosh, U. Blockchain and Fog Based Architecture for Internet of Everything in Smart Cities. Futur. Internet 2020, 12, 61. [Google Scholar] [CrossRef] [Green Version]
  16. Li, Z.; Tian, Y.; Zhang, W.; Liao, Q.; Liu, Y.; Du, X.; Guizani, M. RR-LADP: A Privacy-Enhanced Federated Learning Scheme for Internet of Everything. IEEE Consum. Electron. Mag. 2021, 10, 93–101. [Google Scholar] [CrossRef]
  17. Mohammed Abdelkader, E.; Moselhi, O.; Marzouk, M.; Zayed, T. HybridElman neural network and an invasive weed optimization method for bridge defect recognition. Transp. Res. Rec. 2021, 2675, 167–199. [Google Scholar] [CrossRef]
  18. Rezk, H.; Fathy, A.; Aly, M. A robust photovoltaic array reconfiguration strategy based on coyote optimization algorithm for enhancing the extracted power under partial shadow condition. Energy Rep. 2021, 7, 109–124. [Google Scholar] [CrossRef]
  19. Chen, H.; Dai, W.; Kim, M.; Song, Y. Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference. In In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 395–412. [Google Scholar]
  20. Moosavi, S.H.S.; Bardsiri, V.K. Poor and rich optimization algorithm: A new human-based and multi populations algorithm. Eng. Appl. Artif. Intell. 2019, 86, 165–181. [Google Scholar] [CrossRef]
Figure 1. Representation of IoE.
Figure 1. Representation of IoE.
Applsci 12 04026 g001
Figure 2. Overall process of OMKHES-MS technique.
Figure 2. Overall process of OMKHES-MS technique.
Applsci 12 04026 g002
Figure 3. Flowchart of COA.
Figure 3. Flowchart of COA.
Applsci 12 04026 g003
Figure 4. Sample set of Secret Images.
Figure 4. Sample set of Secret Images.
Applsci 12 04026 g004
Figure 5. Histogram of Secret Images.
Figure 5. Histogram of Secret Images.
Applsci 12 04026 g005
Figure 6. Comparative MSE analysis of OMKHES-MS technique with existing models.
Figure 6. Comparative MSE analysis of OMKHES-MS technique with existing models.
Applsci 12 04026 g006
Figure 7. Comparative RMSE analysis of OMKHES-MS technique with existing models.
Figure 7. Comparative RMSE analysis of OMKHES-MS technique with existing models.
Applsci 12 04026 g007
Figure 8. Comparative SC analysis of OMKHES-MS technique with existing models.
Figure 8. Comparative SC analysis of OMKHES-MS technique with existing models.
Applsci 12 04026 g008
Figure 9. Comparative PSNR analysis of OMKHES-MS technique with existing models.
Figure 9. Comparative PSNR analysis of OMKHES-MS technique with existing models.
Applsci 12 04026 g009
Figure 10. Comparative AD analysis of OMKHES-MS technique with existing models.
Figure 10. Comparative AD analysis of OMKHES-MS technique with existing models.
Applsci 12 04026 g010
Figure 11. Comparative MD analysis of OMKHES-MS technique with existing models.
Figure 11. Comparative MD analysis of OMKHES-MS technique with existing models.
Applsci 12 04026 g011
Figure 12. Comparative NCC analysis of OMKHES-MS technique with existing models.
Figure 12. Comparative NCC analysis of OMKHES-MS technique with existing models.
Applsci 12 04026 g012
Figure 13. Comparative NAE analysis of OMKHES-MS technique with existing models.
Figure 13. Comparative NAE analysis of OMKHES-MS technique with existing models.
Applsci 12 04026 g013
Table 1. MSE and RMSE analysis of OMKHES-MS technique with different images.
Table 1. MSE and RMSE analysis of OMKHES-MS technique with different images.
ImagesMSERMSE
OMKHES-MSWOA-EBSGWO-EBSOMKHES-MSWOA-EBSGWO-EBS
Barbara0.27150.28400.54070.52110.53290.7353
Boat0.31460.34470.85150.56090.58710.9228
Foreman0.17030.19130.27320.41270.43740.5227
House0.05950.07390.30370.24380.27180.5511
Isabe0.31340.34780.68240.55980.58970.8261
Peppers0.19370.22620.30530.44010.47560.5525
Table 2. SC and PSNR analysis of OMKHES-MS technique with different images.
Table 2. SC and PSNR analysis of OMKHES-MS technique with different images.
ImagesStructural ContentPeak Signal Noise Ratio
OMKHES-MS WOA-EBSGWO-EBSOMKHES-MS WOA-EBSGWO-EBS
Barbara0.99860.99840.998459.455659.064753.4721
Boat0.99910.99900.998958.175957.381849.5272
Foreman0.99910.99900.999063.505762.494859.3999
House0.99860.99840.998472.647070.759258.4823
Isabe0.99860.99840.998558.208357.304951.4495
Peppers0.99870.99840.998562.388561.041258.4367
Table 3. AD and MD analysis of OMKHES-MS technique with different images.
Table 3. AD and MD analysis of OMKHES-MS technique with different images.
ImagesAverage DifferenceMaximum Difference
OMKHES-MSWOA-EBSGWO-EBSOMKHES-MSWOA-EBSGWO-EBS
Barbara0.00530.00660.006745.413247.294246.6040
Boat0.01840.01940.019544.787046.810445.9838
Foreman0.02820.02960.029653.516054.984454.8858
House0.00090.00200.002253.163154.609754.3963
Isabe0.00080.00180.001743.898646.390745.2574
Peppers0.00050.00070.000847.032148.337949.8736
Table 4. NCC and NAE analysis of OMKHES-MS technique with different images.
Table 4. NCC and NAE analysis of OMKHES-MS technique with different images.
ImagesNormalized Cross-CorrelationNormalized Absolute Error
OMKHES-MSWOA-EBSGWO-EBSOMKHES-MSWOA-EBSGWO-EBS
Barbara0.99850.98970.99050.00020.00160.0017
Boat0.99800.98990.98990.00020.00100.0013
Foreman0.99870.99100.98960.00010.00110.0013
House0.99850.99060.99000.00100.00170.0023
Isabe0.99940.99040.99070.00040.00140.0016
Peppers0.99980.99180.99030.00080.00170.0020
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Abunadi, I.; Abdullah Mengash, H.; S. Alotaibi, S.; Asiri, M.M.; Ahmed Hamza, M.; Zamani, A.S.; Motwakel, A.; Yaseen, I. Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment. Appl. Sci. 2022, 12, 4026. https://doi.org/10.3390/app12084026

AMA Style

Abunadi I, Abdullah Mengash H, S. Alotaibi S, Asiri MM, Ahmed Hamza M, Zamani AS, Motwakel A, Yaseen I. Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment. Applied Sciences. 2022; 12(8):4026. https://doi.org/10.3390/app12084026

Chicago/Turabian Style

Abunadi, Ibrahim, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel, and Ishfaq Yaseen. 2022. "Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment" Applied Sciences 12, no. 8: 4026. https://doi.org/10.3390/app12084026

APA Style

Abunadi, I., Abdullah Mengash, H., S. Alotaibi, S., Asiri, M. M., Ahmed Hamza, M., Zamani, A. S., Motwakel, A., & Yaseen, I. (2022). Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment. Applied Sciences, 12(8), 4026. https://doi.org/10.3390/app12084026

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop