IEEE Access (Jan 2020)

Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things

  • Xuyang Ding,
  • Ying Xie,
  • Pengxiao Li,
  • Mengtian Cui,
  • Jianying Chen

DOI
https://doi.org/10.1109/ACCESS.2020.3010513
Journal volume & issue
Vol. 8
pp. 136186 – 136197

Abstract

Read online

Mobile edge computing provides high computing power, data storage capacity and bandwidth requirements for Internet of Things (IoT) through edge servers that process data close to data sources or users. In practical, mobile edge computing can be used to implement image steganography in IoT. Considering imperceptibility, security and capacity are important indicators for image steganography, this paper propose an image steganography based on evolutionary multi-objective optimization (EMOsteg). The EMOsteg preprocesses the image through a high-pass filters bank to find noise and texture regions that are difficult to model. By perturbing the image on noise and texture regions in multiple directions, the embedded capacity is increased. By defining the imperceptibility and security as an antigen, defining the perturbation positions of the cover image as an antibody, the EMOsteg uses the artificial immune principle to heuristically obtain the perturbation population through feature extraction of the perturbation and adaptive evolution operations. And the Pareto optimal is used to find the optimal perturbation in the last generation population. The simulation experiments analyze the convergence of the algorithm and the diversity of the solutions. In simulation experiments, the MSE, PSNR and SSIM were adopted to evaluate the imperceptibility, and the results show that the MSE value of our algorithm is 0.000308, the PSNR is 82.7501 and the SSIM approaches 1, they are better than comparison algorithms. The average detection error $P_{E}$ under SPA was adopted to detect the security, and the results show that our algorithm is more robust against anti-SPA steganalysis. In order to evaluate the performance of real-time, the embedding time of the same secret under different algorithms were compared, and the results show that our algorithm is faster than comparison algorithms in the terminal. In summary, the proposed algorithm can maintain the image quality while resist steganalysis tools, and realize real-time processing.

Keywords