Development of IoE Applications for Multimedia Security

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (20 September 2022) | Viewed by 16298

Special Issue Editor


E-Mail Website
Guest Editor
Department of Cyber Security, Kyungil University, 38424 Gyeongbuk, Korea
Interests: information security; data security; steganography; steganalysis; software programming
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Multimedia security is a big challenge to prevent any misuse including ownership and copyright problems. Multimedia security methodology such as digital watermarking, data encryption, steganography, and data hiding is developed for securing multimedia data.

This Special Issue’s aim is to explore security and privacy issues related to the Internet of Everything (IoE). We aim to give particular multimedia security on smart homes, consumer devices, embedded systems, and supporting infrastructures. Security issues also arise in connection with critical infrastructure, cyberphysical systems, customized industrial IoT/E, smart medicine, and smart automobiles.

Topics will include but not be limited to IoT/E applications and security for multimedia experiences on:

  • Multimedia security on smart homes;
  • IoE security and applications;
  • Data security on the Internet of Everything;
  • Applications of multimedia security in smart city;
  • Image and video steganography on embedded systems;
  • Security applications on smart devices;
  • System and software security of IoT/E devices;
  • Lightweight cryptography and protocols for IoT/E devices;
  • Security and privacy management of home IoT/E devices;
  • Security issues arising to IoT/E applications;
  • Privacy, reliability, and security issues raised by cyberphysical systems;
  • Malware in home IoT/E;
  • Multimedia security related to watermarking and steganography;
  • Multimedia data encryption and authentication on IoT/E;
  • Data hiding detection techniques;
  • Forensics-based data hiding systems.

Prof. Dr. Ki-Hyun Jung
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoE security applications
  • Multimedia security technologies
  • Ownership and copyright technologies

Published Papers (7 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 4708 KiB  
Article
Identification of Content-Adaptive Image Steganography Using Convolutional Neural Network Guided by High-Pass Kernel
by Saurabh Agarwal and Ki-Hyun Jung
Appl. Sci. 2022, 12(22), 11869; https://doi.org/10.3390/app122211869 - 21 Nov 2022
Cited by 3 | Viewed by 1607
Abstract
Digital images are very popular and commonly used for hiding crucial data. In a few instances, image steganography is misused for communicating with improper data. In this paper, a robust deep neural network is proposed for the identification of content-adaptive image steganography schemes. [...] Read more.
Digital images are very popular and commonly used for hiding crucial data. In a few instances, image steganography is misused for communicating with improper data. In this paper, a robust deep neural network is proposed for the identification of content-adaptive image steganography schemes. Multiple novel strategies are applied to improve detection performance. Two non-trainable convolutional layers is used to guide the proposed CNN with fixed kernels. Thirty-one kernels are used in both non-trainable layers, of which thirty are high-pass kernels and one is the neutral kernel. The layer-specific learning rate is applied for each layer. ReLU with customized thresholding is applied to achieve better performance. In the proposed method, image down-sampling is not performed; only the global average pooling layer is considered in the last part of the network. The experimental results are verified on BOWS2 and BOSSBase image sets. Content-adaptive steganography schemes, such as HILL, Mi-POD, S-UNIWARD, and WOW, are considered for generating the stego images with different payloads. In experimental analysis, the proposed scheme is compared with some of the latest schemes, where the proposed scheme outperforms other state-of-the-art techniques in the most cases. Full article
(This article belongs to the Special Issue Development of IoE Applications for Multimedia Security)
Show Figures

Figure 1

16 pages, 2827 KiB  
Article
Local-Moment-Driven Robust Reversible Data Hiding
by Yash Veer Singh, Shadab Khan, Santosh Kumar Shukla and Ki-Hyun Jung
Appl. Sci. 2022, 12(22), 11826; https://doi.org/10.3390/app122211826 - 21 Nov 2022
Cited by 2 | Viewed by 1001
Abstract
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then embeds the secret information into the MSB [...] Read more.
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then embeds the secret information into the MSB image so that intrusion by unintentional modifications can be avoided. In addition, the proposed scheme utilizes the prevalent correlation among the pixels on the MSB plane for optimal embedding. In the proposed scheme, a cover image is partitioned into sub-blocks at first, and pixel groups in the sub-block are formed according to local moment and moment-of-moment so that similar-intensity pixels can be grouped into the same group. Next, the secret data is embedded into the pixels of each group by selecting a pairwise embedding strategy adaptively which is based on the number of pixels in each group. As a result, the proposed LM-RRDH can limit the distortion while providing a decent embedding capacity. Further, a protection against non-malicious attacks such as Joint Photographic Experts Group (JPEG) compression is also provided. The experimental results show that the proposed scheme provides a superior quality to the previous works while providing a comparable embedding capacity. Full article
(This article belongs to the Special Issue Development of IoE Applications for Multimedia Security)
Show Figures

Figure 1

15 pages, 4014 KiB  
Article
Steganalysis of Context-Aware Image Steganography Techniques Using Convolutional Neural Network
by Saurabh Agarwal, Cheonshik Kim and Ki-Hyun Jung
Appl. Sci. 2022, 12(21), 10793; https://doi.org/10.3390/app122110793 - 25 Oct 2022
Cited by 4 | Viewed by 1822
Abstract
Image steganography is applied to hide some secret information. Occasionally, steganography is used for malicious purposes to hide inappropriate information. In this paper, a new deep neural network was proposed to detect context-aware steganography techniques. In the proposed scheme, a high-boost filter was [...] Read more.
Image steganography is applied to hide some secret information. Occasionally, steganography is used for malicious purposes to hide inappropriate information. In this paper, a new deep neural network was proposed to detect context-aware steganography techniques. In the proposed scheme, a high-boost filter was applied to alleviate the high-frequency while retaining the low-frequency details. The high-boost image was processed by thirty SRM high-pass filters to obtain thirty high-boost SRM filtered images. In the proposed CNN, two skip connections were used to collect information from multiple connections simultaneously. A clipped ReLU layer was considered in spite of the general ReLU layer. In constructing the CNN, a bottleneck approach was followed for an effective convolution. Only a single global average pooling layer was used to retain the complete flow of information. SVM was utilized instead of the softmax classifier to improve the detection accuracy. In the experimental results, the proposed technique was better than the existing techniques in terms of the detection accuracy and computational cost. The proposed scheme was verified on BOWS2 and BOSSBase datasets for the HILL, S-UNIWARD, and WOW context-aware steganography algorithms. Full article
(This article belongs to the Special Issue Development of IoE Applications for Multimedia Security)
Show Figures

Figure 1

17 pages, 5358 KiB  
Article
Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment
by Ibrahim Abunadi, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel and Ishfaq Yaseen
Appl. Sci. 2022, 12(8), 4026; https://doi.org/10.3390/app12084026 - 15 Apr 2022
Cited by 5 | Viewed by 1924
Abstract
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of Things (IoT) which finds helpful in several [...] Read more.
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of Things (IoT) which finds helpful in several applications namely smart city, smart home, precise agriculture, healthcare, logistics, etc. Despite the benefits of IoE, it is limited to processing and storage abilities, resulting in the degradation of device safety, privacy, and efficiency. Security and privacy become major concerns in the transmission of multimedia data over the IoE network. Encryption and image steganography is considered effective solutions to accomplish secure data transmission in the IoE environment. For resolving the limitations of the existing works, this article proposes an optimal multikey homomorphic encryption with steganography approach for multimedia security (OMKHES-MS) technique in the IoE environment. Primarily, singular value decomposition (SVD) model is applied for the separation of cover images into RGB elements. Besides, optimum pixel selection process is carried out using coyote optimization algorithm (COA). At the same time, the encryption of secret images is performed using poor and rich optimization (PRO) with multikey homomorphic encryption (MKHE) technique. Finally, the cipher image is embedded into the chosen pixel values of the cover image to generate stego image. For assessing the better outcomes of the OMKHES-MS model, a wide range of experiments were carried out. The extensive comparative analysis reported the supremacy of the proposed model over the rennet approaches interms of different measures. Full article
(This article belongs to the Special Issue Development of IoE Applications for Multimedia Security)
Show Figures

Figure 1

53 pages, 16895 KiB  
Article
An Approach to Build e-Health IoT Reactive Multi-Services Based on Technologies around Cloud Computing for Elderly Care in Smart City Homes
by Luis Jurado Pérez and Joaquín Salvachúa
Appl. Sci. 2021, 11(11), 5172; https://doi.org/10.3390/app11115172 - 02 Jun 2021
Cited by 10 | Viewed by 4619
Abstract
Although there are e-health systems for the care of elderly people, the reactive characteristics to enhance scalability and extensibility, and the use of this type of system in smart cities, have been little explored. To date, some studies have presented healthcare systems for [...] Read more.
Although there are e-health systems for the care of elderly people, the reactive characteristics to enhance scalability and extensibility, and the use of this type of system in smart cities, have been little explored. To date, some studies have presented healthcare systems for specific purposes without an explicit approach for the development of health services. Moreover, software engineering is hindered by agile management challenges regarding development and deployment processes of new applications. This paper presents an approach to develop health Internet of Things (IoT) reactive applications that can be widely used in smart cities for the care of elderly individuals. The proposed approach is based on the Rozanski and Woods’s iterative architectural design process, the use of architectural patterns, and the Reactive Manifesto Principles. Furthermore, domain-driven design and the characteristics of the emerging fast data architecture are used to adapt the functionalities of services around the IoT, big data, and cloud computing paradigms. In addition, development and deployment processes are proposed as a set of tasks through DevOps techniques. The approach validation was carried out through the implementation of several e-health services, and various workload experiments were performed to measure scalability and performance in certain parts of the architecture. The system obtained is flexible, scalable, and capable of handling the data flow in near real time. Such features are useful for users who work collaboratively in the care of elderly people. With the accomplishment of these results, one can envision using this approach for building other e-health services. Full article
(This article belongs to the Special Issue Development of IoE Applications for Multimedia Security)
Show Figures

Figure 1

17 pages, 3981 KiB  
Article
HSB-SPAM: An Efficient Image Filtering Detection Technique
by Saurabh Agarwal and Ki-Hyun Jung
Appl. Sci. 2021, 11(9), 3749; https://doi.org/10.3390/app11093749 - 21 Apr 2021
Cited by 4 | Viewed by 1622
Abstract
Median filtering is being used extensively for image enhancement and anti-forensics. It is also being used to disguise the traces of image processing operations such as JPEG compression and image resampling when utilized in image de-noising and smoothing tool. In this paper, a [...] Read more.
Median filtering is being used extensively for image enhancement and anti-forensics. It is also being used to disguise the traces of image processing operations such as JPEG compression and image resampling when utilized in image de-noising and smoothing tool. In this paper, a robust image forensic technique namely HSB-SPAM is proposed to assist in median filtering detection. The proposed technique considers the higher significant bit-plane (HSB) of the image to highlight the statistical changes efficiently. Further, multiple difference arrays along with the first order pixel difference is used to separate the pixel difference, and Laplacian pixel difference is applied to extract a robust feature set. To compact the size of feature vectors, the operation of thresholding on the difference arrays is also utilized. As a result, the proposed detector is able to detect median, mean and Gaussian filtering operations with higher accuracy than the existing detectors. In the experimental results, the performance of the proposed detector is validated on the small size and post JPEG compressed images, where it is shown that the proposed method outperforms the state of art detectors in the most of the cases. Full article
(This article belongs to the Special Issue Development of IoE Applications for Multimedia Security)
Show Figures

Figure 1

36 pages, 14494 KiB  
Article
Simulation of Scalability in Cloud-Based IoT Reactive Systems Leveraged on a WSAN Simulator and Cloud Computing Technologies
by Luis Jurado Pérez and Joaquín Salvachúa
Appl. Sci. 2021, 11(4), 1804; https://doi.org/10.3390/app11041804 - 18 Feb 2021
Cited by 8 | Viewed by 2570
Abstract
Implementing a wireless sensor and actuator network (WSAN) in Internet of Things (IoT) applications is a complex task. The need to establish the number of nodes, sensors, and actuators, and their location and characteristics, requires a tool that allows the preliminary determination of [...] Read more.
Implementing a wireless sensor and actuator network (WSAN) in Internet of Things (IoT) applications is a complex task. The need to establish the number of nodes, sensors, and actuators, and their location and characteristics, requires a tool that allows the preliminary determination of this information. Additionally, in IoT scenarios where a large number of sensors and actuators are present, such as in a smart city, it is necessary to analyze the scalability of these systems. Modeling and simulation can help to conduct an early study and reduce development and deployment times in environments such as a smart city. The design-time verification of the system through a network simulation tool is useful for the most complex and expensive part of the system formed by a WSAN. However, the use of real components for other parts of the IoT system is feasible by using cloud computing infrastructure. Although there are cloud computing simulators, the cloud layer is poorly developed for the requirements of IoT applications. Technologies around cloud computing can be used for the rapid deployment of some parts of the IoT application and software services using containers. With this framework, it is possible to accelerate the development of the real system, facilitate the rapid deployment of a prototype, and provide more realistic simulations. This article proposes an approach for the modeling and simulation of IoT systems and services in a smart city leveraged in a WSAN simulator and technologies of cloud computing. Our approach was verified through experiments with two use cases. (1) A model of sensor and actuator networks as an integral part of an IoT application to monitor and control parks in a city. Through this use case, we analyze the scalability of a system whose sensors constantly emit data. (2) A model for cloud-based IoT reactive parking lot systems for a city. Through our approach, we have created an IoT parking system simulation model. The model contains an M/M/c/N queuing system to simulate service requests from users. In this use case, the model replication through hierarchical modeling and scalability of a distributed parking reservation service were evaluated. This last use case showed how the simulation model could provide information to size the system through probability distribution variables related to the queuing system. The experimental results show that the use of simulation techniques for this type of application makes it possible to analyze scalability in a more realistic way. Full article
(This article belongs to the Special Issue Development of IoE Applications for Multimedia Security)
Show Figures

Figure 1

Back to TopTop