Skip to main content
Log in

A new fog based security strategy (FBS2) for reliable image transmission

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Fog computing has become a fast intermediate between the cloud and the internet of things (IOT) devices. So, the communication channel between the fog and IOT devices must be secured against attacks. Both Cryptography and steganography are well-known techniques for data security. Each of them has its own advantages and strength points, hence, combining Cryptography and steganography in a hybrid system certainly promotes the system’s level of security. Although several hybrid security strategies have been proposed, they suffer from many drawbacks especially when they are applied in fog environments. Fog computing requires not only high security level but also a real time transmission. Hence, recent hybrid security strategies cannot be applied directly in fog environments as they suffer from long processing time. This paper introduces a new Fog Based Security Strategy (FBS2). FBS2 is a hybrid security strategy as it combines Cryptography and steganography techniques. The proposed Cryptography Technique (PCT) is divided into two phases, namely; confusion and diffusion. The former scrambles the secret image pixels, while the latter changes the pixels values using new confusion and diffusion methodologies respectively. Confusion divides the secret images into closed loops of pixels, then rearrange the pixels into straight paths, while diffusion employs a Programmable Linear Feedback Shift Register (PLFSR). On the other hand, the Proposed Steganography Technique is implemented using the discrete wavelet packet transform. Embedding process depends on a new matching procedure, which is based on the most significant bits of both the encrypted secret image and the corresponding employed cover image pixels. Least significant bits (LSBs) are used as indicators to the matching process. At first an intermediate code is derived from the matching process, then, it is encrypted to represent the LSBs of the stego-image. Experimental results have shown that the proposed FBS2 outperforms the previous counterparts in terms of efficiency, security, and processing time, which proves its suitability for application on the fog.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38
Fig. 39
Fig. 40
Fig. 41
Fig. 42
Fig. 43

Similar content being viewed by others

References

  • Ahmed A, Bassem A, Hossain M, Samir E, Ahmed G (2018) Secure quantum steganography protocol for fog cloud internet of things. IEEE Access 6:10332–10340

    Article  Google Scholar 

  • Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21:34–42

    Article  Google Scholar 

  • Ammar M, Abdelhamied A, Abdukodir K, Irina G, Abdelrahman A, Konstantin S, Andrey K (2019) Secure IoT network structure based on distributed Fog computing, with SDN/Blockchain. J Sens Actuator Netw 8:15. https://www.researchgate.net/publication/330702991

  • Anita P, Sekhar K, Gandharba S (2018) Digital image steganography using LSB substitution, PVD, and EMD. Math Probl Eng. https://doi.org/10.1155/2018/1804953

    Article  Google Scholar 

  • Ankita B, Mohit D, Dua Shelza (2018) A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform. J Ambient Intell Human Comput 10:3519–3531. https://doi.org/10.1007/s12652-018-1072-0

    Article  Google Scholar 

  • Arwa A, Abdulrahman A, Chunqiang H, Xiaoshuang X, Xiuzhen C (2017) An attribute-based encryption scheme to secure fog communications. IEEE Access 5:9131–9138

    Article  Google Scholar 

  • Ashraf D, Aboul Ella H, Mohamed E, Arun S, Khan M (2017) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0659-1

    Article  Google Scholar 

  • Awais M, Munam S, Hasan K, Ikram U, Muhammad K (2019) Multi-tier authentication schemes for fog computing: architecture, security perspective, and challenges. Int J Commun Syst. https://doi.org/10.1002/dac.4033

    Article  Google Scholar 

  • Bao Z, Guo Y, Li X et al (2019) A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01345-8

    Article  Google Scholar 

  • Blanca C, Manuel D (2018) Steganography algorithm based on the nonlocal maximum likelihood noise estimation for mobile applications. Secur Commun Netw. https://doi.org/10.1155/2018/1404826

    Article  Google Scholar 

  • Bridget M, Frank M, Don B, Arsalan M, Riaz Z, Susanto I, Sven S, John Z (2017) Open fog security requirements and approaches. IEEE fog world congress USA. https://doi.org/10.1109/FWC.2017.8368537

  • Carlo P, Carlo V, Enzo M, Giovanni M, Francesco L, Antonio P (2019) Container migration in the fog: a performance evaluation. Sensors 19:1488

    Article  Google Scholar 

  • Chong F, Gao Z, Mai Z, Zhe C, Wei L (2018) A new chaos-based color image encryption scheme with an efficient substitution key stream generation strategy. Hindawi Secur Commun Netw. https://doi.org/10.1155/2018/2708532

    Article  Google Scholar 

  • Deepak P, Mohammad O, Priyadarsi N, Mukesh P, Saraju M, Albert Z (2018) Secure and sustainable load balancing of edge data centers in fog computing. IEEE Commun Mag 56:60–65

    Google Scholar 

  • Dena A, Salah A (2018) Image encryption algorithm based on Rc4 and henon map. J Theor Appl Inf Technol 96:7065–7076

    Google Scholar 

  • Deniz E, Nursin C (2018) An efficient image encryption algorithm for the period of Arnold’s CAT map. Int J Intell Syst Appl Eng 6:80–84

    Google Scholar 

  • Gandharba S (2018) High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis. Secur Commun Netw. https://www.researchgate.net/publication/319644497

  • Gupta B, Nalin A, Konstantinos P (2017) Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommun Syst 67:247–267. https://www.researchgate.net/publication/317044956

  • Hany D, Robert W, Gary W (2018) Fog computing and the internet of things: a review. Big Data Cogn Comput. https://doi.org/10.3390/bdcc2020010

    Article  Google Scholar 

  • Hikmat A, Sura Y, Alejandro V (2018) Spatial and transform domain based steganography using chaotic maps for color images. J Fundam Appl Sci 10:551–556

    Google Scholar 

  • Ivan S, Sheng W (2014) The fog computing paradigm: scenarios and security issues. Fed Conf Comput Sci Inf Syst 2:1–8

    Google Scholar 

  • Jimoh Y, Shafi A, Haruna C, Haruna C, Mohammed A (2019) Security challenges in fog-computing environment: a systematic appraisal of current developments. J Reliab Intell Environ. https://doi.org/10.1007/s40860-019-00081-2

    Article  Google Scholar 

  • Kanghyo L, Donghyun K, Dongsoo H, Ubaidullah R, Heekuck O (2015) On security and privacy issues of fog computing supported Internet of Things environment. Conf Netw Future. https://doi.org/10.1109/nof.2015.7333287

    Article  Google Scholar 

  • Kavitha K, Vidhya P (2019) Color image encryption: a new public key cryptosystem based on polynomial equation. Springer Nat Switz Proc Int Conf Ismac Comput Vis Bio-Eng 30:69–78

    Google Scholar 

  • Khan A, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Future Gener Comput Syst 82:395–411. https://doi.org/10.1016/j.future.2017.11.022

    Article  Google Scholar 

  • Kiswara S, Fatmawati M, Herry S (2018) On max-plus algebra and its application on image steganography. Sci World J. https://doi.org/10.1155/2018/6718653

    Article  Google Scholar 

  • Malathi D, Subramaniyaswamy V, Vijayakumar V, Logesh R (2019) Fog-assisted personalized healthcare-support system for remote patients with diabetes. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01291-5

    Article  Google Scholar 

  • Mansi S, Mankar VH (2019) Image steganography using contourlet transform and matrix decomposition techniques. Multimedia Tools Appl 78:22155. https://doi.org/10.1007/s11042-019-7512-9

    Article  Google Scholar 

  • Mithun M, Rakesh M, Lei S, Leandros M, Mohamed F, Nikumani C, Vikas K (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304

    Article  Google Scholar 

  • Mohamed M, Jalel B, Mohamed H (2014) Survey on VANET security challenges and possible cryptographic solutions. Veh Commun 1:53–66

    Google Scholar 

  • Muhammad U, Irfan A, Aslam M, Shujaat K, Usman S (2017) SIT: a lightweight encryption algorithm for secure Internet of Things. Int J Adv Comput Sci Appl 8:402–411

    Google Scholar 

  • Musbah A, Ziad A, Ammar A (2018) RGB color image encryption decryption using image segmentation and matrix multiplication. Int J Eng Technol 7:104–107

    Google Scholar 

  • Nadeem A, Muhammad A, Noshina T, Thar B, Sohail A (2019) A mechanism for securing IoT-enabled applications at the fog layer. J Sens Actuator Netw 8:16. https://doi.org/10.3390/jsan8010016

    Article  Google Scholar 

  • Nazmun N, Mokammel H, Asaduzzaman (2018) Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC. eHaCON, Kolkata. pp 139–150. https://www.researchgate.net/publication/328105690

  • Noshina T, Muhammad A, Feras A, Muhammad F, Thar B, Mohammad H, Ibrahim G (2019) The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors 19:1788

    Google Scholar 

  • Olena S, Stefan S, Michael B, Philipp L (2016) Resource provisioning for IoT services in the fog. In: IEEE 9th international conference on service oriented computing and applications, pp 32–39

  • Parinita S, Swapnil S (2017) Discrete wavelet packet transform based video steganography. Int J Miner Process Extr Metall 2:7–12

    Google Scholar 

  • Peng Z, Joseph L, Yu F, Mehdi S, Man A, Xiapu L (2018) A survey on access control in fog computing. IEEE Commun Mag 56:144–149

    Google Scholar 

  • Pranjali S, Shruti P, Surabhi S, Anita L (2018) An image cryptography using henon map and arnold cat map. Int Res J Eng Technol 5:1900–1904

    Google Scholar 

  • Reem H, Huda A (2018) Cipher secret image using hybrid visual cryptography. ARPN J Eng Appl Sci 13:1015–1021

    Google Scholar 

  • Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698. https://doi.org/10.1016/j.future.2016.11.009

    Article  Google Scholar 

  • Rongxing L, Kevin H, Arash L, Ali G (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312

    Article  Google Scholar 

  • Sadik A, Mohammed A, Ahmed N (2018) Image in image steganography technique based on arnold transform and LSB algorithms. Int J Comput Appl 181:32–39

    Google Scholar 

  • Sahu AK, Swain G, Babu ES (2018) Digital image steganography using bit flipping. Cybern Inf Technol 18:69–80

    MathSciNet  Google Scholar 

  • Sai T, Anuradha G (2018) Fog Computing a Paradigm: Scenarios and Security Issues. Int J Eng Res Comput Sci Eng 5:433–437

    Google Scholar 

  • Sajay KR, Suvanam B, Yellepeddi V (2019) Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01403-1

    Article  Google Scholar 

  • Saleema A, Amarunnishad T (2016) A new steganography algorithm using hybrid fuzzy neural networks. international conference on emerging trends in engineering, science and technology 24:1566–1574. http://creativecommons.org/licenses/by-nc-nd/4.0

  • Salvatore V, Alba A (2018) A methodology for deployment of IoT application in fog. J Ambient Intell Human Comput 10:1955–1976. https://doi.org/10.1007/s12652-018-0785-4

    Article  Google Scholar 

  • Shashidhara N, Usha A (2017) Video steganography using zero order hold method for secured data transmission. Int J Comput Appl 176:44–48

    Google Scholar 

  • Sneha S, Syam S, Ashok K (2019) A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01385-0

    Article  Google Scholar 

  • Syed I, Neha S, Malik M (2018) Secure data transmission based on combined effect of cryptography and steganography using visible light spectrum. Int J Pure Appl Math 118:2851–2860. http://www.ijpam.eu

  • Tarfa H, Jason E, Stefan K (2018) A survey and taxonomy of classifiers of intrusion detection systems. In: Computer and network security essentials. pp 21–39

  • Tatsuya C, Warit S, Hitoshi K (2019) Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans Inf Forensics Secur 14:1515–1525

    Article  Google Scholar 

  • Xiaoling H, Guodong Y (2018) An image encryption algorithm based on time-delay and random insertion. Entropy 20:974. https://doi.org/10.3390/e20120974

    Article  MathSciNet  Google Scholar 

  • Xin J, Sui Y, Xiaodong L, Geng Z, Zhaohui T, Nan S, Shuyun Z (2017) Color image encryption in ycbcr space. Int Conf Wirel Commun Signal Process. https://ieeexplore.ieee.org/document/7752646

  • Xin J, Sui Y, Ningning L, Xiaodong L, Geng Z, Shiming G (2018) Color image encryption in non RGB color spaces. Multimedia Tools Appl 77:15851–15873. https://doi.org/10.1007/s11042-017-5159-y

    Article  Google Scholar 

  • Xingyuan W, Xiaoqiang Z, Yingqian Z (2018) An image encryption algorithm based on josephus traversing and mixed chaotic map. IEEE Access 6:23733–23746

    Article  Google Scholar 

  • Yang L, Li X (2018) Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J 6:2103–2115

    Google Scholar 

  • Yonglin Xu, Shaofei Wu, Mingqing W, Yuntao Z (2018) Design and implementation of distributed RSA algorithm based on Hadoop. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-1021-y

    Article  Google Scholar 

  • Yue W, Joseph N, Sos A (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 2:31–38

    Google Scholar 

  • Yung Y, Chih H, Sin Y, Hsin L (2018) Data hiding method for AMBTC compressed images. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-1048-0

    Article  Google Scholar 

  • Yuvaraja T, Sabeenian R (2019) Dual tree complex wavelet transform-based image security using steganography. Appl Math Inf Sci 13:215–222

    Article  MathSciNet  Google Scholar 

  • Zhenhao L, Wei X, Baosheng W, Yong T, Qianqian X (2019) EasyStego: robust steganography based on quick-response barcodes for crossing domains. Symmetry 11:222. https://doi.org/10.3390/sym11020222

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed I. Saleh.

Ethics declarations

Ethical statement

Hereby, authors consciously assure that for this paper, the following is fulfilled: (1) This material is the authors’ own original work, which has not been previously published elsewhere, (2) the paper is not currently being considered for publication elsewhere, (3) the paper reflects the authors’ own research and analysis in a truthful and complete manner, (4) the paper properly credits the meaningful contributions of co-authors and co-researchers, (5) the results are appropriately placed in the context of prior and existing research, (6) all sources used are properly disclosed (correct citation), (7) all authors have been personally and actively involved in substantial work leading to the paper, and will take public responsibility for its content.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hussein, S.A., Saleh, A.I. & Mostafa, H.ED. A new fog based security strategy (FBS2) for reliable image transmission. J Ambient Intell Human Comput 11, 3265–3303 (2020). https://doi.org/10.1007/s12652-019-01512-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01512-x

Keywords

Navigation