2020
DOI: 10.1109/access.2020.3010513
|View full text |Cite
|
Sign up to set email alerts
|

Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things

Abstract: Mobile edge computing provides high computing power, data storage capacity and bandwidth requirements for Internet of Things (IoT) through edge servers that process data close to data sources or users. In practical, mobile edge computing can be used to implement image steganography in IoT. Considering imperceptibility, security and capacity are important indicators for image steganography, this paper propose an image steganography based on evolutionary multi-objective optimization (EMOsteg). The EMOsteg prepro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 42 publications
0
3
0
Order By: Relevance
“…In this process, the common subsequence can be obtained, and the structural features can be obtained by replacing characters. Experiments show that this method can realize structured feature recognition for most mobile applications, involving a wide range, but the accuracy of feature recognition results is not high [13]. Chu and others proposed an efficient extraction method of key features of big data based on cloud computing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this process, the common subsequence can be obtained, and the structural features can be obtained by replacing characters. Experiments show that this method can realize structured feature recognition for most mobile applications, involving a wide range, but the accuracy of feature recognition results is not high [13]. Chu and others proposed an efficient extraction method of key features of big data based on cloud computing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…All pictures were processed into a size of 512×512, and 500 pictures were selected as a hidden picture for the experiment. Three algorithms, MO-GA [25], S-UNIWARD [26], and MiPOD [27], were selected as comparison methods to analyze the experimental results in detail. These approaches also utilize noise pixels to adaptively embed secret data, sharing similarities with our proposed approach.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…Gambar 1. Arsitektur Jaringan Seluler [7] Berikut adalah beberapa komponen utama dalam arsitektur jaringan seluler berdasarkan pada Gambar 1, mulai dari perangkat pengguna sampai dengan jaringan inti: Public Data Network (PDN) atau Jaringan Data Publik adalah jaringan komunikasi yang memungkinkan pertukaran data antara pengguna melalui saluran telekomunikasi yang tersedia untuk umum. Ini adalah infrastruktur yang memungkinkan akses publik terhadap layanan data, seperti internet, email, dan layanan komunikasi lainnya PDN dirancang untuk menghubungkan pengguna dari berbagai lokasi geografis dan memfasilitasi pertukaran informasi antara mereka.…”
Section: ) Generasi 5gunclassified