{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:48:02Z","timestamp":1770274082027,"version":"3.49.0"},"reference-count":35,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2019,5,14]]},"abstract":"<jats:p>The development of the Internet of Things (IoT) can be attributed to the sudden rise in miniature electronic devices, as well as their computing power and ability to make interconnections. These devices exchange large volumes of confidential information from diverse locations. Similar to the Internet, the IoT has also encountered various issues with information security. Due to limited computing and energy resources in the field of IoT, it is necessary to develop a scheme to ensure feasible and more effective concealment and security properties. This paper proposes a unique methodology that captures an image using IoT sensors, which are subjected to lighter cryptographic operations for conversion into a cipher image, and is then sent to a home server. At the home server, a combined cryptography and steganography approach is employed to conceal the cipher image in a cover image, camouflaging the presence of the secret image, which is then sent to the IoT-Cloud server for storage. During the embedding process, QR decomposition is performed on the RIWT transformed secret image and RIWT - DCT transformed cover image. Modification performed on the R matrix of QR decomposition does not affect the structural properties of the cover image. A block selection algorithm is used to select optimal blocks with high contrast areas to embed the secret image. The experimental results indicate that our scheme enhances imperceptibility, robustness, and resistance to steganalysis attacks.<\/jats:p>","DOI":"10.3233\/jifs-169984","type":"journal-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T10:44:42Z","timestamp":1555065882000},"page":"4265-4276","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":17,"title":["RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices"],"prefix":"10.1177","volume":"36","author":[{"given":"S.","family":"Arunkumar","sequence":"first","affiliation":[{"name":"School of Computing, Shanmugha Arts Science Technology and Research Academy, Thanjavur, India"}]},{"given":"Subramaniyaswamy","family":"Vairavasundaram","sequence":"additional","affiliation":[{"name":"School of Computing, Shanmugha Arts Science Technology and Research Academy, Thanjavur, India"}]},{"given":"K.S.","family":"Ravichandran","sequence":"additional","affiliation":[{"name":"School of Computing, Shanmugha Arts Science Technology and Research Academy, Thanjavur, India"}]},{"given":"Logesh","family":"Ravi","sequence":"additional","affiliation":[{"name":"School of Computing, Shanmugha Arts Science Technology and Research Academy, Thanjavur, India"}]}],"member":"179","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"1","article-title":"The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems","author":"Darwish A.","year":"2017","unstructured":"DarwishA., HassanienA.E., ElhosenyM., SangaiahA.K. and MuhammadK., The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems, Journal of Ambient Intelligence and Humanized Computing (2017), 1\u201316. https:\/\/org\/10.1007\/s12652-017-0659-1.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.105"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.05.020"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.014"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSC.2015.070945"},{"key":"e_1_3_1_7_2","first-page":"1","article-title":"Information hiding techniques for steganography and digital watermarking","author":"Katzenbeisser S.","year":"2000","unstructured":"KatzenbeisserS. and PetitcolasF., Information hiding techniques for steganography and digital watermarking, Artech house (2000), 1\u20133.","journal-title":"Artech house"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.5120\/1057-1378"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"e_1_3_1_10_2","first-page":"296","article-title":"Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques","author":"Das R.","year":"2016","unstructured":"DasR. and DasI., Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques, Research in Computational Intelligence and Communication Networks (ICRCICN), 2016 Second International Conference on. IEEE, (2016), 296\u2013301.","journal-title":"Research in Computational Intelligence and Communication Networks (ICRCICN), 2016 Second International Conference on. IEEE"},{"issue":"200","key":"e_1_3_1_11_2","first-page":"1","article-title":"Cover selection for steganographic embedding","author":"Kharrazi M.","unstructured":"KharraziM., SencarH.T. and MemonN., Cover selection for steganographic embedding, 2006 International Conference on Image Processing. IEEE, (200) 1\u20134.","journal-title":"2006 International Conference on Image Processing. IEEE"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2015.53004"},{"key":"e_1_3_1_13_2","first-page":"1","article-title":"Security enhancement in image steganography for medical integrity verification system","author":"Sreekutty M.S.","year":"2017","unstructured":"SreekuttyM.S. and BaijuP.S., Security enhancement in image steganography for medical integrity verification system. Circuit, Power and Computing Technologies (ICCPCT), 2017 International Conference on. IEEE, (2017), 1\u20135.","journal-title":"Circuit, Power and Computing Technologies (ICCPCT), 2017 International Conference on. IEEE"},{"issue":"9","key":"e_1_3_1_14_2","first-page":"38","article-title":"A new image encryption approach using the integration of a shifting technique and the AES algorithm","volume":"42","author":"Bashir A.","year":"2012","unstructured":"BashirA., HasanA.S.B. and AlmangushH., A new image encryption approach using the integration of a shifting technique and the AES algorithm, International Journal of Computers and Applications42(9) (2012), 38\u201345.","journal-title":"International Journal of Computers and Applications"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2018.01.022"},{"key":"e_1_3_1_16_2","first-page":"310","article-title":"Internet of Things: Securing Data using Image Steganography. Artificial Intelligence, Modelling and Simulation (AIMS)","author":"Yin J.H.J.","year":"2015","unstructured":"YinJ.H.J., FenG.M. and MughalF., Internet of Things: Securing Data using Image Steganography. Artificial Intelligence, Modelling and Simulation (AIMS), 2015 3rd International Conference on. IEEE (2015), 310\u2013314.","journal-title":"2015 3rd International Conference on. IEEE"},{"issue":"4","key":"e_1_3_1_17_2","first-page":"7","article-title":"Improving the security of images transmission","volume":"3","author":"Anwar A.S.","year":"2015","unstructured":"AnwarA.S., GhanyK.K.A. and MahdyH.E., Improving the security of images transmission, International Journal3(4) (2015), 7\u201313.","journal-title":"International Journal"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2017.02.03"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600374CM"},{"key":"e_1_3_1_20_2","first-page":"683","author":"Osborne J.","year":"2017","unstructured":"OsborneJ.Chapter 42-internet of things and cloud computing, Geng, H. (ed.) Part VI: Cloud, Legal, Innovation, and Business Models in Internet of Things and Data Analytics Handbook, 1st edn. (2017), 683\u2013698.","journal-title":"Part VI: Cloud, Legal, Innovation, and Business Models in Internet of Things and Data Analytics Handbook, 1st edn"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.019"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119173601.ch43"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0872-x"},{"key":"e_1_3_1_24_2","first-page":"26","article-title":"SVD based image processing applications: State of the art, contributions and research challenges","author":"Sadek R.A.","year":"2012","unstructured":"SadekR.A., SVD based image processing applications: State of the art, contributions and research challenges. arXiv preprint arXiv:1211.7102 (2012), 26\u201334.","journal-title":"arXiv preprint arXiv:1211.7102"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2014.06.012"},{"issue":"9","key":"e_1_3_1_26_2","first-page":"816","article-title":"Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition","volume":"68","author":"Guo J.M.","year":"2014","unstructured":"GuoJ.M. and PrasetyoH., Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition, AEU-International Journal of Electronics and Communications68(9) (2014), 816\u2013834.","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.04.017"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35615-5_53"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2017.10.013"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0112-3"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.4309314"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2898-z"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3301-x"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2014.02.010"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.03.004"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4971-z"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169984","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169984","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:59:02Z","timestamp":1770227942000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169984"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5,14]]}},"alternative-id":["10.3233\/JIFS-169984"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169984","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,8]]}}}