Encryption System for Hiding Information Based on Internet of Things


  • Hala A. Naman Wasit University
  • Naseer Ali Hussien Wasit University
  • Mohand Lokman Al-dabag Northern Technical University,
  • Haider Th.Salim Alrikabi Wasit University




Internet of things, Encryption, wavelet transform, PSNR, Stego image


One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure 4 below shows the method of encryption and dealing with the Internet of things system..

Author Biographies

Hala A. Naman, Wasit University

Computer Science

Naseer Ali Hussien, Wasit University

Computer Science

Mohand Lokman Al-dabag, Northern Technical University,

Technical Engineering College of Mosul, Mosul, Iraq

Haider Th.Salim Alrikabi, Wasit University

College of Engineering, Electrical Engineering Department




How to Cite

Naman, H. A., Hussien, N. A., Al-dabag, M. L., & Alrikabi, H. T. (2021). Encryption System for Hiding Information Based on Internet of Things. International Journal of Interactive Mobile Technologies (iJIM), 15(02), pp. 172–183. https://doi.org/10.3991/ijim.v15i02.19869