Data Aggregation and Privacy Preserving Using Computational Intelligence

Umair Khadam, Muhammad Munwar Iqbal, Sohail Jabbar, Syed Aziz Shah

Research output: Contribution to journalReview articlepeer-review

93 Downloads (Pure)


In today's smart world, the privacy protection of data is an important issue. Data is distributed, reproduced, and disclosed with extensive use of communication technologies. Many non-traditional challenges arise with the rapid increase of IoT devices for system design and implementation. However, security and privacy are the main issues in IoT. With advanced technologies, an illegal copy of the content can easily be generated and shared. Therefore, it is crucial for users to protect and secure their data. In the said perspective, an efficient third-generation watermarking technique is proposed, which works on the computational intelligence model to insert a large amount of robust watermark and make an extra effort to hide more information than first and second-generation techniques. The Advanced Encryption Standard (AES) encryption algorithm is employed to guarantee secure communication, which has a significantly less computational cost. The proposed technique evaluated parameters including security, robustness, imperceptibility, and capacity. The results of the proposed technique are compared to existing text watermarking methods, which illustrates it is secure, robust, imperceptible, and inserts a large amount of watermark information through computational intelligence
Original languageEnglish
Pages (from-to)60-64
Number of pages5
JournalIEEE Internet of Things Magazine
Issue number2
Early online date10 May 2021
Publication statusPublished - Jun 2021
Externally publishedYes

Bibliographical note

© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.


  • Watermarking
  • Security
  • Encoding
  • Data privacy
  • Authentication
  • Computational intelligence
  • Encryption


Dive into the research topics of 'Data Aggregation and Privacy Preserving Using Computational Intelligence'. Together they form a unique fingerprint.

Cite this