Weitere Kapitel dieses Buchs durch Wischen aufrufen
Numerous watermarking applications require implanting strategies that supply power against normal watermarking attacks, similar to pressure, noise, sifting, and so on. Dense sending of wireless sensor networks in an unattended situation makes sensor hubs defenseless against potential assaults. With these requests, the confidentiality, integrity and confirmation of the imparted data turn out to be important. This chapter investigated the optimal Singular Value Decomposition (SVD) strategy which was proposed by utilizing the Opposition Grey Wolf Optimization (OGWO) system for image security in WSN. This is a protected method for watermarking through the installed parameters required for the extraction of watermark. The objective function is utilized, at the optimization procedure, through which the greatest attainable robustness and entropy can be attained without debasing the watermarking quality. When the optimal parameters such as ‘K’, ‘L’ and ‘M’ got the images installed with secret data, at one point, the Light Weight Cryptography (LWC)-RECTANGLE block cipher process was used to encrypt and decrypt the watermarked images, transmitted in WSN. This encryption procedure has two critical procedures such as key generation and round function. The adequacy of the proposed strategy was exhibited by comparing the results with traditional procedures with regards to the watermarking performance.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Fazli, A. R., Asli, M. E., Ghasedi, K., & aliZanjankhah, H. S. (2011, November). Watermarking security analysis based on information theory. In 2011 IEEE International Conference on Signal and Image Processing Applications (ICSIPA) (pp. 599–603). IEEE.
Naveed, A., Saleem, Y., Ahmed, N., & Rafiq, A. (2015). Performance evaluation and watermark security assessment of digital watermarking techniques. Science International, 27(2).
El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies, e3523.
Song, C., Sudirman, S., Merabti, M., & Llewellyn-Jones, D. (2010, January). Analysis of digital image watermark attacks. In Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE (pp. 1–5). IEEE.
Mahule, R. V., & Dhawale, C. A. (2015). Analysis of image security techniques using digital image watermarking in spatial domain. In Nckite (pp. 19–26).
Benrhouma, O., Hermassi, H., & Belghith, S. (2017). Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme. Multimedia Tools and Applications, 76(20), 21133–21156. CrossRef
Harjito, B., & Suryani, E. (2017, February). Robust image watermarking using DWT and SVD for copyright protection. In AIP Conference Proceedings (Vol. 1813, No. 1, p. 040003). AIP Publishing.
Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154. CrossRef
Walaa, E., Elhoseny, M., Sabbeh, S., Riad, A. Self-maintenance model for wireless sensor networks. Computers and Electrical Engineering (In Press). Available Online December 2017.
Zhou, X., Zhang, H., & Wang, C. (2018). A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry, 10(3), 77. CrossRef
Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., & Uhsadel, L. (2007). A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers, 24(6), 522–533.
Gupta, D., Khanna, A., Shankar, K., Furtado, V., & Rodrigues, J. J. Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Transactions on Emerging Telecommunications Technologies, e3524. https://doi.org/10.1002/ett.3524.
Verma, V., Srivastava, V. K., & Thakkar, F. (2016, March). DWT-SVD based digital image watermarking using swarm intelligence. In International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 3198–3203). IEEE.
Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic and Applied Sciences, 9(36), 150–163.
Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15. https://doi.org/10.1007/s00521-018-3801-x.
Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13. https://doi.org/10.1007/s12652-018-1161-0.
Rajesh, M., Kumar, K. S., Shankar, K., & Ilayaraja, M. Sensitive data security in cloud computing aid of different encryption techniques. Journal of Advanced Research in Dynamical and Control Systems, 18.
Shankar, K., & Eswaran, P. (2016). An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. Advances in Intelligent Systems and Computing, 394, 705–714. CrossRef
Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H., & Riad, A. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, IEEE, 19(12), 2194–2197. CrossRef
Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468. CrossRef
Makbol, N. M., Khoo, B. E., & Rassem, T. H. (2018). Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimedia Tools and Applications, pp. 1–35.
Najafi, E., & Loukhaoukha, K. (2019). Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. Journal of Information Security and Applications, 44, 144–156. CrossRef
Abdelhakim, A. M., Saad, M. H., Sayed, M., & Saleh, H. I. (2018). Optimized SVD-based robust watermarking in the fractional Fourier domain. Multimedia Tools and Applications, pp. 1–23.
Poonam, & Arora, S. M. (2018). A DWT-SVD based robust digital watermarking for digital images. Procedia Computer Science, 132, 1441–1448.
Gaber, T., Abdelwahab, S., Elhoseny, M., Hassanien, A. E. Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks. Available online September 17, 2018.
Maheshwari, D. B. (2018, February). An analysis of wavelet based dual digital image watermarking using SVD. In 2018 International Conference on Advances in Communication and Computing Technology (ICACCT) (pp. 69–73). IEEE.
He, Y., & Hu, Y. (2018, May). A proposed digital image watermarking based on DWT-DCT-SVD. In 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (pp. 1214–1218). IEEE.
Pomponiu, V., & Cavagnino, D. (2011). Security analysis of SVD-based watermarking techniques. International Journal of Multimedia Intelligence and Security, 2(2), 120–145. CrossRef
Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46–61. CrossRef
Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., & Verbauwhede, I. (2015). RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Science China Information Sciences, 58(12), 1–15.
- An Optimal Singular Value Decomposition with LWC-RECTANGLE Block Cipher Based Digital Image Watermarking in Wireless Sensor Networks
- Chapter 6