Skip to main content

2019 | OriginalPaper | Buchkapitel

6. An Optimal Singular Value Decomposition with LWC-RECTANGLE Block Cipher Based Digital Image Watermarking in Wireless Sensor Networks

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Numerous watermarking applications require implanting strategies that supply power against normal watermarking attacks, similar to pressure, noise, sifting, and so on. Dense sending of wireless sensor networks in an unattended situation makes sensor hubs defenseless against potential assaults. With these requests, the confidentiality, integrity and confirmation of the imparted data turn out to be important. This chapter investigated the optimal Singular Value Decomposition (SVD) strategy which was proposed by utilizing the Opposition Grey Wolf Optimization (OGWO) system for image security in WSN. This is a protected method for watermarking through the installed parameters required for the extraction of watermark. The objective function is utilized, at the optimization procedure, through which the greatest attainable robustness and entropy can be attained without debasing the watermarking quality. When the optimal parameters such as ‘K’, ‘L’ and ‘M’ got the images installed with secret data, at one point, the Light Weight Cryptography (LWC)-RECTANGLE block cipher process was used to encrypt and decrypt the watermarked images, transmitted in WSN. This encryption procedure has two critical procedures such as key generation and round function. The adequacy of the proposed strategy was exhibited by comparing the results with traditional procedures with regards to the watermarking performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Fazli, A. R., Asli, M. E., Ghasedi, K., & aliZanjankhah, H. S. (2011, November). Watermarking security analysis based on information theory. In 2011 IEEE International Conference on Signal and Image Processing Applications (ICSIPA) (pp. 599–603). IEEE. Fazli, A. R., Asli, M. E., Ghasedi, K., & aliZanjankhah, H. S. (2011, November). Watermarking security analysis based on information theory. In 2011 IEEE International Conference on Signal and Image Processing Applications (ICSIPA) (pp. 599–603). IEEE.
2.
Zurück zum Zitat Naveed, A., Saleem, Y., Ahmed, N., & Rafiq, A. (2015). Performance evaluation and watermark security assessment of digital watermarking techniques. Science International, 27(2). Naveed, A., Saleem, Y., Ahmed, N., & Rafiq, A. (2015). Performance evaluation and watermark security assessment of digital watermarking techniques. Science International, 27(2).
3.
Zurück zum Zitat El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies, e3523. El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies, e3523.
4.
Zurück zum Zitat Song, C., Sudirman, S., Merabti, M., & Llewellyn-Jones, D. (2010, January). Analysis of digital image watermark attacks. In Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE (pp. 1–5). IEEE. Song, C., Sudirman, S., Merabti, M., & Llewellyn-Jones, D. (2010, January). Analysis of digital image watermark attacks. In Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE (pp. 1–5). IEEE.
5.
Zurück zum Zitat Mahule, R. V., & Dhawale, C. A. (2015). Analysis of image security techniques using digital image watermarking in spatial domain. In Nckite (pp. 19–26). Mahule, R. V., & Dhawale, C. A. (2015). Analysis of image security techniques using digital image watermarking in spatial domain. In Nckite (pp. 19–26).
6.
Zurück zum Zitat Benrhouma, O., Hermassi, H., & Belghith, S. (2017). Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme. Multimedia Tools and Applications, 76(20), 21133–21156.CrossRef Benrhouma, O., Hermassi, H., & Belghith, S. (2017). Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme. Multimedia Tools and Applications, 76(20), 21133–21156.CrossRef
7.
Zurück zum Zitat Harjito, B., & Suryani, E. (2017, February). Robust image watermarking using DWT and SVD for copyright protection. In AIP Conference Proceedings (Vol. 1813, No. 1, p. 040003). AIP Publishing. Harjito, B., & Suryani, E. (2017, February). Robust image watermarking using DWT and SVD for copyright protection. In AIP Conference Proceedings (Vol. 1813, No. 1, p. 040003). AIP Publishing.
8.
Zurück zum Zitat Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRef Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRef
9.
Zurück zum Zitat Walaa, E., Elhoseny, M., Sabbeh, S., Riad, A. Self-maintenance model for wireless sensor networks. Computers and Electrical Engineering (In Press). Available Online December 2017. Walaa, E., Elhoseny, M., Sabbeh, S., Riad, A. Self-maintenance model for wireless sensor networks. Computers and Electrical Engineering (In Press). Available Online December 2017.
10.
Zurück zum Zitat Zhou, X., Zhang, H., & Wang, C. (2018). A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry, 10(3), 77.CrossRef Zhou, X., Zhang, H., & Wang, C. (2018). A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry, 10(3), 77.CrossRef
11.
Zurück zum Zitat Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., & Uhsadel, L. (2007). A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers, 24(6), 522–533. Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., & Uhsadel, L. (2007). A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers, 24(6), 522–533.
12.
Zurück zum Zitat Gupta, D., Khanna, A., Shankar, K., Furtado, V., & Rodrigues, J. J. Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Transactions on Emerging Telecommunications Technologies, e3524. https://doi.org/10.1002/ett.3524. Gupta, D., Khanna, A., Shankar, K., Furtado, V., & Rodrigues, J. J. Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Transactions on Emerging Telecommunications Technologies, e3524. https://​doi.​org/​10.​1002/​ett.​3524.
13.
Zurück zum Zitat Verma, V., Srivastava, V. K., & Thakkar, F. (2016, March). DWT-SVD based digital image watermarking using swarm intelligence. In International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 3198–3203). IEEE. Verma, V., Srivastava, V. K., & Thakkar, F. (2016, March). DWT-SVD based digital image watermarking using swarm intelligence. In International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 3198–3203). IEEE.
14.
Zurück zum Zitat Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic and Applied Sciences, 9(36), 150–163. Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic and Applied Sciences, 9(36), 150–163.
15.
Zurück zum Zitat Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15. https://doi.org/10.1007/s00521-018-3801-x. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15. https://​doi.​org/​10.​1007/​s00521-018-3801-x.
16.
Zurück zum Zitat Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13. https://doi.org/10.1007/s12652-018-1161-0. Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13. https://​doi.​org/​10.​1007/​s12652-018-1161-0.
17.
Zurück zum Zitat Rajesh, M., Kumar, K. S., Shankar, K., & Ilayaraja, M. Sensitive data security in cloud computing aid of different encryption techniques. Journal of Advanced Research in Dynamical and Control Systems, 18. Rajesh, M., Kumar, K. S., Shankar, K., & Ilayaraja, M. Sensitive data security in cloud computing aid of different encryption techniques. Journal of Advanced Research in Dynamical and Control Systems, 18.
18.
Zurück zum Zitat Shankar, K., & Eswaran, P. (2016). An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. Advances in Intelligent Systems and Computing, 394, 705–714.CrossRef Shankar, K., & Eswaran, P. (2016). An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. Advances in Intelligent Systems and Computing, 394, 705–714.CrossRef
19.
Zurück zum Zitat Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H., & Riad, A. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, IEEE, 19(12), 2194–2197.CrossRef Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H., & Riad, A. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, IEEE, 19(12), 2194–2197.CrossRef
20.
Zurück zum Zitat Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468.CrossRef Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468.CrossRef
21.
Zurück zum Zitat Makbol, N. M., Khoo, B. E., & Rassem, T. H. (2018). Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimedia Tools and Applications, pp. 1–35. Makbol, N. M., Khoo, B. E., & Rassem, T. H. (2018). Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimedia Tools and Applications, pp. 1–35.
22.
Zurück zum Zitat Najafi, E., & Loukhaoukha, K. (2019). Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. Journal of Information Security and Applications, 44, 144–156.CrossRef Najafi, E., & Loukhaoukha, K. (2019). Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. Journal of Information Security and Applications, 44, 144–156.CrossRef
23.
Zurück zum Zitat Abdelhakim, A. M., Saad, M. H., Sayed, M., & Saleh, H. I. (2018). Optimized SVD-based robust watermarking in the fractional Fourier domain. Multimedia Tools and Applications, pp. 1–23. Abdelhakim, A. M., Saad, M. H., Sayed, M., & Saleh, H. I. (2018). Optimized SVD-based robust watermarking in the fractional Fourier domain. Multimedia Tools and Applications, pp. 1–23.
24.
Zurück zum Zitat Poonam, & Arora, S. M. (2018). A DWT-SVD based robust digital watermarking for digital images. Procedia Computer Science, 132, 1441–1448. Poonam, & Arora, S. M. (2018). A DWT-SVD based robust digital watermarking for digital images. Procedia Computer Science, 132, 1441–1448.
25.
Zurück zum Zitat Gaber, T., Abdelwahab, S., Elhoseny, M., Hassanien, A. E. Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks. Available online September 17, 2018. Gaber, T., Abdelwahab, S., Elhoseny, M., Hassanien, A. E. Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks. Available online September 17, 2018.
26.
Zurück zum Zitat Maheshwari, D. B. (2018, February). An analysis of wavelet based dual digital image watermarking using SVD. In 2018 International Conference on Advances in Communication and Computing Technology (ICACCT) (pp. 69–73). IEEE. Maheshwari, D. B. (2018, February). An analysis of wavelet based dual digital image watermarking using SVD. In 2018 International Conference on Advances in Communication and Computing Technology (ICACCT) (pp. 69–73). IEEE.
27.
Zurück zum Zitat He, Y., & Hu, Y. (2018, May). A proposed digital image watermarking based on DWT-DCT-SVD. In 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (pp. 1214–1218). IEEE. He, Y., & Hu, Y. (2018, May). A proposed digital image watermarking based on DWT-DCT-SVD. In 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (pp. 1214–1218). IEEE.
28.
Zurück zum Zitat Pomponiu, V., & Cavagnino, D. (2011). Security analysis of SVD-based watermarking techniques. International Journal of Multimedia Intelligence and Security, 2(2), 120–145.CrossRef Pomponiu, V., & Cavagnino, D. (2011). Security analysis of SVD-based watermarking techniques. International Journal of Multimedia Intelligence and Security, 2(2), 120–145.CrossRef
29.
Zurück zum Zitat Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46–61.CrossRef Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46–61.CrossRef
30.
Zurück zum Zitat Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., & Verbauwhede, I. (2015). RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Science China Information Sciences, 58(12), 1–15. Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., & Verbauwhede, I. (2015). RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Science China Information Sciences, 58(12), 1–15.
Metadaten
Titel
An Optimal Singular Value Decomposition with LWC-RECTANGLE Block Cipher Based Digital Image Watermarking in Wireless Sensor Networks
verfasst von
K. Shankar
Mohamed Elhoseny
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-20816-5_6

Neuer Inhalt