Skip to main content
Top

2019 | OriginalPaper | Chapter

5. An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security is the rising concern in this specialized rebellion that attracts the analysts towards research and new commitment in Wireless Sensor Network (WSN) field. This chapter proposes a creative technique for image security in WSN using Steganographic and cryptographic model which secures the selected cover images and secret information. The effective Opposition-based Particle Swarm Optimization (OPSO) with Haar wavelet coefficients from Discrete Wavelet Transform (DWT) was brought into the embedding procedure. From this procedure, the encrypted file was deciphered though the encoded document may hide the information even now. This optimal wavelet attained the most extreme Hiding Capacity (HC) and PSNR rate. Finally, the stego images were considered in the security Model i.e., LWC-based SIMON block cipher. It works on the basis of key and round generation model and towards the end, the reverse procedure occurs with the image decryption and extraction modeling. The usage results demonstrated that the proposed security strategy has the most extreme CC and PSNR values (52.544) with minimum error rate (0.493) in comparison with other conventional strategies.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Elhoseny, M., Elleithy, K., Elminir, H., Yuan, X., & Riad, A. (2015). Dynamic clustering of heterogeneous wireless sensor networks using a genetic algorithm, towards balancing energy exhaustion. International Journal of Scientific & Engineering Research, 6(8), 1243–1252. Elhoseny, M., Elleithy, K., Elminir, H., Yuan, X., & Riad, A. (2015). Dynamic clustering of heterogeneous wireless sensor networks using a genetic algorithm, towards balancing energy exhaustion. International Journal of Scientific & Engineering Research, 6(8), 1243–1252.
2.
go back to reference Elhoseny, M., Hassanien, A. E. (2019). Secure data transmission in WSN: An overview. In Dynamic wireless sensor networks. Studies in systems, decision and control (Vol. 165, pp. 115–143). Springer, Cham. Elhoseny, M., Hassanien, A. E. (2019). Secure data transmission in WSN: An overview. In Dynamic wireless sensor networks. Studies in systems, decision and control (Vol. 165, pp. 115–143). Springer, Cham.
3.
go back to reference Hemalatha, S., Acharya, U. D., & Renuka, A. (2015). Wavelet transform based steganography technique to hide audio signals in image. Procedia Computer Science, 47, 272–281.CrossRef Hemalatha, S., Acharya, U. D., & Renuka, A. (2015). Wavelet transform based steganography technique to hide audio signals in image. Procedia Computer Science, 47, 272–281.CrossRef
4.
go back to reference Muhammad, N., Bibi, N., Mahmood, Z., Akram, T., & Naqvi, S. R. (2017). Reversible integer wavelet transform for blind image hiding method. PLoS ONE, 12(5), e0176979.CrossRef Muhammad, N., Bibi, N., Mahmood, Z., Akram, T., & Naqvi, S. R. (2017). Reversible integer wavelet transform for blind image hiding method. PLoS ONE, 12(5), e0176979.CrossRef
5.
go back to reference Thanikaiselvan, V., Arulmozhivarman, P., Subashanthini, S., & Amirtharajan, R. (2013). A graph theory practice on transformed image: A random image steganography. The Scientific World Journal, 2013. Thanikaiselvan, V., Arulmozhivarman, P., Subashanthini, S., & Amirtharajan, R. (2013). A graph theory practice on transformed image: A random image steganography. The Scientific World Journal, 2013.
6.
go back to reference Shet, K. S., & Aswath, A. R. (2015). Image steganography using integer wavelet transform based on color space approach. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 839–848). Springer, Cham. Shet, K. S., & Aswath, A. R. (2015). Image steganography using integer wavelet transform based on color space approach. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 839–848). Springer, Cham.
7.
go back to reference Priya, A. (2018). High capacity and optimized image steganography technique based on ant colony optimization algorithm. International Journal of Emerging Technology and Innovative Engineering, 4(6). Priya, A. (2018). High capacity and optimized image steganography technique based on ant colony optimization algorithm. International Journal of Emerging Technology and Innovative Engineering, 4(6).
8.
go back to reference Sharma, V. K., Mathur, P., & Srivastava, D. K. (2019). Highly secure DWT steganography scheme for encrypted data hiding. In Information and Communication Technology for Intelligent Systems (pp. 665–673). Springer, Singapore. Sharma, V. K., Mathur, P., & Srivastava, D. K. (2019). Highly secure DWT steganography scheme for encrypted data hiding. In Information and Communication Technology for Intelligent Systems (pp. 665–673). Springer, Singapore.
9.
go back to reference Subramanian, M., & Korah, R. (2018). A framework of secured embedding scheme using vector discrete wavelet transformation and lagrange interpolation. Journal of Computer Networks and Communications, 2018. Subramanian, M., & Korah, R. (2018). A framework of secured embedding scheme using vector discrete wavelet transformation and lagrange interpolation. Journal of Computer Networks and Communications, 2018.
10.
go back to reference Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(1.9), 22–27. Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(1.9), 22–27.
11.
go back to reference Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.CrossRef Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.CrossRef
12.
go back to reference Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.CrossRef Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.CrossRef
13.
go back to reference Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.
14.
go back to reference Sathesh Kumar, K., Shankar, K., Ilayaraja, M., Rajesh, M. (2017). Sensitive data security in cloud computing aid of different encryption techniques. Journal of Advanced Research in Dynamical and Control Systems, 9, 2888–2899. Sathesh Kumar, K., Shankar, K., Ilayaraja, M., Rajesh, M. (2017). Sensitive data security in cloud computing aid of different encryption techniques. Journal of Advanced Research in Dynamical and Control Systems, 9, 2888–2899.
15.
go back to reference Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H., & Riad, A. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, IEEE, 19(12), 2194–2197.CrossRef Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H., & Riad, A. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, IEEE, 19(12), 2194–2197.CrossRef
16.
go back to reference Elhoseny, M., Hassanien, A. E. (2019). Optimizing cluster head selection in WSN to prolong its existence. In Dynamic wireless sensor networks. studies in systems, decision and control (Vol. 165, pp. 93–111). Springer, Cham. Elhoseny, M., Hassanien, A. E. (2019). Optimizing cluster head selection in WSN to prolong its existence. In Dynamic wireless sensor networks. studies in systems, decision and control (Vol. 165, pp. 93–111). Springer, Cham.
17.
go back to reference Nipanikar, S. I., Deepthi, V. H., & Kulkarni, N. (2017). A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria Engineering Journal. Nipanikar, S. I., Deepthi, V. H., & Kulkarni, N. (2017). A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria Engineering Journal.
18.
go back to reference Sidhik, S., Sudheer, S. K., & Pillai, V. M. (2015). Performance and analysis of high capacity steganography of color images involving wavelet transform. Optik-International Journal for Light and Electron Optics, 126(23), 3755–3760.CrossRef Sidhik, S., Sudheer, S. K., & Pillai, V. M. (2015). Performance and analysis of high capacity steganography of color images involving wavelet transform. Optik-International Journal for Light and Electron Optics, 126(23), 3755–3760.CrossRef
19.
go back to reference Thanki, R., & Borra, S. (2018). A color image steganography in hybrid FRT–DWT domain. Journal of information security and applications, 40, 92–102.CrossRef Thanki, R., & Borra, S. (2018). A color image steganography in hybrid FRT–DWT domain. Journal of information security and applications, 40, 92–102.CrossRef
20.
go back to reference Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13. Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.
21.
go back to reference Nipanikar, S. I., Deepthi, V. H. (2017). Entropy based cost function for wavelet based medical image steganography. In 2017 International Conference on Intelligent Sustainable Systems (ICISS) (pp. 211–217). IEEE. Nipanikar, S. I., Deepthi, V. H. (2017). Entropy based cost function for wavelet based medical image steganography. In 2017 International Conference on Intelligent Sustainable Systems (ICISS) (pp. 211–217). IEEE.
22.
go back to reference Valandar, M. Y., Ayubi, P., & Barani, M. J. (2017). A new transform domain steganography based on modified logistic chaotic map for color images. Journal of Information Security and Applications, 34, 142–151.CrossRef Valandar, M. Y., Ayubi, P., & Barani, M. J. (2017). A new transform domain steganography based on modified logistic chaotic map for color images. Journal of Information Security and Applications, 34, 142–151.CrossRef
23.
go back to reference Yuvaraja, T., & Sabeenian, R. S. (2018). Performance analysis of medical image security using steganography based on fuzzy logic. Cluster Computing, 1–7. Yuvaraja, T., & Sabeenian, R. S. (2018). Performance analysis of medical image security using steganography based on fuzzy logic. Cluster Computing, 1–7.
24.
go back to reference Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRef Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRef
25.
go back to reference Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. (2018). Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, e5122. https://doi.org/10.1002/cpe.5122. Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. (2018). Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, e5122. https://​doi.​org/​10.​1002/​cpe.​5122.
26.
go back to reference Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.CrossRef Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.CrossRef
Metadata
Title
An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks
Authors
K. Shankar
Mohamed Elhoseny
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-20816-5_5