Skip to main content
Top

2019 | OriginalPaper | Chapter

7. Optimal Data Hiding Key in Encrypted Images Based Digital Image Security in Wireless Sensor Networks

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An effective optimal Data Hiding (DH) key with Light Weight Encryption (LWE) is proposed in this chapter. There are numerous issues in wireless sensor organize like client authentication just as information travel in the system isn’t so much secure. The image was encrypted with a secret key; yet conceivable to insert extra information for secret key. On sender side, the cover image was considered for the encryption procedure by hash function after which the data hiding method was used to hide the images utilizing the optimal data hiding keys. For key selection the current research utilized the Enhanced Cuckoo Search Optimization (ECS) method. The most extreme embedding capacity and security level were achieved. In reversible process, at the receiver side, the embedded image undergoes decryption procedure to recouped image and the data is selected by public key (Shankar and Eswaran in J Circuits Syst Comput 25(11):1650138, 2016) [1]. It can be applied in various application situations; moreover, the data extraction and image recovery are free of any errors. From this security model, the hided image containing the installed information can be then sent to combination focus utilizing sensor networks. At the combination focus, the hidden information is separated from the picture, the required handling is performed and choice is taken consequently. From the implementation procedure, the proposed model attained the most extreme Hiding Capacity (HC) (91.073%) and the greatest PSNR (59.188 dB), compared to other conventional techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.CrossRef Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.CrossRef
2.
go back to reference Zhang, W., Ma, K., & Yu, N. (2014). Reversibility improved data hiding in encrypted images. Signal Processing, 94, 118–127.CrossRef Zhang, W., Ma, K., & Yu, N. (2014). Reversibility improved data hiding in encrypted images. Signal Processing, 94, 118–127.CrossRef
3.
go back to reference Qin, C., & Zhang, X. (2015). Effective reversible data hiding in encrypted image with privacy protection for image content. Journal of Visual Communication and Image Representation, 31, 154–164.CrossRef Qin, C., & Zhang, X. (2015). Effective reversible data hiding in encrypted image with privacy protection for image content. Journal of Visual Communication and Image Representation, 31, 154–164.CrossRef
4.
go back to reference Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRef Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRef
5.
go back to reference Al-Afandy, K. A., Faragallah, O. S., Elmhalawy, A., El-Rabaie, E. S. M., & El-Banby, G. M. (2016, October). High security data hiding using image cropping and LSB least significant bit steganography. In 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt) (pp. 400–404). IEEE. Al-Afandy, K. A., Faragallah, O. S., Elmhalawy, A., El-Rabaie, E. S. M., & El-Banby, G. M. (2016, October). High security data hiding using image cropping and LSB least significant bit steganography. In 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt) (pp. 400–404). IEEE.
6.
go back to reference Ilayaraja, M., Shankar, K., & Devika, G. (2017). A modified symmetric key cryptography method for secure data transmission. International Journal of Pure and Applied Mathematics, 116(10), 301–308. Ilayaraja, M., Shankar, K., & Devika, G. (2017). A modified symmetric key cryptography method for secure data transmission. International Journal of Pure and Applied Mathematics, 116(10), 301–308.
7.
go back to reference Mohamed, R. E., Ghanem, W. R., Khalil, A. T., Elhoseny, M., Sajjad, M., & Mohamed, M. A. (2018). Energy efficient collaborative proactive routing protocol for wireless sensor network. Computer Networks. Available online 2018, June 19. Mohamed, R. E., Ghanem, W. R., Khalil, A. T., Elhoseny, M., Sajjad, M., & Mohamed, M. A. (2018). Energy efficient collaborative proactive routing protocol for wireless sensor network. Computer Networks. Available online 2018, June 19.
8.
go back to reference Gupta, D., Khanna, A., Shankar, K., Furtado, V., & Rodrigues, J. J. Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Transactions on Emerging Telecommunications Technologies (e3524). https://doi.org/10.1002/ett.3524. Gupta, D., Khanna, A., Shankar, K., Furtado, V., & Rodrigues, J. J. Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Transactions on Emerging Telecommunications Technologies (e3524). https://​doi.​org/​10.​1002/​ett.​3524.
10.
go back to reference Hong, W., Chen, T. S., & Shiu, C. W. (2009). Reversible data hiding for high quality images using modification of prediction errors. Journal of Systems and Software, 82(11), 1833–1842.CrossRef Hong, W., Chen, T. S., & Shiu, C. W. (2009). Reversible data hiding for high quality images using modification of prediction errors. Journal of Systems and Software, 82(11), 1833–1842.CrossRef
11.
go back to reference Li, M., Fan, H., Ren, H., Lu, D., Xiao, D., & Li, Y. (2018). Meaningful image encryption based on reversible data hiding in compressive sensing domain. Security and Communication Networks. Li, M., Fan, H., Ren, H., Lu, D., Xiao, D., & Li, Y. (2018). Meaningful image encryption based on reversible data hiding in compressive sensing domain. Security and Communication Networks.
12.
go back to reference Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130. Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.
13.
go back to reference Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A. & de Albuquerque, V. H. C. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience (e5122). Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A. & de Albuquerque, V. H. C. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience (e5122).
14.
go back to reference Elsayed, W., Elhoseny, M., Sabbeh, S., Riad, A. (2017). Self-maintenance model for wireless sensor networks. Computers and Electrical Engineering. Available online 2017, December (In Press). Elsayed, W., Elhoseny, M., Sabbeh, S., Riad, A. (2017). Self-maintenance model for wireless sensor networks. Computers and Electrical Engineering. Available online 2017, December (In Press).
15.
go back to reference Aminudin, N., Maseleno, A., Shankar K, Hemalatha, S., Sathesh kumar, K., Fauzi1, et al. Nur algorithm on data encryption and decryption. International Journal of Engineering & Technology, 7(2.26), 109–118.CrossRef Aminudin, N., Maseleno, A., Shankar K, Hemalatha, S., Sathesh kumar, K., Fauzi1, et al. Nur algorithm on data encryption and decryption. International Journal of Engineering & Technology, 7(2.26), 109–118.CrossRef
16.
go back to reference Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.CrossRef Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.CrossRef
17.
go back to reference Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.
18.
go back to reference Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In Intelligent Systems and Control (ISCO), 2016 10th International Conference (pp. 1–6). IEEE. Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In Intelligent Systems and Control (ISCO), 2016 10th International Conference (pp. 1–6). IEEE.
19.
go back to reference Buchanan, W. J., Li, S., & Asif, R. (2017). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3–4), 187–201.CrossRef Buchanan, W. J., Li, S., & Asif, R. (2017). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3–4), 187–201.CrossRef
20.
go back to reference Zhang, X. (2011). Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 18(4), 255–258.CrossRef Zhang, X. (2011). Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 18(4), 255–258.CrossRef
21.
go back to reference Xu, D., Chen, K., Wang, R., & Su, S. (2018). Separable reversible data hiding in encrypted images based on two-dimensional histogram modification. Security and Communication Networks, 2018. Xu, D., Chen, K., Wang, R., & Su, S. (2018). Separable reversible data hiding in encrypted images based on two-dimensional histogram modification. Security and Communication Networks, 2018.
22.
go back to reference Yi, S., Zhou, Y., & Hua, Z. (2018). Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Processing: Image Communication, 64, 78–88. Yi, S., Zhou, Y., & Hua, Z. (2018). Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Processing: Image Communication, 64, 78–88.
23.
go back to reference Elhoseny, M., Yuan, X., ElMinir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, Wiley, 9(13), 2024–2031. Elhoseny, M., Yuan, X., ElMinir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, Wiley, 9(13), 2024–2031.
24.
go back to reference Qin, C., Zhang, W., Cao, F., Zhang, X., & Chang, C. C. (2018). Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Processing, 153, 109–122.CrossRef Qin, C., Zhang, W., Cao, F., Zhang, X., & Chang, C. C. (2018). Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Processing, 153, 109–122.CrossRef
25.
go back to reference Hammad, B. T., Jamil, N., Rusli, M. E., & Zaba, M. R. A survey of lightweight cryptographic hash function. Hammad, B. T., Jamil, N., Rusli, M. E., & Zaba, M. R. A survey of lightweight cryptographic hash function.
26.
go back to reference Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4. IEEE. Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4. IEEE.
27.
go back to reference Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In 3rd International Conference on Advanced Intelligent Systems and Informatics (AISI2017) (2017, September 9–11). Cairo-Egypt: Springer. Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In 3rd International Conference on Advanced Intelligent Systems and Informatics (AISI2017) (2017, September 9–11). Cairo-Egypt: Springer.
28.
go back to reference Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13. https://doi.org/10.1007/s12652-018-1161-0. Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13. https://​doi.​org/​10.​1007/​s12652-018-1161-0.
29.
go back to reference Majumdar, D., & Mallick, S. (2016, September). Cuckoo search algorithm for constraint satisfaction and optimization. In Research in Computational Intelligence and Communication Networks (ICRCICN), 2016 Second International Conference (pp. 235–240). IEEE. Majumdar, D., & Mallick, S. (2016, September). Cuckoo search algorithm for constraint satisfaction and optimization. In Research in Computational Intelligence and Communication Networks (ICRCICN), 2016 Second International Conference (pp. 235–240). IEEE.
30.
go back to reference Fedoseev, V. (2017). A model for data hiding system description. In 3rd International Conference on Information Technology and Nanotechnology (pp. 65–71). Fedoseev, V. (2017). A model for data hiding system description. In 3rd International Conference on Information Technology and Nanotechnology (pp. 65–71).
Metadata
Title
Optimal Data Hiding Key in Encrypted Images Based Digital Image Security in Wireless Sensor Networks
Authors
K. Shankar
Mohamed Elhoseny
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-20816-5_7