Reference Hub11
Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network

Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network

Mohamed Elhoseny, Ahmed Farouk, Josep Batle, Abdulaziz Shehab, Aboul Ella Hassanien
Copyright: © 2017 |Pages: 19
ISBN13: 9781522522294|ISBN10: 1522522298|EISBN13: 9781522522300
DOI: 10.4018/978-1-5225-2229-4.ch045
Cite Chapter Cite Chapter

MLA

Elhoseny, Mohamed, et al. "Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network." Handbook of Research on Machine Learning Innovations and Trends, edited by Aboul Ella Hassanien and Tarek Gaber, IGI Global, 2017, pp. 1022-1040. https://doi.org/10.4018/978-1-5225-2229-4.ch045

APA

Elhoseny, M., Farouk, A., Batle, J., Shehab, A., & Hassanien, A. E. (2017). Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network. In A. Hassanien & T. Gaber (Eds.), Handbook of Research on Machine Learning Innovations and Trends (pp. 1022-1040). IGI Global. https://doi.org/10.4018/978-1-5225-2229-4.ch045

Chicago

Elhoseny, Mohamed, et al. "Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network." In Handbook of Research on Machine Learning Innovations and Trends, edited by Aboul Ella Hassanien and Tarek Gaber, 1022-1040. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-2229-4.ch045

Export Reference

Mendeley
Favorite

Abstract

WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, health care and military applications. Although there are a lot of secure image processing schemas designed for image transmission over a network, the limited resources and the dynamic environment make it invisible to be used with Wireless Sensor Networks (WSNs). In addition, the current secure data transmission schemas in WSN are concentrated on the text data and are not applicable for image transmission's applications. Furthermore, secure image transmission is a big challenging issue in WSNs especially for the application that uses image as its main data such as military applications. The reason why is because the limited resources of the sensor nodes which are usually deployed in unattended environments. This chapter introduces a secure image processing and transmission schema in WSN using Elliptic Curve Cryptography (ECC) and Homomorphic Encryption (HE).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.