Weitere Kapitel dieses Buchs durch Wischen aufrufen
Visual share creation, with a security model, verifies the secret data transmitted by the sender. It uses human vision to decrypt the encrypted images without complex algorithms for secure communication in networking. The image sensing process joined with preparing force and wireless communication makes it rewarding for being abused in wealth in future. The proposed security module beats the downsides of the complex usage in traditional or ordinary cryptography models in wireless sensor network (WSN). This chapter proposed an optimal private key and public key-based hash function for secret share security modeling. Initially, the original Digital Images were considered to produce ‘n’ number of shares for security. When the quantity of share was expanded, the security level also got expanded. In the current technique, three shares were produced by visual secret share creation strategy when the shares were made; hash function and qualities were applied to secure the shares in images. For an optimal key selection model, opposition-based Grey Wolf Optimization (OGWO) was considered. Based on this ideal private key and public keys, the share images were encrypted and decrypted between the sender and the receiver. The test results demonstrated better security, less computational time and the most extreme entropy with high PSNR values when compared with other techniques.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468. CrossRef
Ulutas, M., Yazici, R., Nabiyev, V. V., & Ulutas, G. (2008, October). (2, 2)-secret sharing scheme with improved share randomness. In 23rd International Symposium on Computer and Information Sciences, 2008, ISCIS’08 (pp. 1–5). IEEE.
Eswaran, P., & Shankar, K. (2017). Multi secret image sharing scheme based on DNA Cryptography with XOR. International Journal of Pure and Applied Mathematics, 118(7), 393–398.
Mohamed, R. E., Ghanem, W. R., Khalil, A. T., Elhoseny, M., Sajjad, M., & Mohamed, M. A. (2018). Energy efficient collaborative proactive routing protocol for wireless sensor network. Computer Networks. Available online June 19, 2018.
Shankar, K., & Eswaran, P. (2015). ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. International Journal of Applied Engineering Research, 10(55), 1841–1845.
Shankar, K., Devika, G., & Ilayaraja, M. (2017). Secure and efficient multi-secret image sharing scheme based on boolean operations and elliptic curve cryptography. International Journal of Pure and Applied Mathematics, 116(10), 293–300.
Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031.
Cortier, V., & Steel, G. (2009, September). A generic security API for symmetric key management on cryptographic devices. In European Symposium on Research in Computer Security (pp. 605–620). Berlin, Heidelberg: Springer.
Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.
Thomas, G., Jamaludheen, J., Sibi, L., & Maneesh, P. (2015, April). A novel mathematical model for group communication with trusted key generation and distribution using Shamir’s secret key and USB security. In 2015 International Conference on Communications and Signal Processing (ICCSP) (pp. 0435–0438). IEEE.
Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154. CrossRef
Elsayed, W., Elhoseny, M., Sabbeh, S., & Riad, A. (In Press). Self-maintenance model for wireless sensor networks. Computers and Electrical Engineering. Available online December 2017.
Anbarasi, L. J., Mala, G. A., & Narendra, M. (2015). DNA based multi-secret image sharing. Procedia Computer Science, 46, 1794–1801. CrossRef
Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In 2016 10th International Conference on Intelligent Systems and Control (ISCO) (pp. 1–6). IEEE.
Bhadravati, S., Atrey, P. K., & Khabbazian, M. (2015). Scalable secret sharing of compressed multimedia. Journal of Information Security and Applications, 23, 8–27. CrossRef
El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies.
Do, Q., Martini, B., & Choo, K. K. R. (2018). The role of the adversary model in applied security research. Computers & Security.
Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.
Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(9), 22–27.
Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46–61. CrossRef
Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138. CrossRef
Chum, C. S., & Zhang, X. (2013). Hash function-based secret sharing scheme designs. Security and Communication Networks, 6(5), 584–592. CrossRef
- Multiple Share Creation with Optimal Hash Function for Image Security in WSN Aid of OGWO
- Chapter 9