Skip to main content

2019 | OriginalPaper | Buchkapitel

8. Optimal Lightweight Encryption Based Secret Share Creation Scheme for Digital Images in Wireless Sensor Networks

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the advances in the computerized world, security has turned into an indivisible issue while transmitting the image. Secret Image Sharing (SIS) scheme is an updated cryptographic strategy which can be utilized to transmit a unique image from the sender to the receiver with incomparable privacy and secrecy in Wireless Sensor Network (WSN). Most traditional security techniques for popular systems, similar to the Internet, are not appropriate for WSN, requesting appropriate examination around there. It manages the procedure utilized to remodel the data among justifiable and deep structures through encryption and decryption strategies under the intensity of the keys. In this part, a high-security model for DI is proposed using a secret image share creation scheme with a novel Light Weight Symmetric Algorithm (LWSA). This cryptographic strategy partitioned the secret image into shares for the security analysis by optimal key selection in LWSA technique; here Adaptive Particle Swarm Optimization (APSO) is used. Moreover, this methodology is applying full encryption to image transmission over WSNs by offloading the computational outstanding task at hand of sensors to a server. The proposed LWSA plot offered better security for shares and furthermore reduced the deceitful shares of the secret image. The trial results and the investigations inferred that the proposed model can viably encrypt the image with quick execution speed and expanded PSNR value.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ulutas, M. (2010). Meaningful share generation for an increased number of secrets in the visual secret-sharing scheme. Mathematical Problems in Engineering. Ulutas, M. (2010). Meaningful share generation for an increased number of secrets in the visual secret-sharing scheme. Mathematical Problems in Engineering.
2.
Zurück zum Zitat Gaber, T., Abdelwahab, S., Elhoseny, M., & Hassanien, A. E. (2018). Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks. Available online 2018, September 17. Gaber, T., Abdelwahab, S., Elhoseny, M., & Hassanien, A. E. (2018). Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks. Available online 2018, September 17.
3.
Zurück zum Zitat Abusitta, A. H. (2012). A visualcryptography based digital image copyright protection. Journal of Information Security, 3(02), 96.CrossRef Abusitta, A. H. (2012). A visualcryptography based digital image copyright protection. Journal of Information Security, 3(02), 96.CrossRef
4.
Zurück zum Zitat Ogiela, M. R., & Ogiela, L. (2015, November). Bio-inspired approaches for secret data sharing techniques. In Intelligent Informatics and Biomedical Sciences (ICIIBMS), 2015 International Conference (pp. 75–78). IEEE. Ogiela, M. R., & Ogiela, L. (2015, November). Bio-inspired approaches for secret data sharing techniques. In Intelligent Informatics and Biomedical Sciences (ICIIBMS), 2015 International Conference (pp. 75–78). IEEE.
5.
Zurück zum Zitat Al-Ghamdi, M., Al-Ghamdi, M., & Gutub, A. (2018). Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools and Applications, 1–28. Al-Ghamdi, M., Al-Ghamdi, M., & Gutub, A. (2018). Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools and Applications, 1–28.
6.
Zurück zum Zitat Arora, S., & Hussain, M. (2018, September). Secure session key sharing using symmetric key cryptography. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 850–855). IEEE. Arora, S., & Hussain, M. (2018, September). Secure session key sharing using symmetric key cryptography. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 850–855). IEEE.
7.
Zurück zum Zitat Shankar, K., Devika, G., & Ilayaraja, M. (2017). Secure and efficient multi-secret image sharing scheme based on boolean operations and elliptic curve cryptography. International Journal of Pure and Applied Mathematics, 116(10), 293–300. Shankar, K., Devika, G., & Ilayaraja, M. (2017). Secure and efficient multi-secret image sharing scheme based on boolean operations and elliptic curve cryptography. International Journal of Pure and Applied Mathematics, 116(10), 293–300.
8.
Zurück zum Zitat Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4. IEEE. Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4. IEEE.
9.
Zurück zum Zitat Hodeish, M. E., Bukauskas, L., & Humbe, V. T. (2016). An Optimal (k, n) visual secret sharing scheme for information security. Procedia Computer Science, 93, 760–767.CrossRef Hodeish, M. E., Bukauskas, L., & Humbe, V. T. (2016). An Optimal (k, n) visual secret sharing scheme for information security. Procedia Computer Science, 93, 760–767.CrossRef
10.
Zurück zum Zitat Ulutas, M., Yazici, R., Nabiyev, V. V., & Ulutas, G. (2008, October). (2, 2)-Secret sharing scheme with improved share randomness. In Computer and Information Sciences, 2008. ISCIS’08. 23rd International Symposium (pp. 1–5). IEEE. Ulutas, M., Yazici, R., Nabiyev, V. V., & Ulutas, G. (2008, October). (2, 2)-Secret sharing scheme with improved share randomness. In Computer and Information Sciences, 2008. ISCIS’08. 23rd International Symposium (pp. 1–5). IEEE.
11.
Zurück zum Zitat Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468.CrossRef Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468.CrossRef
12.
Zurück zum Zitat Yan, X., Lu, Y., & Liu, L. (2019). A general progressive secret image sharing construction method. Signal Processing: Image Communication, 71, 66–75. Yan, X., Lu, Y., & Liu, L. (2019). A general progressive secret image sharing construction method. Signal Processing: Image Communication, 71, 66–75.
13.
Zurück zum Zitat Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In Intelligent Systems and Control (ISCO), 2016 10th International Conference (pp. 1–6). IEEE. Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In Intelligent Systems and Control (ISCO), 2016 10th International Conference (pp. 1–6). IEEE.
14.
Zurück zum Zitat Elhoseny, M., Yuan, X., ElMinir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031. Wiley. Elhoseny, M., Yuan, X., ElMinir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031. Wiley.
15.
Zurück zum Zitat Patel, T., & Srivastava, R. (2016, August). A new technique for color share generation using visual cryptography. In Inventive Computation Technologies (ICICT), International Conference (Vol. 2, pp. 1–4). IEEE. Patel, T., & Srivastava, R. (2016, August). A new technique for color share generation using visual cryptography. In Inventive Computation Technologies (ICICT), International Conference (Vol. 2, pp. 1–4). IEEE.
16.
Zurück zum Zitat Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic & Applied Science, 9(36), 150–163. Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic & Applied Science, 9(36), 150–163.
17.
Zurück zum Zitat Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.
18.
Zurück zum Zitat Zhang, T., Ke, X., & Liu, Y. (2018). (t, n) multi-secret sharing scheme extended from Harn-Hsu’s scheme. EURASIP Journal on Wireless Communications and Networking, 2018(1), 71.CrossRef Zhang, T., Ke, X., & Liu, Y. (2018). (t, n) multi-secret sharing scheme extended from Harn-Hsu’s scheme. EURASIP Journal on Wireless Communications and Networking, 2018(1), 71.CrossRef
19.
Zurück zum Zitat Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13. Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.
20.
Zurück zum Zitat Kanso, A., & Ghebleh, M. (2018). An efficient lossless secret sharing scheme for medical images. Journal of Visual Communication and Image Representation, 56, 245–255.CrossRef Kanso, A., & Ghebleh, M. (2018). An efficient lossless secret sharing scheme for medical images. Journal of Visual Communication and Image Representation, 56, 245–255.CrossRef
21.
Zurück zum Zitat Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.CrossRef Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.CrossRef
22.
Zurück zum Zitat Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.CrossRef Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.CrossRef
23.
Zurück zum Zitat Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRef Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRef
24.
Zurück zum Zitat El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies (e3523). El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies (e3523).
25.
Zurück zum Zitat Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In 3rd International Conference on Advanced Intelligent Systems and Informatics (AISI2017) (2017, September 9–11). Cairo-Egypt: Springer. Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In 3rd International Conference on Advanced Intelligent Systems and Informatics (AISI2017) (2017, September 9–11). Cairo-Egypt: Springer.
Metadaten
Titel
Optimal Lightweight Encryption Based Secret Share Creation Scheme for Digital Images in Wireless Sensor Networks
verfasst von
K. Shankar
Mohamed Elhoseny
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-20816-5_8

Neuer Inhalt