Weitere Kapitel dieses Buchs durch Wischen aufrufen
Security of the media information such as image and video is one of the fundamental prerequisites for broadcasting communications and computer systems. Most of image security system, for famous systems, similar to the Internet, is not reasonable for wireless sensor systems, requesting legitimate examination around there. In the proposed investigation, the security of Digital Images (DI) is upgraded by utilizing a Lightweight encryption algorithm. To ensure security, the images selected for security investigation was shared by a number of copies. With the help of the presented share creation model, for example, Chinese Remainder Theorem (CRT), the image was encoded into a number of shares and the created shares were highly secured by the proposed Stream Encryption (SE) algorithm. The metaheuristic algorithm was introduced by passing the selection of optimal public and private keys to encrypt as well as decrypt the image in secure transmission. With the help of Improved Cuckoo Search Algorithm (ICSA), the optimal keys were selected with fitness function as maximum throughput. The proposed SE-based ICSA algorithm consumed the least time in creating key value to decrypt the image in WSN security model. The simulation result exhibited that the SE-based ICSA algorithm enhanced the exactness of DI security for all input images (Lena, Barbara, baboon, house, and airplane) when compared with existing algorithms.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Patel, T., & Srivastava, R. (2016, August). A new technique for color share generation using visual cryptography. In International Conference on Inventive Computation Technologies (ICICT) (Vol. 2, pp. 1–4). IEEE.
Khokhar, P., & Jena, D. (2017). Color image visual cryptography scheme with enhanced security. In Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications (pp. 267–279). Singapore: Springer.
Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with the oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208. CrossRef
Gupta, M., & Chauhan, D. (2015). A visual cryptographic scheme to secure image shares using digital watermarking. International Journal of Computer Science and Information Technologies (IJCSIT).
Shinde, K. V., Kaur, H., & Patil, P. (2015, February). Enhance security for spontaneous wireless ad hoc network creation. In 2015 International Conference on Computing Communication Control and Automation (ICCUBEA) (pp. 247–250). IEEE.
Elhoseny, M., & Hassanien, A. E. (2019). Dynamic wireless sensor networks: New directions for smart technologies. Published in Studies in Systems, Decision and Control. Springer.
Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468.
Begum, A. A. S., & Nirmala, S. (2018). Secure visual cryptography for medical image using modified cuckoo search. Multimedia Tools and Applications, 1–20.
Wadi, S. M., & Zainal, N. (2017). Enhanced hybrid image security algorithms for high definition images in multiple applications. Multidimensional Systems and Signal Processing, 1–24.
Kita, N., & Miyata, K. (2018). Magic sheets: Visual cryptography with common shares. Computational Visual Media, 4(2), 185–195. CrossRef
Do, Q., Martini, B., & Choo, K. K. R. (2018). The role of the adversary model in applied security research. Computers & Security.
Sreelaja, N. K., & Pai, G. V. (2012). Stream cipher for binary image encryption using Ant Colony Optimization based key generation. Applied Soft Computing, 12(9), 2879–2895. CrossRef
Aïssa, B., Nadir, D., & Mohamed, R. (2011, July). Image encryption using stream cipher algorithm with nonlinear filtering function. In 2011 International Conference on High Performance Computing and Simulation (HPCS) (pp. 830–835). IEEE.
El‐Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies, e3523.
Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. (2018). Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, e5122.
Li, Y., Xiong, C., Han, X., Du, H., & He, F. (2018). Internet-scale secret sharing algorithm with multimedia applications. Multimedia Tools and Applications, 1–6.
Liu, Y., & Chang, C. C. (2018). A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools and Applications, 1–16.
Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.
Al-Khalid, R. I., Al-Dallah, R. A., Al-Anani, A. M., Barham, R. M., & Hajir, S. I. (2017). A secure visual cryptography scheme using private key with invariant share sizes. Journal of Software Engineering and Applications, 10(1), 1–10. CrossRef
Elhoseny, M., Farouk, A., Zhou, N., Wang, M.-M., Abdalla, S., & Batle, J. (2017). Dynamic multi-hop clustering in a wireless sensor network: Performance improvement. Wireless Personal Communications, Springer US, 95(4), 3733–3753.
Elhoseny, M., Tharwat, A., Yuan, X., & Hassanien, A. E. (2018). Optimizing K-coverage of mobile WSNs. Expert Systems with Applications, 92, 142–153. CrossRef
- Optimal Stream Encryption for Multiple Shares of Images by Improved Cuckoo Search Model
- Chapter 10