Skip to main content

Optimal Lightweight Encryption Based Secret Share Creation Scheme for Digital Images in Wireless Sensor Networks

  • Chapter
  • First Online:
Secure Image Transmission in Wireless Sensor Network (WSN) Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 564))

Abstract

Due to the advances in the computerized world, security has turned into an indivisible issue while transmitting the image. Secret Image Sharing (SIS) scheme is an updated cryptographic strategy which can be utilized to transmit a unique image from the sender to the receiver with incomparable privacy and secrecy in Wireless Sensor Network (WSN). Most traditional security techniques for popular systems, similar to the Internet, are not appropriate for WSN, requesting appropriate examination around there. It manages the procedure utilized to remodel the data among justifiable and deep structures through encryption and decryption strategies under the intensity of the keys. In this part, a high-security model for DI is proposed using a secret image share creation scheme with a novel Light Weight Symmetric Algorithm (LWSA). This cryptographic strategy partitioned the secret image into shares for the security analysis by optimal key selection in LWSA technique; here Adaptive Particle Swarm Optimization (APSO) is used. Moreover, this methodology is applying full encryption to image transmission over WSNs by offloading the computational outstanding task at hand of sensors to a server. The proposed LWSA plot offered better security for shares and furthermore reduced the deceitful shares of the secret image. The trial results and the investigations inferred that the proposed model can viably encrypt the image with quick execution speed and expanded PSNR value.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ulutas, M. (2010). Meaningful share generation for an increased number of secrets in the visual secret-sharing scheme. Mathematical Problems in Engineering.

    Google Scholar 

  2. Gaber, T., Abdelwahab, S., Elhoseny, M., & Hassanien, A. E. (2018). Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks. Available online 2018, September 17.

    Google Scholar 

  3. Abusitta, A. H. (2012). A visualcryptography based digital image copyright protection. Journal of Information Security, 3(02), 96.

    Article  Google Scholar 

  4. Ogiela, M. R., & Ogiela, L. (2015, November). Bio-inspired approaches for secret data sharing techniques. In Intelligent Informatics and Biomedical Sciences (ICIIBMS), 2015 International Conference (pp. 75–78). IEEE.

    Google Scholar 

  5. Al-Ghamdi, M., Al-Ghamdi, M., & Gutub, A. (2018). Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools and Applications, 1–28.

    Google Scholar 

  6. Arora, S., & Hussain, M. (2018, September). Secure session key sharing using symmetric key cryptography. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 850–855). IEEE.

    Google Scholar 

  7. Shankar, K., Devika, G., & Ilayaraja, M. (2017). Secure and efficient multi-secret image sharing scheme based on boolean operations and elliptic curve cryptography. International Journal of Pure and Applied Mathematics, 116(10), 293–300.

    Google Scholar 

  8. Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4. IEEE.

    Google Scholar 

  9. Hodeish, M. E., Bukauskas, L., & Humbe, V. T. (2016). An Optimal (k, n) visual secret sharing scheme for information security. Procedia Computer Science, 93, 760–767.

    Article  Google Scholar 

  10. Ulutas, M., Yazici, R., Nabiyev, V. V., & Ulutas, G. (2008, October). (2, 2)-Secret sharing scheme with improved share randomness. In Computer and Information Sciences, 2008. ISCIS’08. 23rd International Symposium (pp. 1–5). IEEE.

    Google Scholar 

  11. Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468.

    Article  Google Scholar 

  12. Yan, X., Lu, Y., & Liu, L. (2019). A general progressive secret image sharing construction method. Signal Processing: Image Communication, 71, 66–75.

    Google Scholar 

  13. Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In Intelligent Systems and Control (ISCO), 2016 10th International Conference (pp. 1–6). IEEE.

    Google Scholar 

  14. Elhoseny, M., Yuan, X., ElMinir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031. Wiley.

    Google Scholar 

  15. Patel, T., & Srivastava, R. (2016, August). A new technique for color share generation using visual cryptography. In Inventive Computation Technologies (ICICT), International Conference (Vol. 2, pp. 1–4). IEEE.

    Google Scholar 

  16. Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic & Applied Science, 9(36), 150–163.

    Google Scholar 

  17. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.

    Google Scholar 

  18. Zhang, T., Ke, X., & Liu, Y. (2018). (t, n) multi-secret sharing scheme extended from Harn-Hsu’s scheme. EURASIP Journal on Wireless Communications and Networking, 2018(1), 71.

    Article  Google Scholar 

  19. Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.

    Google Scholar 

  20. Kanso, A., & Ghebleh, M. (2018). An efficient lossless secret sharing scheme for medical images. Journal of Visual Communication and Image Representation, 56, 245–255.

    Article  Google Scholar 

  21. Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.

    Article  Google Scholar 

  22. Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.

    Article  Google Scholar 

  23. Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.

    Article  Google Scholar 

  24. El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies (e3523).

    Google Scholar 

  25. Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In 3rd International Conference on Advanced Intelligent Systems and Informatics (AISI2017) (2017, September 9–11). Cairo-Egypt: Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Shankar .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shankar, K., Elhoseny, M. (2019). Optimal Lightweight Encryption Based Secret Share Creation Scheme for Digital Images in Wireless Sensor Networks. In: Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Lecture Notes in Electrical Engineering, vol 564. Springer, Cham. https://doi.org/10.1007/978-3-030-20816-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20816-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20815-8

  • Online ISBN: 978-3-030-20816-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics