Abstract
Due to the advances in the computerized world, security has turned into an indivisible issue while transmitting the image. Secret Image Sharing (SIS) scheme is an updated cryptographic strategy which can be utilized to transmit a unique image from the sender to the receiver with incomparable privacy and secrecy in Wireless Sensor Network (WSN). Most traditional security techniques for popular systems, similar to the Internet, are not appropriate for WSN, requesting appropriate examination around there. It manages the procedure utilized to remodel the data among justifiable and deep structures through encryption and decryption strategies under the intensity of the keys. In this part, a high-security model for DI is proposed using a secret image share creation scheme with a novel Light Weight Symmetric Algorithm (LWSA). This cryptographic strategy partitioned the secret image into shares for the security analysis by optimal key selection in LWSA technique; here Adaptive Particle Swarm Optimization (APSO) is used. Moreover, this methodology is applying full encryption to image transmission over WSNs by offloading the computational outstanding task at hand of sensors to a server. The proposed LWSA plot offered better security for shares and furthermore reduced the deceitful shares of the secret image. The trial results and the investigations inferred that the proposed model can viably encrypt the image with quick execution speed and expanded PSNR value.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ulutas, M. (2010). Meaningful share generation for an increased number of secrets in the visual secret-sharing scheme. Mathematical Problems in Engineering.
Gaber, T., Abdelwahab, S., Elhoseny, M., & Hassanien, A. E. (2018). Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks. Available online 2018, September 17.
Abusitta, A. H. (2012). A visualcryptography based digital image copyright protection. Journal of Information Security, 3(02), 96.
Ogiela, M. R., & Ogiela, L. (2015, November). Bio-inspired approaches for secret data sharing techniques. In Intelligent Informatics and Biomedical Sciences (ICIIBMS), 2015 International Conference (pp. 75–78). IEEE.
Al-Ghamdi, M., Al-Ghamdi, M., & Gutub, A. (2018). Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools and Applications, 1–28.
Arora, S., & Hussain, M. (2018, September). Secure session key sharing using symmetric key cryptography. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 850–855). IEEE.
Shankar, K., Devika, G., & Ilayaraja, M. (2017). Secure and efficient multi-secret image sharing scheme based on boolean operations and elliptic curve cryptography. International Journal of Pure and Applied Mathematics, 116(10), 293–300.
Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4. IEEE.
Hodeish, M. E., Bukauskas, L., & Humbe, V. T. (2016). An Optimal (k, n) visual secret sharing scheme for information security. Procedia Computer Science, 93, 760–767.
Ulutas, M., Yazici, R., Nabiyev, V. V., & Ulutas, G. (2008, October). (2, 2)-Secret sharing scheme with improved share randomness. In Computer and Information Sciences, 2008. ISCIS’08. 23rd International Symposium (pp. 1–5). IEEE.
Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468.
Yan, X., Lu, Y., & Liu, L. (2019). A general progressive secret image sharing construction method. Signal Processing: Image Communication, 71, 66–75.
Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In Intelligent Systems and Control (ISCO), 2016 10th International Conference (pp. 1–6). IEEE.
Elhoseny, M., Yuan, X., ElMinir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031. Wiley.
Patel, T., & Srivastava, R. (2016, August). A new technique for color share generation using visual cryptography. In Inventive Computation Technologies (ICICT), International Conference (Vol. 2, pp. 1–4). IEEE.
Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic & Applied Science, 9(36), 150–163.
Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.
Zhang, T., Ke, X., & Liu, Y. (2018). (t, n) multi-secret sharing scheme extended from Harn-Hsu’s scheme. EURASIP Journal on Wireless Communications and Networking, 2018(1), 71.
Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.
Kanso, A., & Ghebleh, M. (2018). An efficient lossless secret sharing scheme for medical images. Journal of Visual Communication and Image Representation, 56, 245–255.
Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.
Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.
Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.
El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies (e3523).
Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In 3rd International Conference on Advanced Intelligent Systems and Informatics (AISI2017) (2017, September 9–11). Cairo-Egypt: Springer.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Shankar, K., Elhoseny, M. (2019). Optimal Lightweight Encryption Based Secret Share Creation Scheme for Digital Images in Wireless Sensor Networks. In: Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Lecture Notes in Electrical Engineering, vol 564. Springer, Cham. https://doi.org/10.1007/978-3-030-20816-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-20816-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-20815-8
Online ISBN: 978-3-030-20816-5
eBook Packages: EngineeringEngineering (R0)