An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks

  • K. ShankarEmail author
  • Mohamed Elhoseny
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 564)


The fast development of networking permits substantial documents, for example, multimedia images, to be effectively transmitted over the Wireless Sensor Networks (WSNs). An image encryption is generally used to guarantee the security as it may secure the images in the greater part. The process of securing the images in WSN against unauthorized users is a challenging one. For guaranteeing high security among Digital Images (DIs), Light Weight Cryptographic (LWC) algorithms are utilized which split the DI into a number of blocks; this will upgrade the level of security in WSN. Here, the proposed block cipher is RECTANGLE which separates the image in a bit-slice style; and improves the DI security level by encryption and decryption depending on the determination of optimal public key and private key individually. The key optimization was finished by the metaheuristic algorithm, for example, Opposition-based Grey Wolf Optimization (OGWO) which chosen optimal key on the basis of the most extreme PSNR value. The exhibited RECTANGLE–OGWO accomplished the least time to produce key which remained as an incentive to encrypt and decrypt the image. The result showed that the RECTANGLE–OGWO algorithm enhanced the accuracy of DI security for all the images (Lena, Barbara, Baboon, Airplane and House) when contrasted with existing algorithms.


Digital image (DI) security in WSN Encryption LWC RECTANGLE block cipher Grey wolf optimization 


  1. 1.
    Li, X., Wang, Y., Wang, Q. H., Liu, Y., & Zhou, X. (2019). Modified integral imaging reconstruction and encryption using an improved SR reconstruction algorithm. Optics and Lasers in Engineering, 112, 162–169.CrossRefGoogle Scholar
  2. 2.
    Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(1.9), 22–27.Google Scholar
  3. 3.
    Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.Google Scholar
  4. 4.
    Roy, A., Misra, A. P., & Banerjee, S. (2019). Chaos-based image encryption using vertical-cavity surface-emitting lasers. Journal for Light and Electron Optics, 176, 119–131.Google Scholar
  5. 5.
    Yu, N., Xi, S., Wang, X., Zhang, C., Wang, W., Dong, Z., et al. (2019). Double images encryption in optical image subtraction/addition 4F system. Optik, 178, 135–141.CrossRefGoogle Scholar
  6. 6.
    Hegde, R., & Jagadeesha, S. (2016). An optimal modified matrix encoding technique for secret writing in MPEG video using ECC. Computer Standards & Interfaces, 48, 173–182.CrossRefGoogle Scholar
  7. 7.
    Wang, Y., Zhang, W., Chen, G., Yang, X., & Hu, W. (2019). Multi-Gbit/s real-time modems for chaotic optical OFDM data encryption and decryption. Optics Communications, 432, 39–43.CrossRefGoogle Scholar
  8. 8.
    Boukerche, A., & Sun, P. (2018). Connectivity and coverage based protocols for wireless sensor networks. Ad Hoc Networks, 80, 54–69.CrossRefGoogle Scholar
  9. 9.
    Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. In Neural computing and applications (pp. 1–15).Google Scholar
  10. 10.
    Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University—Computer and Information Sciences, 28(3), 262–275.CrossRefGoogle Scholar
  11. 11.
    Wang, X. Y., & Li, Z. M. (2019). A color image encryption algorithm based on Hopfield chaotic neural network. Optics and Lasers in Engineering, 115, 107–118.CrossRefGoogle Scholar
  12. 12.
    Su, Y., Wo, Y., & Han, G. (2019). Reversible cellular automata image encryption for similarity search. Signal Processing: Image Communication, 72, 134–147.Google Scholar
  13. 13.
    Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.Google Scholar
  14. 14.
    Patil, B. S. (2015). Image security in wireless sensor networks using wavelet coding. International Journal on Emerging Technologies, 6(2), 239.Google Scholar
  15. 15.
    Mohamed, R. E., Ghanem, W. R., Khalil, A. T., Elhoseny, M., Sajjad, M., & Mohamed, M. A. (2018). Energy efficient collaborative proactive routing protocol for wireless sensor network. Computer Networks, 142, 154–167.CrossRefGoogle Scholar
  16. 16.
    Pan, H., Lei, Y., & Jian, C. (2018). Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018(1), 1–10.Google Scholar
  17. 17.
    Noshadian, S., Ebrahimzade, A., & Kazemitabar, S. J. (2018). Optimizing chaos based image encryption. Multimedia Tools and Applications, 1–22.Google Scholar
  18. 18.
    El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies, 1–14.Google Scholar
  19. 19.
    Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S.K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.Google Scholar
  20. 20.
    Poonam, & Arora, S. M. (2018). A DWT-SVD based robust digital watermarking for digital images. Procedia Computer Science, 132, 1441–1448.Google Scholar
  21. 21.
    Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRefGoogle Scholar
  22. 22.
    Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, 1–11.Google Scholar
  23. 23.
    Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., & Verbauwhede, I. (2015). RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Science China Information Sciences, 58(12), 1–15.Google Scholar
  24. 24.
    Teng, Z. J., Lv, J. L., & Guo, L. W. (2018). An improved hybrid grey wolf optimization algorithm. In Soft computing (pp. 1–15).Google Scholar
  25. 25.
    Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic and Applied Sciences, 9(36), 150–163.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of ComputingKalasalingam Academy of Research and EducationVirudhunagarIndia
  2. 2.Faculty of Computers and InformationMansoura UniversityMansouraEgypt

Personalised recommendations