An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks

  • K. ShankarEmail author
  • Mohamed Elhoseny
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 564)


In the recent years, numerous security schemes have been proposed to secure the data and Digital Images (DI) over WSNs. Especially, encryption and decryption algorithms are structured and actualized to provide secrecy and security in WSN during the transmission of image-based information just as in storage. In this chapter, Lightweight Cryptography (LWC) based hash function is used for image security in WSN. The hash function keeps up different guidelines which contain a set of tenets with user details, IP address, public and private keys. The hash value of encryption was developed upon the optimal secret key and it was recognized by the Enhanced Cuckoo Search (ECS) optimization. In this ECS model, cuckoo birds choose the nests of various birds to leave its eggs i.e., optimal keys. Further impressive fitness function parameters such as Peak Signal to Noise Ratio (PSNR) were kept consistent in this research. The proposed system provided expanded security and adequately utilized the algorithm when compared with ordinary encryption and optimization strategies.


Encryption Decryption Security WSN Hash function Cuckoo search optimization Optimal key 


  1. 1.
    Thakur, S., Singh, A. K., Ghrera, S. P., & Elhoseny, M. (2018). Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools and Applications, pp. 1–14.Google Scholar
  2. 2.
    Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with the oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.Google Scholar
  3. 3.
    Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems, and Computers, 25(11), 1650138.Google Scholar
  4. 4.
    Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRefGoogle Scholar
  5. 5.
    Bansod, G., Pisharoty, N., & Patil, A. (2016). PICO: An ultra lightweight and low power encryption design for ubiquitous computing. Defense Science Journal, 66(3).Google Scholar
  6. 6.
    Thorat, C. G., & Inamdar, V. S. (2018). Implementation of new hybrid lightweight block cipher. Applied Computing and Informatics.Google Scholar
  7. 7.
    Ratha, P., Swain, D., Paikaray, B., & Sahoo, S. (2015). An optimized encryption technique using an arbitrary matrix with probabilistic encryption. Procedia Computer Science, 57, 1235–1241.CrossRefGoogle Scholar
  8. 8.
    Weng, L., & Preneel, B. (2011, October). A secure perceptual hash algorithm for image content authentication. In IFIP International Conference on Communications and Multimedia Security (pp. 108–121). Berlin, Heidelberg: Springer.Google Scholar
  9. 9.
    Agrawal, H., Kalot, D., Jain, A., & Kahtri, N. (2014, July). Image encryption using various transforms-a brief comparative analysis. In 2014 Annual International Conference on Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD) (pp. 1–4). IEEE.Google Scholar
  10. 10.
    Elsayed, W., Elhoseny, M., Sabbeh, S., & Riad, A. (2017). Self-maintenance model for Wireless Sensor Networks. Computers & Electrical Engineering.Google Scholar
  11. 11.
    Usha, M., & Prabhu, A. (2018, June). Performance Analysis of Encryption Algorithms with Pat-Fish for Cloud Storage Security. In International Conference on Mobile and Wireless Technology (pp. 111–120). Springer, Singapore.Google Scholar
  12. 12.
    Balouch, Z. A., Aslam, M. I., & Ahmed, I. (2017, April). Energy efficient image encryption algorithm. In 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT) (pp. 1–6). IEEE.Google Scholar
  13. 13.
    Nguyen, D. Q., Weng, L., & Preneel, B. (2011, October). Radon transform-based secure image hashing. In IFIP International Conference on Communications and Multimedia Security (pp. 186–193). Berlin, Heidelberg: Springer.Google Scholar
  14. 14.
    Mohd, B. J., & Hayajneh, T. (2018). Lightweight block ciphers for IoT: Energy optimization and survivability techniques. IEEE Access, 6, 35966–35978.CrossRefGoogle Scholar
  15. 15.
    Riad, A., Elhoseny, M., Elminir, H., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.Google Scholar
  16. 16.
    Shih, H., Ho, J., Liao, Y., & Pan, J. (2013). Fault node recovery algorithm for a wireless sensor network. IEEE Sensors Journal, 13(7), 2683–2689.Google Scholar
  17. 17.
    Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.Google Scholar
  18. 18.
    Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32–45.Google Scholar
  19. 19.
    Dhall, S., Pal, S. K., & Sharma, K. (2018). A chaos-based probabilistic block cipher for image encryption. Journal of King Saud University-Computer and Information Sciences.Google Scholar
  20. 20.
    Vengadapurvaja, A. M., Nisha, G., Aarthy, R., & Sasikaladevi, N. (2017). An efficient homomorphic medical image encryption algorithm for cloud storage security. Procedia Computer Science, 115, 643–650.Google Scholar
  21. 21.
    Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in the Internet of Things. Neural Computing and Applications, 1–15.Google Scholar
  22. 22.
    Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with an optimization technique. Australian Journal of Basic and Applied Sciences, 9(36), 150–163.Google Scholar
  23. 23.
    Oad, A., Yadav, H., & Jain, A. (2014). A review: Image encryption techniques and its terminologies. International Journal of Engineering and Advanced Technology (IJEAT), pp. 2249–8958.Google Scholar
  24. 24.
    Weng, L., & Preneel, B. (2011, October). A secure perceptual hash algorithm for image content authentication. In IFIP International Conference on Communications and Multimedia Security (pp. 108–121). Springer, Berlin, Heidelberg.Google Scholar
  25. 25.
    Zhang, M., He, D., & Zhu, C. (2016, December). A cuckoo search algorithm based on hybrid-mutation. In 2016 12th International Conference on Computational Intelligence and Security (CIS) (pp. 538–542). IEEE.Google Scholar
  26. 26.
    Begum, A. A. S., & Nirmala, S. (2018). Secure visual cryptography for a medical image using a modified cuckoo search. Multimedia Tools and Applications, 77(20), 27041–27060.Google Scholar
  27. 27.
    Shankar, K., & Eswaran, P. (2016). A new k out of n secret image sharing scheme in visual cryptography. In 2016 10th International Conference on Intelligent Systems and Control (ISCO), IEEE (pp. 369–374).Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of ComputingKalasalingam Academy of Research and EducationVirudhunagarIndia
  2. 2.Faculty of Computers and InformationMansoura UniversityMansouraEgypt

Personalised recommendations