An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks

  • K. ShankarEmail author
  • Mohamed Elhoseny
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 564)


Security is the rising concern in this specialized rebellion that attracts the analysts towards research and new commitment in Wireless Sensor Network (WSN) field. This chapter proposes a creative technique for image security in WSN using Steganographic and cryptographic model which secures the selected cover images and secret information. The effective Opposition-based Particle Swarm Optimization (OPSO) with Haar wavelet coefficients from Discrete Wavelet Transform (DWT) was brought into the embedding procedure. From this procedure, the encrypted file was deciphered though the encoded document may hide the information even now. This optimal wavelet attained the most extreme Hiding Capacity (HC) and PSNR rate. Finally, the stego images were considered in the security Model i.e., LWC-based SIMON block cipher. It works on the basis of key and round generation model and towards the end, the reverse procedure occurs with the image decryption and extraction modeling. The usage results demonstrated that the proposed security strategy has the most extreme CC and PSNR values (52.544) with minimum error rate (0.493) in comparison with other conventional strategies.


Steganography Security in WSN Discrete wavelet transform (DWT) and particle swarm optimization 


  1. 1.
    Elhoseny, M., Elleithy, K., Elminir, H., Yuan, X., & Riad, A. (2015). Dynamic clustering of heterogeneous wireless sensor networks using a genetic algorithm, towards balancing energy exhaustion. International Journal of Scientific & Engineering Research, 6(8), 1243–1252.Google Scholar
  2. 2.
    Elhoseny, M., Hassanien, A. E. (2019). Secure data transmission in WSN: An overview. In Dynamic wireless sensor networks. Studies in systems, decision and control (Vol. 165, pp. 115–143). Springer, Cham.Google Scholar
  3. 3.
    Hemalatha, S., Acharya, U. D., & Renuka, A. (2015). Wavelet transform based steganography technique to hide audio signals in image. Procedia Computer Science, 47, 272–281.CrossRefGoogle Scholar
  4. 4.
    Muhammad, N., Bibi, N., Mahmood, Z., Akram, T., & Naqvi, S. R. (2017). Reversible integer wavelet transform for blind image hiding method. PLoS ONE, 12(5), e0176979.CrossRefGoogle Scholar
  5. 5.
    Thanikaiselvan, V., Arulmozhivarman, P., Subashanthini, S., & Amirtharajan, R. (2013). A graph theory practice on transformed image: A random image steganography. The Scientific World Journal, 2013.Google Scholar
  6. 6.
    Shet, K. S., & Aswath, A. R. (2015). Image steganography using integer wavelet transform based on color space approach. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 839–848). Springer, Cham.Google Scholar
  7. 7.
    Priya, A. (2018). High capacity and optimized image steganography technique based on ant colony optimization algorithm. International Journal of Emerging Technology and Innovative Engineering, 4(6).Google Scholar
  8. 8.
    Sharma, V. K., Mathur, P., & Srivastava, D. K. (2019). Highly secure DWT steganography scheme for encrypted data hiding. In Information and Communication Technology for Intelligent Systems (pp. 665–673). Springer, Singapore.Google Scholar
  9. 9.
    Subramanian, M., & Korah, R. (2018). A framework of secured embedding scheme using vector discrete wavelet transformation and lagrange interpolation. Journal of Computer Networks and Communications, 2018.Google Scholar
  10. 10.
    Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(1.9), 22–27.Google Scholar
  11. 11.
    Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.CrossRefGoogle Scholar
  12. 12.
    Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.CrossRefGoogle Scholar
  13. 13.
    Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.Google Scholar
  14. 14.
    Sathesh Kumar, K., Shankar, K., Ilayaraja, M., Rajesh, M. (2017). Sensitive data security in cloud computing aid of different encryption techniques. Journal of Advanced Research in Dynamical and Control Systems, 9, 2888–2899.Google Scholar
  15. 15.
    Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H., & Riad, A. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, IEEE, 19(12), 2194–2197.CrossRefGoogle Scholar
  16. 16.
    Elhoseny, M., Hassanien, A. E. (2019). Optimizing cluster head selection in WSN to prolong its existence. In Dynamic wireless sensor networks. studies in systems, decision and control (Vol. 165, pp. 93–111). Springer, Cham.Google Scholar
  17. 17.
    Nipanikar, S. I., Deepthi, V. H., & Kulkarni, N. (2017). A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria Engineering Journal.Google Scholar
  18. 18.
    Sidhik, S., Sudheer, S. K., & Pillai, V. M. (2015). Performance and analysis of high capacity steganography of color images involving wavelet transform. Optik-International Journal for Light and Electron Optics, 126(23), 3755–3760.CrossRefGoogle Scholar
  19. 19.
    Thanki, R., & Borra, S. (2018). A color image steganography in hybrid FRT–DWT domain. Journal of information security and applications, 40, 92–102.CrossRefGoogle Scholar
  20. 20.
    Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.Google Scholar
  21. 21.
    Nipanikar, S. I., Deepthi, V. H. (2017). Entropy based cost function for wavelet based medical image steganography. In 2017 International Conference on Intelligent Sustainable Systems (ICISS) (pp. 211–217). IEEE.Google Scholar
  22. 22.
    Valandar, M. Y., Ayubi, P., & Barani, M. J. (2017). A new transform domain steganography based on modified logistic chaotic map for color images. Journal of Information Security and Applications, 34, 142–151.CrossRefGoogle Scholar
  23. 23.
    Yuvaraja, T., & Sabeenian, R. S. (2018). Performance analysis of medical image security using steganography based on fuzzy logic. Cluster Computing, 1–7.Google Scholar
  24. 24.
    Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRefGoogle Scholar
  25. 25.
    Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. (2018). Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, e5122.
  26. 26.
    Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of ComputingKalasalingam Academy of Research and EducationVirudhunagarIndia
  2. 2.Faculty of Computers and InformationMansoura UniversityMansouraEgypt

Personalised recommendations