Optimal Data Hiding Key in Encrypted Images Based Digital Image Security in Wireless Sensor Networks
An effective optimal Data Hiding (DH) key with Light Weight Encryption (LWE) is proposed in this chapter. There are numerous issues in wireless sensor organize like client authentication just as information travel in the system isn’t so much secure. The image was encrypted with a secret key; yet conceivable to insert extra information for secret key. On sender side, the cover image was considered for the encryption procedure by hash function after which the data hiding method was used to hide the images utilizing the optimal data hiding keys. For key selection the current research utilized the Enhanced Cuckoo Search Optimization (ECS) method. The most extreme embedding capacity and security level were achieved. In reversible process, at the receiver side, the embedded image undergoes decryption procedure to recouped image and the data is selected by public key (Shankar and Eswaran in J Circuits Syst Comput 25(11):1650138, 2016) . It can be applied in various application situations; moreover, the data extraction and image recovery are free of any errors. From this security model, the hided image containing the installed information can be then sent to combination focus utilizing sensor networks. At the combination focus, the hidden information is separated from the picture, the required handling is performed and choice is taken consequently. From the implementation procedure, the proposed model attained the most extreme Hiding Capacity (HC) (91.073%) and the greatest PSNR (59.188 dB), compared to other conventional techniques.
KeywordsData hiding (DH) Key selection Optimization Security Embedding Extracting and light weight encryption
- 5.Al-Afandy, K. A., Faragallah, O. S., Elmhalawy, A., El-Rabaie, E. S. M., & El-Banby, G. M. (2016, October). High security data hiding using image cropping and LSB least significant bit steganography. In 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt) (pp. 400–404). IEEE.Google Scholar
- 6.Ilayaraja, M., Shankar, K., & Devika, G. (2017). A modified symmetric key cryptography method for secure data transmission. International Journal of Pure and Applied Mathematics, 116(10), 301–308.Google Scholar
- 7.Mohamed, R. E., Ghanem, W. R., Khalil, A. T., Elhoseny, M., Sajjad, M., & Mohamed, M. A. (2018). Energy efficient collaborative proactive routing protocol for wireless sensor network. Computer Networks. Available online 2018, June 19.Google Scholar
- 8.Gupta, D., Khanna, A., Shankar, K., Furtado, V., & Rodrigues, J. J. Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Transactions on Emerging Telecommunications Technologies (e3524). https://doi.org/10.1002/ett.3524.
- 9.Sreekumar, S., & Salam, V. (2014). Advanced reversible data hiding with encrypted data. arXiv preprint arXiv:1408.0733.
- 11.Li, M., Fan, H., Ren, H., Lu, D., Xiao, D., & Li, Y. (2018). Meaningful image encryption based on reversible data hiding in compressive sensing domain. Security and Communication Networks.Google Scholar
- 12.Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.Google Scholar
- 13.Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A. & de Albuquerque, V. H. C. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience (e5122).Google Scholar
- 14.Elsayed, W., Elhoseny, M., Sabbeh, S., Riad, A. (2017). Self-maintenance model for wireless sensor networks. Computers and Electrical Engineering. Available online 2017, December (In Press).Google Scholar
- 17.Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.Google Scholar
- 18.Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In Intelligent Systems and Control (ISCO), 2016 10th International Conference (pp. 1–6). IEEE.Google Scholar
- 21.Xu, D., Chen, K., Wang, R., & Su, S. (2018). Separable reversible data hiding in encrypted images based on two-dimensional histogram modification. Security and Communication Networks, 2018.Google Scholar
- 22.Yi, S., Zhou, Y., & Hua, Z. (2018). Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Processing: Image Communication, 64, 78–88.Google Scholar
- 23.Elhoseny, M., Yuan, X., ElMinir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, Wiley, 9(13), 2024–2031.Google Scholar
- 25.Hammad, B. T., Jamil, N., Rusli, M. E., & Zaba, M. R. A survey of lightweight cryptographic hash function.Google Scholar
- 26.Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4. IEEE.Google Scholar
- 27.Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In 3rd International Conference on Advanced Intelligent Systems and Informatics (AISI2017) (2017, September 9–11). Cairo-Egypt: Springer.Google Scholar
- 28.Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13. https://doi.org/10.1007/s12652-018-1161-0.
- 29.Majumdar, D., & Mallick, S. (2016, September). Cuckoo search algorithm for constraint satisfaction and optimization. In Research in Computational Intelligence and Communication Networks (ICRCICN), 2016 Second International Conference (pp. 235–240). IEEE.Google Scholar
- 30.Fedoseev, V. (2017). A model for data hiding system description. In 3rd International Conference on Information Technology and Nanotechnology (pp. 65–71).Google Scholar