Advertisement

Optimal Data Hiding Key in Encrypted Images Based Digital Image Security in Wireless Sensor Networks

  • K. ShankarEmail author
  • Mohamed Elhoseny
Chapter
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 564)

Abstract

An effective optimal Data Hiding (DH) key with Light Weight Encryption (LWE) is proposed in this chapter. There are numerous issues in wireless sensor organize like client authentication just as information travel in the system isn’t so much secure. The image was encrypted with a secret key; yet conceivable to insert extra information for secret key. On sender side, the cover image was considered for the encryption procedure by hash function after which the data hiding method was used to hide the images utilizing the optimal data hiding keys. For key selection the current research utilized the Enhanced Cuckoo Search Optimization (ECS) method. The most extreme embedding capacity and security level were achieved. In reversible process, at the receiver side, the embedded image undergoes decryption procedure to recouped image and the data is selected by public key (Shankar and Eswaran in J Circuits Syst Comput 25(11):1650138, 2016) [1]. It can be applied in various application situations; moreover, the data extraction and image recovery are free of any errors. From this security model, the hided image containing the installed information can be then sent to combination focus utilizing sensor networks. At the combination focus, the hidden information is separated from the picture, the required handling is performed and choice is taken consequently. From the implementation procedure, the proposed model attained the most extreme Hiding Capacity (HC) (91.073%) and the greatest PSNR (59.188 dB), compared to other conventional techniques.

Keywords

Data hiding (DH) Key selection Optimization Security Embedding Extracting and light weight encryption 

References

  1. 1.
    Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.CrossRefGoogle Scholar
  2. 2.
    Zhang, W., Ma, K., & Yu, N. (2014). Reversibility improved data hiding in encrypted images. Signal Processing, 94, 118–127.CrossRefGoogle Scholar
  3. 3.
    Qin, C., & Zhang, X. (2015). Effective reversible data hiding in encrypted image with privacy protection for image content. Journal of Visual Communication and Image Representation, 31, 154–164.CrossRefGoogle Scholar
  4. 4.
    Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRefGoogle Scholar
  5. 5.
    Al-Afandy, K. A., Faragallah, O. S., Elmhalawy, A., El-Rabaie, E. S. M., & El-Banby, G. M. (2016, October). High security data hiding using image cropping and LSB least significant bit steganography. In 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt) (pp. 400–404). IEEE.Google Scholar
  6. 6.
    Ilayaraja, M., Shankar, K., & Devika, G. (2017). A modified symmetric key cryptography method for secure data transmission. International Journal of Pure and Applied Mathematics, 116(10), 301–308.Google Scholar
  7. 7.
    Mohamed, R. E., Ghanem, W. R., Khalil, A. T., Elhoseny, M., Sajjad, M., & Mohamed, M. A. (2018). Energy efficient collaborative proactive routing protocol for wireless sensor network. Computer Networks. Available online 2018, June 19.Google Scholar
  8. 8.
    Gupta, D., Khanna, A., Shankar, K., Furtado, V., & Rodrigues, J. J. Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Transactions on Emerging Telecommunications Technologies (e3524).  https://doi.org/10.1002/ett.3524.
  9. 9.
    Sreekumar, S., & Salam, V. (2014). Advanced reversible data hiding with encrypted data. arXiv preprint arXiv:1408.0733.
  10. 10.
    Hong, W., Chen, T. S., & Shiu, C. W. (2009). Reversible data hiding for high quality images using modification of prediction errors. Journal of Systems and Software, 82(11), 1833–1842.CrossRefGoogle Scholar
  11. 11.
    Li, M., Fan, H., Ren, H., Lu, D., Xiao, D., & Li, Y. (2018). Meaningful image encryption based on reversible data hiding in compressive sensing domain. Security and Communication Networks.Google Scholar
  12. 12.
    Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.Google Scholar
  13. 13.
    Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A. & de Albuquerque, V. H. C. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience (e5122).Google Scholar
  14. 14.
    Elsayed, W., Elhoseny, M., Sabbeh, S., Riad, A. (2017). Self-maintenance model for wireless sensor networks. Computers and Electrical Engineering. Available online 2017, December (In Press).Google Scholar
  15. 15.
    Aminudin, N., Maseleno, A., Shankar K, Hemalatha, S., Sathesh kumar, K., Fauzi1, et al. Nur algorithm on data encryption and decryption. International Journal of Engineering & Technology, 7(2.26), 109–118.CrossRefGoogle Scholar
  16. 16.
    Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.CrossRefGoogle Scholar
  17. 17.
    Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.Google Scholar
  18. 18.
    Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In Intelligent Systems and Control (ISCO), 2016 10th International Conference (pp. 1–6). IEEE.Google Scholar
  19. 19.
    Buchanan, W. J., Li, S., & Asif, R. (2017). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3–4), 187–201.CrossRefGoogle Scholar
  20. 20.
    Zhang, X. (2011). Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 18(4), 255–258.CrossRefGoogle Scholar
  21. 21.
    Xu, D., Chen, K., Wang, R., & Su, S. (2018). Separable reversible data hiding in encrypted images based on two-dimensional histogram modification. Security and Communication Networks, 2018.Google Scholar
  22. 22.
    Yi, S., Zhou, Y., & Hua, Z. (2018). Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Processing: Image Communication, 64, 78–88.Google Scholar
  23. 23.
    Elhoseny, M., Yuan, X., ElMinir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, Wiley, 9(13), 2024–2031.Google Scholar
  24. 24.
    Qin, C., Zhang, W., Cao, F., Zhang, X., & Chang, C. C. (2018). Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Processing, 153, 109–122.CrossRefGoogle Scholar
  25. 25.
    Hammad, B. T., Jamil, N., Rusli, M. E., & Zaba, M. R. A survey of lightweight cryptographic hash function.Google Scholar
  26. 26.
    Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4. IEEE.Google Scholar
  27. 27.
    Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In 3rd International Conference on Advanced Intelligent Systems and Informatics (AISI2017) (2017, September 9–11). Cairo-Egypt: Springer.Google Scholar
  28. 28.
    Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.  https://doi.org/10.1007/s12652-018-1161-0.
  29. 29.
    Majumdar, D., & Mallick, S. (2016, September). Cuckoo search algorithm for constraint satisfaction and optimization. In Research in Computational Intelligence and Communication Networks (ICRCICN), 2016 Second International Conference (pp. 235–240). IEEE.Google Scholar
  30. 30.
    Fedoseev, V. (2017). A model for data hiding system description. In 3rd International Conference on Information Technology and Nanotechnology (pp. 65–71).Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of ComputingKalasalingam Academy of Research and EducationVirudhunagarIndia
  2. 2.Faculty of Computers and InformationMansoura UniversityMansouraEgypt

Personalised recommendations