Advertisement

Optimal Lightweight Encryption Based Secret Share Creation Scheme for Digital Images in Wireless Sensor Networks

  • K. ShankarEmail author
  • Mohamed Elhoseny
Chapter
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 564)

Abstract

Due to the advances in the computerized world, security has turned into an indivisible issue while transmitting the image. Secret Image Sharing (SIS) scheme is an updated cryptographic strategy which can be utilized to transmit a unique image from the sender to the receiver with incomparable privacy and secrecy in Wireless Sensor Network (WSN). Most traditional security techniques for popular systems, similar to the Internet, are not appropriate for WSN, requesting appropriate examination around there. It manages the procedure utilized to remodel the data among justifiable and deep structures through encryption and decryption strategies under the intensity of the keys. In this part, a high-security model for DI is proposed using a secret image share creation scheme with a novel Light Weight Symmetric Algorithm (LWSA). This cryptographic strategy partitioned the secret image into shares for the security analysis by optimal key selection in LWSA technique; here Adaptive Particle Swarm Optimization (APSO) is used. Moreover, this methodology is applying full encryption to image transmission over WSNs by offloading the computational outstanding task at hand of sensors to a server. The proposed LWSA plot offered better security for shares and furthermore reduced the deceitful shares of the secret image. The trial results and the investigations inferred that the proposed model can viably encrypt the image with quick execution speed and expanded PSNR value.

Keywords

Images WSN Secret image sharing scheme Optimal key Light weight symmetric algorithm Adaptive particle swarm optimization 

References

  1. 1.
    Ulutas, M. (2010). Meaningful share generation for an increased number of secrets in the visual secret-sharing scheme. Mathematical Problems in Engineering.Google Scholar
  2. 2.
    Gaber, T., Abdelwahab, S., Elhoseny, M., & Hassanien, A. E. (2018). Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks. Available online 2018, September 17.Google Scholar
  3. 3.
    Abusitta, A. H. (2012). A visualcryptography based digital image copyright protection. Journal of Information Security, 3(02), 96.CrossRefGoogle Scholar
  4. 4.
    Ogiela, M. R., & Ogiela, L. (2015, November). Bio-inspired approaches for secret data sharing techniques. In Intelligent Informatics and Biomedical Sciences (ICIIBMS), 2015 International Conference (pp. 75–78). IEEE.Google Scholar
  5. 5.
    Al-Ghamdi, M., Al-Ghamdi, M., & Gutub, A. (2018). Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools and Applications, 1–28.Google Scholar
  6. 6.
    Arora, S., & Hussain, M. (2018, September). Secure session key sharing using symmetric key cryptography. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 850–855). IEEE.Google Scholar
  7. 7.
    Shankar, K., Devika, G., & Ilayaraja, M. (2017). Secure and efficient multi-secret image sharing scheme based on boolean operations and elliptic curve cryptography. International Journal of Pure and Applied Mathematics, 116(10), 293–300.Google Scholar
  8. 8.
    Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4. IEEE.Google Scholar
  9. 9.
    Hodeish, M. E., Bukauskas, L., & Humbe, V. T. (2016). An Optimal (k, n) visual secret sharing scheme for information security. Procedia Computer Science, 93, 760–767.CrossRefGoogle Scholar
  10. 10.
    Ulutas, M., Yazici, R., Nabiyev, V. V., & Ulutas, G. (2008, October). (2, 2)-Secret sharing scheme with improved share randomness. In Computer and Information Sciences, 2008. ISCIS’08. 23rd International Symposium (pp. 1–5). IEEE.Google Scholar
  11. 11.
    Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468.CrossRefGoogle Scholar
  12. 12.
    Yan, X., Lu, Y., & Liu, L. (2019). A general progressive secret image sharing construction method. Signal Processing: Image Communication, 71, 66–75.Google Scholar
  13. 13.
    Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In Intelligent Systems and Control (ISCO), 2016 10th International Conference (pp. 1–6). IEEE.Google Scholar
  14. 14.
    Elhoseny, M., Yuan, X., ElMinir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031. Wiley.Google Scholar
  15. 15.
    Patel, T., & Srivastava, R. (2016, August). A new technique for color share generation using visual cryptography. In Inventive Computation Technologies (ICICT), International Conference (Vol. 2, pp. 1–4). IEEE.Google Scholar
  16. 16.
    Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic & Applied Science, 9(36), 150–163.Google Scholar
  17. 17.
    Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.Google Scholar
  18. 18.
    Zhang, T., Ke, X., & Liu, Y. (2018). (t, n) multi-secret sharing scheme extended from Harn-Hsu’s scheme. EURASIP Journal on Wireless Communications and Networking, 2018(1), 71.CrossRefGoogle Scholar
  19. 19.
    Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.Google Scholar
  20. 20.
    Kanso, A., & Ghebleh, M. (2018). An efficient lossless secret sharing scheme for medical images. Journal of Visual Communication and Image Representation, 56, 245–255.CrossRefGoogle Scholar
  21. 21.
    Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.CrossRefGoogle Scholar
  22. 22.
    Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.CrossRefGoogle Scholar
  23. 23.
    Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRefGoogle Scholar
  24. 24.
    El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies (e3523).Google Scholar
  25. 25.
    Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In 3rd International Conference on Advanced Intelligent Systems and Informatics (AISI2017) (2017, September 9–11). Cairo-Egypt: Springer.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of ComputingKalasalingam Academy of Research and EducationVirudhunagarIndia
  2. 2.Faculty of Computers and InformationMansoura UniversityMansouraEgypt

Personalised recommendations