Multiple Share Creation with Optimal Hash Function for Image Security in WSN Aid of OGWO

  • K. ShankarEmail author
  • Mohamed Elhoseny
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 564)


Visual share creation, with a security model, verifies the secret data transmitted by the sender. It uses human vision to decrypt the encrypted images without complex algorithms for secure communication in networking. The image sensing process joined with preparing force and wireless communication makes it rewarding for being abused in wealth in future. The proposed security module beats the downsides of the complex usage in traditional or ordinary cryptography models in wireless sensor network (WSN). This chapter proposed an optimal private key and public key-based hash function for secret share security modeling. Initially, the original Digital Images were considered to produce ‘n’ number of shares for security. When the quantity of share was expanded, the security level also got expanded. In the current technique, three shares were produced by visual secret share creation strategy when the shares were made; hash function and qualities were applied to secure the shares in images. For an optimal key selection model, opposition-based Grey Wolf Optimization (OGWO) was considered. Based on this ideal private key and public keys, the share images were encrypted and decrypted between the sender and the receiver. The test results demonstrated better security, less computational time and the most extreme entropy with high PSNR values when compared with other techniques.


Secret share creation WSN Optimization Hash function Light weight encryption Oppositional process 


  1. 1.
    Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468.CrossRefGoogle Scholar
  2. 2.
    Ulutas, M., Yazici, R., Nabiyev, V. V., & Ulutas, G. (2008, October). (2, 2)-secret sharing scheme with improved share randomness. In 23rd International Symposium on Computer and Information Sciences, 2008, ISCIS’08 (pp. 1–5). IEEE.Google Scholar
  3. 3.
    Eswaran, P., & Shankar, K. (2017). Multi secret image sharing scheme based on DNA Cryptography with XOR. International Journal of Pure and Applied Mathematics, 118(7), 393–398.Google Scholar
  4. 4.
    Mohamed, R. E., Ghanem, W. R., Khalil, A. T., Elhoseny, M., Sajjad, M., & Mohamed, M. A. (2018). Energy efficient collaborative proactive routing protocol for wireless sensor network. Computer Networks. Available online June 19, 2018.Google Scholar
  5. 5.
    Shankar, K., & Eswaran, P. (2015). ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. International Journal of Applied Engineering Research, 10(55), 1841–1845.Google Scholar
  6. 6.
    Shankar, K., Devika, G., & Ilayaraja, M. (2017). Secure and efficient multi-secret image sharing scheme based on boolean operations and elliptic curve cryptography. International Journal of Pure and Applied Mathematics, 116(10), 293–300.Google Scholar
  7. 7.
    Parakh, A., & Kak, S. (2011). Space efficient secret sharing for implicit data security. Information Sciences, 181(2), 335–341.MathSciNetCrossRefGoogle Scholar
  8. 8.
    Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031.Google Scholar
  9. 9.
    Cortier, V., & Steel, G. (2009, September). A generic security API for symmetric key management on cryptographic devices. In European Symposium on Research in Computer Security (pp. 605–620). Berlin, Heidelberg: Springer.Google Scholar
  10. 10.
    Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1–15.Google Scholar
  11. 11.
    Thomas, G., Jamaludheen, J., Sibi, L., & Maneesh, P. (2015, April). A novel mathematical model for group communication with trusted key generation and distribution using Shamir’s secret key and USB security. In 2015 International Conference on Communications and Signal Processing (ICCSP) (pp. 0435–0438). IEEE.Google Scholar
  12. 12.
    Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.CrossRefGoogle Scholar
  13. 13.
    Elsayed, W., Elhoseny, M., Sabbeh, S., & Riad, A. (In Press). Self-maintenance model for wireless sensor networks. Computers and Electrical Engineering. Available online December 2017.Google Scholar
  14. 14.
    Anbarasi, L. J., Mala, G. A., & Narendra, M. (2015). DNA based multi-secret image sharing. Procedia Computer Science, 46, 1794–1801.CrossRefGoogle Scholar
  15. 15.
    Shankar, K., & Eswaran, P. (2016, January). A new k out of n secret image sharing scheme in visual cryptography. In 2016 10th International Conference on Intelligent Systems and Control (ISCO) (pp. 1–6). IEEE.Google Scholar
  16. 16.
    Bhadravati, S., Atrey, P. K., & Khabbazian, M. (2015). Scalable secret sharing of compressed multimedia. Journal of Information Security and Applications, 23, 8–27.CrossRefGoogle Scholar
  17. 17.
    El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies.Google Scholar
  18. 18.
    Do, Q., Martini, B., & Choo, K. K. R. (2018). The role of the adversary model in applied security research. Computers & Security.Google Scholar
  19. 19.
    Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.Google Scholar
  20. 20.
    Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(9), 22–27.Google Scholar
  21. 21.
    Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46–61.CrossRefGoogle Scholar
  22. 22.
    Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25(11), 1650138.CrossRefGoogle Scholar
  23. 23.
    Chum, C. S., & Zhang, X. (2013). Hash function-based secret sharing scheme designs. Security and Communication Networks, 6(5), 584–592.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of ComputingKalasalingam Academy of Research and EducationVirudhunagarIndia
  2. 2.Faculty of Computers and InformationMansoura UniversityMansouraEgypt

Personalised recommendations