Optimal Data Hiding Key in Encrypted Images Based Digital Image Security in Wireless Sensor Networks

An effective optimal Data Hiding (DH) key with Light Weight Encryption (LWE) is proposed in this chapter. There are numerous issues in wireless sensor organize like client authentication just as information travel in the system isn’t so much secure. The image was encrypted with a secret key; yet conceivable to insert extra information for secret key. On sender side, the cover image was considered for the encryption procedure by hash function after which the data hiding method was used to hide the images utilizing the optimal data hiding keys. For key selection the current research utilized the Enhanced Cuckoo Search Optimization (ECS) method. The most extreme embedding capacity and security level were achieved. In reversible process, at the receiver side, the embedded image undergoes decryption procedure to recouped image and the data is selected by public key (Shankar and Eswaran in J Circuits Syst Comput 25(11):1650138, 2016) [1]. It can be applied in various application situations; moreover, the data extraction and image recovery are free of any errors. From this security model, the hided image containing the installed information can be then sent to combination focus utilizing sensor networks. At the combination focus, the hidden information is separated from the picture, the required handling is performed and choice is taken consequently. From the implementation procedure, the proposed model attained the most extreme Hiding Capacity (HC) (91.073%) and the greatest PSNR (59.188 dB), compared to other conventional techniques.

[1]  P. Eswaran,et al.  RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique , 2016, J. Circuits Syst. Comput..

[2]  Dipankar Majumdar,et al.  Cuckoo search algorithm for constraint satisfaction and optimization , 2016, 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).

[3]  Mohamed Elhoseny,et al.  Hybrid optimization with cryptography encryption for medical image security in Internet of Things , 2018, Neural Computing and Applications.

[4]  Kai Chen,et al.  Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification , 2018, Secur. Commun. Networks.

[5]  Yicong Zhou,et al.  Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion , 2018, Signal Process. Image Commun..

[6]  Joel J. P. C. Rodrigues,et al.  Efficient artificial fish swarm based clustering approach on mobility aware energy‐efficient for MANET , 2018, Trans. Emerg. Telecommun. Technol..

[7]  Ahmed Farouk,et al.  K-Coverage Model Based on Genetic Algorithm to Extend WSN Lifetime , 2017, IEEE Sensors Letters.

[8]  William J Buchanan,et al.  Lightweight cryptography methods , 2017 .

[9]  Wei Zhang,et al.  Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection , 2018, Signal Process..

[10]  Mohamed Elhoseny,et al.  A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..

[11]  S. El-Rabaie,et al.  High security data hiding using image cropping and LSB least significant bit steganography , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).

[12]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[13]  Mohamed Elhoseny,et al.  Energy efficient collaborative proactive routing protocol for Wireless Sensor Network , 2018, Comput. Networks.

[14]  Xiaohui Yuan,et al.  An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.

[15]  Di Xiao,et al.  Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain , 2018, Secur. Commun. Networks.

[16]  Tung-Shou Chen,et al.  Reversible data hiding for high quality images using modification of prediction errors , 2009, J. Syst. Softw..

[17]  K. Shankar,et al.  A new k out of n secret image sharing scheme in visual cryptography , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[18]  Mohamed Elhoseny,et al.  Self-maintenance model for Wireless Sensor Networks , 2017, Comput. Electr. Eng..

[19]  Weiming Zhang,et al.  Reversibility improved data hiding in encrypted images , 2014, Signal Process..

[20]  Mohamed Elhoseny,et al.  Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique , 2018, Journal of Ambient Intelligence and Humanized Computing.

[21]  Victor Fedoseev,et al.  A model for data hiding system description , 2017 .

[22]  Ashish Khanna,et al.  Adaptive optimal multi key based encryption for digital image security , 2020, Concurr. Comput. Pract. Exp..

[23]  K. Shankar,et al.  RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.

[24]  Mohamed Elhoseny,et al.  An Efficient Optimal Key Based Chaos Function for Medical Image Security , 2018, IEEE Access.

[25]  Andino Maseleno,et al.  Nur algorithm on data encryption and decryption , 2018 .

[26]  Mohamed Elhoseny,et al.  Autonomic Self-healing Approach to Eliminate Hardware Faults in Wireless Sensor Networks , 2017, AISI.

[27]  Xinpeng Zhang,et al.  Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..