Skip to main content

An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks

  • Chapter
  • First Online:
Secure Image Transmission in Wireless Sensor Network (WSN) Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 564))

Abstract

In the recent years, numerous security schemes have been proposed to secure the data and Digital Images (DI) over WSNs. Especially, encryption and decryption algorithms are structured and actualized to provide secrecy and security in WSN during the transmission of image-based information just as in storage. In this chapter, Lightweight Cryptography (LWC) based hash function is used for image security in WSN. The hash function keeps up different guidelines which contain a set of tenets with user details, IP address, public and private keys. The hash value of encryption was developed upon the optimal secret key and it was recognized by the Enhanced Cuckoo Search (ECS) optimization. In this ECS model, cuckoo birds choose the nests of various birds to leave its eggs i.e., optimal keys. Further impressive fitness function parameters such as Peak Signal to Noise Ratio (PSNR) were kept consistent in this research. The proposed system provided expanded security and adequately utilized the algorithm when compared with ordinary encryption and optimization strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Thakur, S., Singh, A. K., Ghrera, S. P., & Elhoseny, M. (2018). Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools and Applications, pp. 1–14.

    Google Scholar 

  2. Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with the oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.

    Google Scholar 

  3. Shankar, K., & Eswaran, P. (2016). RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems, and Computers, 25(11), 1650138.

    Google Scholar 

  4. Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.

    Article  Google Scholar 

  5. Bansod, G., Pisharoty, N., & Patil, A. (2016). PICO: An ultra lightweight and low power encryption design for ubiquitous computing. Defense Science Journal, 66(3).

    Google Scholar 

  6. Thorat, C. G., & Inamdar, V. S. (2018). Implementation of new hybrid lightweight block cipher. Applied Computing and Informatics.

    Google Scholar 

  7. Ratha, P., Swain, D., Paikaray, B., & Sahoo, S. (2015). An optimized encryption technique using an arbitrary matrix with probabilistic encryption. Procedia Computer Science, 57, 1235–1241.

    Article  Google Scholar 

  8. Weng, L., & Preneel, B. (2011, October). A secure perceptual hash algorithm for image content authentication. In IFIP International Conference on Communications and Multimedia Security (pp. 108–121). Berlin, Heidelberg: Springer.

    Google Scholar 

  9. Agrawal, H., Kalot, D., Jain, A., & Kahtri, N. (2014, July). Image encryption using various transforms-a brief comparative analysis. In 2014 Annual International Conference on Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD) (pp. 1–4). IEEE.

    Google Scholar 

  10. Elsayed, W., Elhoseny, M., Sabbeh, S., & Riad, A. (2017). Self-maintenance model for Wireless Sensor Networks. Computers & Electrical Engineering.

    Google Scholar 

  11. Usha, M., & Prabhu, A. (2018, June). Performance Analysis of Encryption Algorithms with Pat-Fish for Cloud Storage Security. In International Conference on Mobile and Wireless Technology (pp. 111–120). Springer, Singapore.

    Google Scholar 

  12. Balouch, Z. A., Aslam, M. I., & Ahmed, I. (2017, April). Energy efficient image encryption algorithm. In 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT) (pp. 1–6). IEEE.

    Google Scholar 

  13. Nguyen, D. Q., Weng, L., & Preneel, B. (2011, October). Radon transform-based secure image hashing. In IFIP International Conference on Communications and Multimedia Security (pp. 186–193). Berlin, Heidelberg: Springer.

    Google Scholar 

  14. Mohd, B. J., & Hayajneh, T. (2018). Lightweight block ciphers for IoT: Energy optimization and survivability techniques. IEEE Access, 6, 35966–35978.

    Article  Google Scholar 

  15. Riad, A., Elhoseny, M., Elminir, H., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.

    Google Scholar 

  16. Shih, H., Ho, J., Liao, Y., & Pan, J. (2013). Fault node recovery algorithm for a wireless sensor network. IEEE Sensors Journal, 13(7), 2683–2689.

    Google Scholar 

  17. Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.

    Google Scholar 

  18. Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32–45.

    Google Scholar 

  19. Dhall, S., Pal, S. K., & Sharma, K. (2018). A chaos-based probabilistic block cipher for image encryption. Journal of King Saud University-Computer and Information Sciences.

    Google Scholar 

  20. Vengadapurvaja, A. M., Nisha, G., Aarthy, R., & Sasikaladevi, N. (2017). An efficient homomorphic medical image encryption algorithm for cloud storage security. Procedia Computer Science, 115, 643–650.

    Google Scholar 

  21. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in the Internet of Things. Neural Computing and Applications, 1–15.

    Google Scholar 

  22. Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with an optimization technique. Australian Journal of Basic and Applied Sciences, 9(36), 150–163.

    Google Scholar 

  23. Oad, A., Yadav, H., & Jain, A. (2014). A review: Image encryption techniques and its terminologies. International Journal of Engineering and Advanced Technology (IJEAT), pp. 2249–8958.

    Google Scholar 

  24. Weng, L., & Preneel, B. (2011, October). A secure perceptual hash algorithm for image content authentication. In IFIP International Conference on Communications and Multimedia Security (pp. 108–121). Springer, Berlin, Heidelberg.

    Google Scholar 

  25. Zhang, M., He, D., & Zhu, C. (2016, December). A cuckoo search algorithm based on hybrid-mutation. In 2016 12th International Conference on Computational Intelligence and Security (CIS) (pp. 538–542). IEEE.

    Google Scholar 

  26. Begum, A. A. S., & Nirmala, S. (2018). Secure visual cryptography for a medical image using a modified cuckoo search. Multimedia Tools and Applications, 77(20), 27041–27060.

    Google Scholar 

  27. Shankar, K., & Eswaran, P. (2016). A new k out of n secret image sharing scheme in visual cryptography. In 2016 10th International Conference on Intelligent Systems and Control (ISCO), IEEE (pp. 369–374).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Shankar .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shankar, K., Elhoseny, M. (2019). An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks. In: Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Lecture Notes in Electrical Engineering, vol 564. Springer, Cham. https://doi.org/10.1007/978-3-030-20816-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20816-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20815-8

  • Online ISBN: 978-3-030-20816-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics