Skip to main content

An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks

  • Chapter
  • First Online:
Secure Image Transmission in Wireless Sensor Network (WSN) Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 564))

Abstract

The fast development of networking permits substantial documents, for example, multimedia images, to be effectively transmitted over the Wireless Sensor Networks (WSNs). An image encryption is generally used to guarantee the security as it may secure the images in the greater part. The process of securing the images in WSN against unauthorized users is a challenging one. For guaranteeing high security among Digital Images (DIs), Light Weight Cryptographic (LWC) algorithms are utilized which split the DI into a number of blocks; this will upgrade the level of security in WSN. Here, the proposed block cipher is RECTANGLE which separates the image in a bit-slice style; and improves the DI security level by encryption and decryption depending on the determination of optimal public key and private key individually. The key optimization was finished by the metaheuristic algorithm, for example, Opposition-based Grey Wolf Optimization (OGWO) which chosen optimal key on the basis of the most extreme PSNR value. The exhibited RECTANGLE–OGWO accomplished the least time to produce key which remained as an incentive to encrypt and decrypt the image. The result showed that the RECTANGLE–OGWO algorithm enhanced the accuracy of DI security for all the images (Lena, Barbara, Baboon, Airplane and House) when contrasted with existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, X., Wang, Y., Wang, Q. H., Liu, Y., & Zhou, X. (2019). Modified integral imaging reconstruction and encryption using an improved SR reconstruction algorithm. Optics and Lasers in Engineering, 112, 162–169.

    Article  Google Scholar 

  2. Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(1.9), 22–27.

    Google Scholar 

  3. Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.

    Google Scholar 

  4. Roy, A., Misra, A. P., & Banerjee, S. (2019). Chaos-based image encryption using vertical-cavity surface-emitting lasers. Journal for Light and Electron Optics, 176, 119–131.

    Google Scholar 

  5. Yu, N., Xi, S., Wang, X., Zhang, C., Wang, W., Dong, Z., et al. (2019). Double images encryption in optical image subtraction/addition 4F system. Optik, 178, 135–141.

    Article  Google Scholar 

  6. Hegde, R., & Jagadeesha, S. (2016). An optimal modified matrix encoding technique for secret writing in MPEG video using ECC. Computer Standards & Interfaces, 48, 173–182.

    Article  Google Scholar 

  7. Wang, Y., Zhang, W., Chen, G., Yang, X., & Hu, W. (2019). Multi-Gbit/s real-time modems for chaotic optical OFDM data encryption and decryption. Optics Communications, 432, 39–43.

    Article  Google Scholar 

  8. Boukerche, A., & Sun, P. (2018). Connectivity and coverage based protocols for wireless sensor networks. Ad Hoc Networks, 80, 54–69.

    Article  Google Scholar 

  9. Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. In Neural computing and applications (pp. 1–15).

    Google Scholar 

  10. Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University—Computer and Information Sciences, 28(3), 262–275.

    Article  Google Scholar 

  11. Wang, X. Y., & Li, Z. M. (2019). A color image encryption algorithm based on Hopfield chaotic neural network. Optics and Lasers in Engineering, 115, 107–118.

    Article  Google Scholar 

  12. Su, Y., Wo, Y., & Han, G. (2019). Reversible cellular automata image encryption for similarity search. Signal Processing: Image Communication, 72, 134–147.

    Google Scholar 

  13. Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118–130.

    Google Scholar 

  14. Patil, B. S. (2015). Image security in wireless sensor networks using wavelet coding. International Journal on Emerging Technologies, 6(2), 239.

    Google Scholar 

  15. Mohamed, R. E., Ghanem, W. R., Khalil, A. T., Elhoseny, M., Sajjad, M., & Mohamed, M. A. (2018). Energy efficient collaborative proactive routing protocol for wireless sensor network. Computer Networks, 142, 154–167.

    Article  Google Scholar 

  16. Pan, H., Lei, Y., & Jian, C. (2018). Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018(1), 1–10.

    Google Scholar 

  17. Noshadian, S., Ebrahimzade, A., & Kazemitabar, S. J. (2018). Optimizing chaos based image encryption. Multimedia Tools and Applications, 1–22.

    Google Scholar 

  18. El-Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies, 1–14.

    Google Scholar 

  19. Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S.K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.

    Google Scholar 

  20. Poonam, & Arora, S. M. (2018). A DWT-SVD based robust digital watermarking for digital images. Procedia Computer Science, 132, 1441–1448.

    Google Scholar 

  21. Shankar, K., Elhoseny, M., Chelvi, E. D., Lakshmanaprabu, S. K., & Wu, W. (2018). An efficient optimal key based chaos function for medical image security. IEEE Access, 6, 77145–77154.

    Article  Google Scholar 

  22. Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, 1–11.

    Google Scholar 

  23. Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., & Verbauwhede, I. (2015). RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Science China Information Sciences, 58(12), 1–15.

    Google Scholar 

  24. Teng, Z. J., Lv, J. L., & Guo, L. W. (2018). An improved hybrid grey wolf optimization algorithm. In Soft computing (pp. 1–15).

    Google Scholar 

  25. Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic and Applied Sciences, 9(36), 150–163.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Shankar .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shankar, K., Elhoseny, M. (2019). An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks. In: Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Lecture Notes in Electrical Engineering, vol 564. Springer, Cham. https://doi.org/10.1007/978-3-030-20816-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20816-5_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20815-8

  • Online ISBN: 978-3-030-20816-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics