首页 | 本学科首页   官方微博 | 高级检索  
     


An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform,chaotic maps and substitution box
Authors:Muazzam A Khan  Jawad Ahmad  Qaisar Javaid  Nazar A Saqib
Affiliation:1. Department of Computer Engineering, NUST College of EME, National University of Sciences &2. Technology, Islamabad, Pakistan.;3. Department of Electrical Engineering, HITEC University, Taxila, Pakistan.;4. Department of CS &5. SE, International Islamic University, Islamabad, Pakistan.
Abstract:Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to a central location for further processing. Numerous applications of WSN can be found in smart homes, intelligent buildings, health care, energy efficient smart grids and industrial control systems. In recent years, computer scientists has focused towards findings more applications of WSN in multimedia technologies, i.e. audio, video and digital images. Due to bulky nature of multimedia data, WSN process a large volume of multimedia data which significantly increases computational complexity and hence reduces battery time. With respect to battery life constraints, image compression in addition with secure transmission over a wide ranged sensor network is an emerging and challenging task in Wireless Multimedia Sensor Networks. Due to the open nature of the Internet, transmission of data must be secure through a process known as encryption. As a result, there is an intensive demand for such schemes that is energy efficient as well as highly secure since decades. In this paper, discrete wavelet-based partial image encryption scheme using hashing algorithm, chaotic maps and Hussain’s S-Box is reported. The plaintext image is compressed via discrete wavelet transform and then the image is shuffled column-wise and row wise-wise via Piece-wise Linear Chaotic Map (PWLCM) and Nonlinear Chaotic Algorithm, respectively. To get higher security, initial conditions for PWLCM are made dependent on hash function. The permuted image is bitwise XORed with random matrix generated from Intertwining Logistic map. To enhance the security further, final ciphertext is obtained after substituting all elements with Hussain’s substitution box. Experimental and statistical results confirm the strength of the anticipated scheme.
Keywords:WSN  WMSN  compression  image encryption  correlation analysis  NPCR  UACI
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号