Vector space modelling-based intelligent binary image encryption for secure communication

被引:11
作者
Gowda, V. Dankan [1 ]
Sharma, Avinash [2 ]
Nagabushanam, M. [3 ]
Reddy, H. G. Govardhana [4 ]
Raghavendra, K. [5 ]
机构
[1] BMS Inst Technol & Management, Dept Elect & Commun Engn, Bangalore, Karnataka, India
[2] Maharishi Markandeshwar Deemed Univ, Maharishi Markandeshwar Engn Coll, Dept Comp Sci Engn, Ambala, Haryana, India
[3] Ramaiah Inst Technol, Dept Elect & Commun Engn, Bangalore, Karnataka, India
[4] Alliance Univ, Alliance Sch Appl Math, Dept Math, Bangalore, Karnataka, India
[5] ACS Coll Engn, Dept Math, Bangalore, Karnataka, India
关键词
Encryption; Cryptography; Sensor; Network; LEACH algorithm; Steganographic image; FRAMEWORK; SCHEME; SYSTEM;
D O I
10.1080/09720529.2022.2075090
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this research work, a secured routing technique is developed based on the LEACH algorithm. Many secure routing algorithms were proposed in the past by modifying the LEACH algorithm with trust management techniques, key generation, and distribution technique and intrusion detection algorithms. Most present solutions are unable to address the issue of modifying and intercepting assaults. To tackle this problem, a new secured routing algorithm is developed in this work that divides the image and messages into sub-components, represent them in a matrix format and add them to get a steganographic image which is encrypted using a suitable encryption algorithm selected by the rule system developed in this research work. Moreover, intelligent agents are incorporated in all the sensor nodes in the network to communicate the encrypted images to the neighbor nodes more reliably.
引用
收藏
页码:1157 / 1171
页数:15
相关论文
共 21 条
[1]   Secure computing with the MPEG RVC framework [J].
Ahmad, Junaid Jameel ;
Li, Shujun ;
Thavot, Richard ;
Mattavelli, Marco .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (10) :1315-1334
[2]   A framework for avoiding steganography usage over HTTP [J].
Blasco, Jorge ;
Cesar Hernandez-Castro, Julio ;
Maria de Fuentes, Jose ;
Ramos, Benjamin .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) :491-501
[3]   Image steganography based on Canny edge detection, dilation operator and hybrid coding [J].
Gaurav, Kumar ;
Ghanekar, Umesh .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :41-51
[4]   Information theory and cryptography based secured communication scheme for cooperative MIMO communication in wireless sensor networks [J].
Hong, Liang ;
Chen, Wei .
AD HOC NETWORKS, 2014, 14 :95-105
[5]   Robustness of Optical Steganographic Communication Under Coherent Detection Attack [J].
Huang, Chaoran ;
Ma, Philip Y. ;
Shastri, Bhavin J. ;
Mittal, Prateek ;
Prucnal, Paul R. .
IEEE PHOTONICS TECHNOLOGY LETTERS, 2019, 31 (04) :327-330
[6]  
Jain Mamta., 2016, Perspectives in Science, V8, P417, DOI DOI 10.1016/J.PISC.2016.04.093
[7]   Facilitating and securing offline e-medicine service through image steganography [J].
Kamal, A. H. M. ;
Islam, M. Mahfuzul .
HEALTHCARE TECHNOLOGY LETTERS, 2014, 1 (02) :74-79
[8]   A reversible and secure patient information hiding system for IoT driven e-health [J].
Kaw, Javaid A. ;
Loan, Nazir A. ;
Parah, Shabir A. ;
Muhammad, K. ;
Sheikh, Javaid A. ;
Bhat, G. M. .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2019, 45 :262-275
[9]  
Kouzehgar H, 2018, IRAN CONF ELECTR ENG, P23, DOI 10.1109/ICEE.2018.8472499
[10]   Information hiding with adaptive steganography based on novel fuzzy edge identification [J].
Kumar, Sanjeev ;
Singh, Amarpal ;
Kumar, Manoj .
DEFENCE TECHNOLOGY, 2019, 15 (02) :162-169