An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box

作者: Muazzam A. Khan , Jawad Ahmad , Qaisar Javaid , Nazar A. Saqib

DOI: 10.1080/09500340.2016.1246680

关键词:

摘要: Abstract Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to a central location for further processing. Numerous applications of WSN can be found in smart homes, intelligent buildings, health care, energy efficient smart grids and industrial control systems. In recent years, computer scientists has focused towards findings more applications of WSN in multimedia technologies, ie audio, video and digital images …

参考文章(52)
Jawad Ahmad, Seong Oun Hwang, Arshad Ali, An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes Wireless Personal Communications. ,vol. 84, pp. 901- 918 ,(2015) , 10.1007/S11277-015-2667-9
Jawad Ahmad, Seong Oun Hwang, Chaos-based diffusion for highly autocorrelated data in encryption algorithms Nonlinear Dynamics. ,vol. 82, pp. 1839- 1850 ,(2015) , 10.1007/S11071-015-2281-0
Musheer Ahmad, Faiyaz Ahmad, Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher Advances in Intelligent Systems and Computing. pp. 481- 488 ,(2015) , 10.1007/978-3-319-11933-5_53
Akram Belazi, Ahmed A. Abd El-Latif, Rhouma Rhouma, Safya Belghith, Selective image encryption scheme based on DWT, AES S-box and chaotic permutation 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). pp. 606- 610 ,(2015) , 10.1109/IWCMC.2015.7289152
Jawad Ahmad, Seong Oun Hwang, A secure image encryption scheme based on chaotic maps and affine transformation Multimedia Tools and Applications. ,vol. 75, pp. 13951- 13976 ,(2016) , 10.1007/S11042-015-2973-Y
Muhammad Khurram Khan, Saru Kumari, Cryptanalysis and Improvement of An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems Security and Communication Networks. ,vol. 7, pp. 399- 408 ,(2014) , 10.1002/SEC.791
K Deergha Rao, Ch Gangadhar, Finite field DWT and MCKBA for image encryption and its VLSI realization international conference on information and communication security. pp. 1- 5 ,(2011) , 10.1109/ICICS.2011.6174298
Med Lassaad Kaddachi, Leila Makkaoui, Adel Soudani, Vincent Lecuire, Jean-Marie Moureaux, FPGA-based image compression for low-power Wireless Camera Sensor Networks 2011 3rd International Conference on Next Generation Networks and Services (NGNS). pp. 68- 71 ,(2011) , 10.1109/NGNS.2011.6142537
Xingyuan Wang, Dapeng Luan, A novel image encryption algorithm using chaos and reversible cellular automata Communications in Nonlinear Science and Numerical Simulation. ,vol. 18, pp. 3075- 3085 ,(2013) , 10.1016/J.CNSNS.2013.04.008
Elieser Botelho Manhas, Glauber Brante, Richard Demo Souza, Marcelo Eduardo Pellenz, Energy-efficient cooperative image transmission over wireless sensor networks wireless communications and networking conference. pp. 2014- 2019 ,(2012) , 10.1109/WCNC.2012.6214121