CFP last date
20 May 2024
Reseach Article

Transmission of Secured Image using DWT-SVD Technique for Applications in Wireless Sensor Network

by Neha Narula, Deepak Sethi, P.p. Bhattacharya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 6
Year of Publication: 2015
Authors: Neha Narula, Deepak Sethi, P.p. Bhattacharya
10.5120/21071-3745

Neha Narula, Deepak Sethi, P.p. Bhattacharya . Transmission of Secured Image using DWT-SVD Technique for Applications in Wireless Sensor Network. International Journal of Computer Applications. 119, 6 ( June 2015), 11-18. DOI=10.5120/21071-3745

@article{ 10.5120/21071-3745,
author = { Neha Narula, Deepak Sethi, P.p. Bhattacharya },
title = { Transmission of Secured Image using DWT-SVD Technique for Applications in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 6 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 11-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number6/21071-3745/ },
doi = { 10.5120/21071-3745 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:19.696465+05:30
%A Neha Narula
%A Deepak Sethi
%A P.p. Bhattacharya
%T Transmission of Secured Image using DWT-SVD Technique for Applications in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 6
%P 11-18
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments. These networks are used in a variety of applications including military, surveillance, industry and health systems. Sensors used in these applications can be susceptible to various types of attacks such as data modification, data insertion and deletion, or even physical capture and sensor node replacement. Therefore, security is a critical issue that must be resolved. This paper presents the transmission of secured image using DWT-SVD image hiding technique. Initially, both the carrier image and the secret image are decomposed according to DWT (Discrete Wavelet Transform) and then the secret image is embedded in singular values of the carrier image by applying SVD (Singular Value Decomposition). An Energy saving greedy algorithm is applied for routing the resultant secured image in the form of packets. Experimental results and performance analysis demonstrate that the proposed scheme can protect the sensitive information without affecting the transmission and usability of the ordinary data.

References
  1. Carlos F. Garcia-Hernandez, Pablo H. Ibarguengoytia-Gonzalez, Joaquin Garcia-Hernandez, and Jesus A. Perez-Diaz, "Wireless Sensor Networks and Applications: a Survey", International Journal of Computer Science and Network Security, VOL. 7 No. 3, March 2007.
  2. Giuseppe Anastasi, Marco Conti, Mario Di Francesco and Andrea Passarella, "Energy conservation in wireless sensor networks: A survey", ELSEVIER Ad Hoc Networks (7) pp. 537–568, 2009.
  3. Phan Trung Huy and Cheonshik Kim, "Binary Image Data Hiding Using Matrix Encoding Technique in Sensors", International Journal of Distributed Sensor Networks, 2013.
  4. Gurpreet Kaur and Kamaljeet Kaur, " Digital Watermarking and Other Data Hiding Techniques", International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-2, Issue-5, April 2013.
  5. Arvind Kumar and Pooja, "Steganography- A Data Hiding Technique", International Journal of Computer Applications, Volume 9– No. 7, November 2010.
  6. V. Santhi and Dr. Arunkumar Thangavelu, "DWT-SVD Combined Full Band Robust Watermarking Technique for Color Images in YUV Color Space", International Journal of Computer Theory and Engineering, Vol. 1, No. 4, October2009.
  7. Chih-Chin Lai, Member and Cheng-Chih Tsai, "Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition", IEEE Transactions on Instrumentation and Measurement, Vol. 59, No. 11, November 2010.
  8. Ezz El-Din Hemdan, Nawal El-Fishaw, Gamal Attiya and Fathi Abd El-Samii, "Hybrid Digital Image Watermarking Technique for Data Hiding", IEEE 30th National Radio Science Conference, 2013.
  9. Baowei Wang, Hongwei Qian, Xingming Sun , Jian Shen and Xiaoyu Xie, "A Secure Data Transmission Scheme Based on Information Hiding in Wireless Sensor Networks", International Journal of Security and Its Applications, Vol. 9, No. 1, pp. 125-138, 2015.
  10. Rong Xiao, Xingming Sun, Ying Yang, "Copyright Protection in Wireless Sensor Networks by Watermarking", IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008.
  11. Azzedine Boukerche, Horacio A. B. F. Oliveira, Eduardo F. Nakamura, and Antonio A. F. Loureiro, "A Novel Location-Free Greedy Forward Algorithm for Wireless Sensor Networks", IEEE,2008.
  12. Bhupendra Ram, "Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform", International Journal of Advancements in Research & Technology, Volume 2, Issue4, April-2013.
  13. Priyanka Singh, and Suneeta Agarwal, "A Hybrid DCT-SVD Based Robust Watermarking Scheme for Copyright Protection", International Conference on Emerging Trends in Engineering and Technology (ICETET), 2013.
  14. Lun Zhang, Wenchen Yang, Qian Rao, Wei Nai and Decun Dong, "An Energy Saving Routing Algorithm Based on Dijkstra in Wireless Sensor Networks", Journal of Information & Computational Science, pp: 2087–2096, 2013.
  15. Neeraj Kumar, Manoj Kumar and R. B. Patel, "Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing in Wireless Sensor Networks", Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks, Vol. 2, No. 1, March 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Image Hiding Discrete Wavelet Transform (DWT) Singular Value Decomposition (SVD) Greedy Routing Algorithm.