Skip to main content

Advertisement

Log in

An Improved Low-Overhead Secure Image Compression over Wireless Multimedia Sensor Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Due to inherent limitations in processing power, storage, and bandwidth, multimedia data processing is a challenge in wireless multimedia sensor network (WMSN). Also, protection of such data from unauthorized access is of utmost importance. In this work, we consider an existing scheme Secure Image Compression by Column Dropping (SICCD) as baseline which ensures encrypted compression of image. We enrich the baseline by developing a lightweight security extension over the SICCD where in addition to encryption provided by the SICCD, we add the other basic security features like message integrity, sender’s authentication and non-repudiation. In view of the fact that signature based security solutions lack in confirming whether the malicious activity is due to fake sender or due to tampering of message by attacker during transmission, in this scheme, we use both watermarking and signature to mitigate such a problem while ensuring the entire scheme low-overhead. To ensure message integrity, a watermark scheme is proposed which reuses the same key used for encryption in order to reduce additional key generation overhead. A lightweight short digital signature is also designed which is appended to encrypted and watermarked image for sender’s authentication. Performance of the scheme is evaluated through simulation in Cooja, the Contiki network simulator to make it readily implementable in real life mote e.g. MICAz. The results show that the present scheme saves on average 47.53% energy over state-of-the-art techniques while maintaining acceptable reconstruction quality. Detailed analysis shows the scheme offers tamper detection and robustness against various geometric/signal processing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data Availability

The datasets generated/analysed during the current study are available in the ‘J4_Repository’ (https://drive.google.com/drive/folders/1mpcqcbjmp7Fxgoo-pdg-s9Yq5ybOQW74?usp=sharing).

Code Availability

Code for the current study is available from the corresponding author on reasonable request.

References

  1. Halder, S., Ghosal, A., Chaudhury, A., & DasBit, S. (2011). A Probability Density Function for Energy-Balanced Lifetime-Enhancing Node Deployment in WSN, International Conference on Computational Science and Its Applications (ICCSA) (vol. 6018, pp 472–487). Springer. https://doi.org/10.1007/978-3-642-21898-9_40

  2. Banerjee, R., & DasBit, S. (2019). Low-overhead video compression combining partial discrete cosine transform and compressed sensing in WMSNs. Wireless Networks, 25, 5113–5135. https://doi.org/10.1007/s11276-019-02119-y

    Article  Google Scholar 

  3. Pal, T., & DasBit, S. (2019). A low-overhead secure image compression over wireless multimedia sensor network. In International symposium on smart electronic systems (ISES) (pp. 1–6). https://doi.org/10.1109/iSES47678.2019.00014

  4. Yu, P., Yao, S., Xu, J., Zhang, Y., & Chang, Y. (2009). Copyright protection for digital image in wireless sensor network. In International conference on wireless communications, networking and mobile computing (pp. 1–4). https://doi.org/10.1109/WICOM.2009.5305347

  5. Ren, Y., Cheng, Y., Wang, J., & Fang, L. (2015). Data protection based on multifunction digital watermark in wireless sensor network. In International Carnahan conference on security technology (pp. 37–41). https://doi.org/10.1109/CCST.2015.7389654

  6. Hurrah, N. N., Parah, S. A., Loan, N. A., Sheikh, J. A., Elhoseny, M., & Muhammad, K. (2019). Dual watermarking framework for privacy protection and content authentication of multimedia. Future Generation Computer Systems, 94, 654–673. https://doi.org/10.1016/j.future.2018.12.036

    Article  Google Scholar 

  7. Shaik, A., & Masilamani, V. (2018). Zero-watermarking in transform domain and quadtree decomposition for under water images captured by robot. Procedia Computer Science, 133, 385–392. https://doi.org/10.1016/j.procs.2018.07.047

    Article  Google Scholar 

  8. Ali, Z., et al. (2019). Protection of records and data authentication based on secret shares and watermarking. Future Generation Computer Systems, 98, 331–341. https://doi.org/10.1016/j.future.2019.01.050

    Article  Google Scholar 

  9. Gaj, S., Kanetkar, A., Sur, A., & Bora, P. (2017). Drift compensated robust watermarking algorithm for H.265/HEVC video stream. ACM Transactions on Multimedia Computing, Communications, and Applications, 13(11), 1–23. https://doi.org/10.1145/3009910

    Article  Google Scholar 

  10. Dutta, T., & Gupta, H. (2017). An efficient framework for compressed domain watermarking in P frames of high-efficiency video coding (HEVC)-encoded video. ACM Transactions on Multimedia Computing, Communications, and Applications, 13(12), 1–24. https://doi.org/10.1145/3002178

    Article  Google Scholar 

  11. Lu, C., & Liao, H. (2003). Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Transactions on Multimedia, 5, 161–172. https://doi.org/10.1109/TMM.2003.811621

    Article  Google Scholar 

  12. Singh, M., Kaur, H., & Kakkar, A. (2015). Digital signature verification scheme for image authentication. In International conference on recent advances in engineering and computational sciences (RAECS) (pp. 1–5). https://doi.org/10.1109/RAECS.2015.7453277

  13. Sun, Q., & Chang, S. (2005). A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Transactions on Multimedia, 7, 480–494. https://doi.org/10.1109/TMM.2005.846776

    Article  Google Scholar 

  14. Kim, J., Lee, J., Ko, H., Oh, D., Han, S., Jeong, G., & Oh, H. (2019). AuthCropper: Authenticated image cropper for privacy preserving surveillance systems. ACM Transactions on Embedded Computing Systems, 18, 62.1–62.17. https://doi.org/10.1145/3358195

    Article  Google Scholar 

  15. Yang, J., Fan, M., & Wang, G. (2020). Encryption scheme with mixed homomorphic signature based on message authentication for digital image. The Journal of Supercomputing, 76, 1201–1211. https://doi.org/10.1007/s11227-018-2528-x

    Article  Google Scholar 

  16. Fazli, A., Asli, M., Ghasedi, K., & Zanjankhah, H. (2011). Watermarking security analysis based on information theory. In IEEE international conference on signal and image processing applications (ICSIPA) (pp. 599–603). https://doi.org/10.1109/ICSIPA.2011.6144080

  17. Perez-Freire, L., Comesana, P., Troncoso-Pastoriza, J., & Perez-Gonzalez, F. (2006). Watermarking security: A survey. In Transactions on data hiding and multimedia security I. Lecture notes in computer science (Vol. 4300, pp. 41–72). https://doi.org/10.1007/11926214_2

  18. Wuyong, Z., Jianhua, C., & Yufeng, Z. (2018). Global resynchronization-based image watermarking resilient to geometric attacks. Computers & Electrical Engineering, 67, 182–194. https://doi.org/10.1016/j.compeleceng.2018.02.051

    Article  Google Scholar 

  19. Singh, A. K., Dave, M., & Mohan, A. (2013). A hybrid algorithm for image watermarking against signal processing attacks. Multi-disciplinary Trends in Artificial Intelligence (MIWAI), 8271, 235–246. https://doi.org/10.1007/978-3-642-44949-9_22

    Article  Google Scholar 

  20. Chowdhury, A., & DasBit, S. (2015). LMAC: A lightweight message authentication code for wireless sensor network. In Global communications conference (GLOBECOM) (pp. 1–6). https://doi.org/10.1109/GLOCOM.2015.7417118

  21. Pal, T., & DasBit, S. (2015). A new CFA based image compression technique for energy-starved wireless multimedia sensor network. In INDICON (pp. 1–6). https://doi.org/10.1109/INDICON.2015.7443409

  22. Uhsadel, L. (2007). Comparison of low-power public key cryptography on Micaz 8-bit micro controller. Diploma Thesis, Ruhr-University Bochum.

  23. Meulenaer, G., Gosset, F., Standaert, F., & Vandendorpe, L. (2008). On the energy cost of communication and cryptography in wireless sensor networks. In Proceeding of IEEE international conference on wireless and mobile computing (pp. 580–585). https://doi.org/10.1109/WiMob.2008.16

  24. Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2002). An application specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670. https://doi.org/10.1109/TWC.2002.804190

    Article  Google Scholar 

  25. Kugler, P., Nordhus, P., & Eskofier, B. (2013). Shimmer, Cooja and Contiki: A new toolset for the simulation of on-node signal processing algorithms. In Proceedings of international conference on body sensor networks (pp. 1–6). https://doi.org/10.1109/BSN.2013.6575497

  26. Kuhn, F., Wattenhofer, R., & Zollinger, A. (2003). Ad-hoc networks beyond unit disk graphs. In Proceeding of the 2003 joint workshop on foundations of mobile computing (DIALM-POMC ’03), (pp. 69–78). https://doi.org/10.1007/s11276-007-0045-6

  27. Banerjee, R., Chatterjee, S., & DasBit, S. (2015). An energy saving audio compression scheme for wireless multimedia sensor networks using spatio-temporal partial discrete wavelet transform. Elsevier Computers and Electrical Engineering, 48, 389–404. https://doi.org/10.1016/j.compeleceng.2015.09.009

    Article  Google Scholar 

  28. He, D., Zhou, J., Shang, X., Tang, X., Luo, J., & Chen, S. L. (2023). De-noising of photoacoustic microscopy images by attentive generative adversarial network. IEEE Transactions on Medical Imaging, 42(5), 1349–1362. https://doi.org/10.1109/TMI.2022.3227105

    Article  Google Scholar 

  29. Bakurov, I., et al. (2023). Full-reference image quality expression via genetic programming. IEEE Transactions on Image Processing, 32, 1458–1473. https://doi.org/10.1109/TIP.2023.3244662

    Article  Google Scholar 

  30. Azim, M., & Jiang, X. (2015). Wireless Sensor Multimedia Networks: Architecture, Protocols and Applications (1st ed.). CRC Press.

    Book  Google Scholar 

  31. Patel, A., & Shah, D. (2015). SSIM based image quality assessment for vector quantization based lossy image compression using LZW coding. University Journal of Research, 1, 16–29.

    Google Scholar 

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tamal Pal.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pal, T., Das Bit, S. An Improved Low-Overhead Secure Image Compression over Wireless Multimedia Sensor Network. Wireless Pers Commun 132, 1049–1081 (2023). https://doi.org/10.1007/s11277-023-10648-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10648-1

Keywords

Navigation