Abstract
Due to inherent limitations in processing power, storage, and bandwidth, multimedia data processing is a challenge in wireless multimedia sensor network (WMSN). Also, protection of such data from unauthorized access is of utmost importance. In this work, we consider an existing scheme Secure Image Compression by Column Dropping (SICCD) as baseline which ensures encrypted compression of image. We enrich the baseline by developing a lightweight security extension over the SICCD where in addition to encryption provided by the SICCD, we add the other basic security features like message integrity, sender’s authentication and non-repudiation. In view of the fact that signature based security solutions lack in confirming whether the malicious activity is due to fake sender or due to tampering of message by attacker during transmission, in this scheme, we use both watermarking and signature to mitigate such a problem while ensuring the entire scheme low-overhead. To ensure message integrity, a watermark scheme is proposed which reuses the same key used for encryption in order to reduce additional key generation overhead. A lightweight short digital signature is also designed which is appended to encrypted and watermarked image for sender’s authentication. Performance of the scheme is evaluated through simulation in Cooja, the Contiki network simulator to make it readily implementable in real life mote e.g. MICAz. The results show that the present scheme saves on average 47.53% energy over state-of-the-art techniques while maintaining acceptable reconstruction quality. Detailed analysis shows the scheme offers tamper detection and robustness against various geometric/signal processing attacks.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig13_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig14_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-023-10648-1/MediaObjects/11277_2023_10648_Fig15_HTML.png)
Similar content being viewed by others
Data Availability
The datasets generated/analysed during the current study are available in the ‘J4_Repository’ (https://drive.google.com/drive/folders/1mpcqcbjmp7Fxgoo-pdg-s9Yq5ybOQW74?usp=sharing).
Code Availability
Code for the current study is available from the corresponding author on reasonable request.
References
Halder, S., Ghosal, A., Chaudhury, A., & DasBit, S. (2011). A Probability Density Function for Energy-Balanced Lifetime-Enhancing Node Deployment in WSN, International Conference on Computational Science and Its Applications (ICCSA) (vol. 6018, pp 472–487). Springer. https://doi.org/10.1007/978-3-642-21898-9_40
Banerjee, R., & DasBit, S. (2019). Low-overhead video compression combining partial discrete cosine transform and compressed sensing in WMSNs. Wireless Networks, 25, 5113–5135. https://doi.org/10.1007/s11276-019-02119-y
Pal, T., & DasBit, S. (2019). A low-overhead secure image compression over wireless multimedia sensor network. In International symposium on smart electronic systems (ISES) (pp. 1–6). https://doi.org/10.1109/iSES47678.2019.00014
Yu, P., Yao, S., Xu, J., Zhang, Y., & Chang, Y. (2009). Copyright protection for digital image in wireless sensor network. In International conference on wireless communications, networking and mobile computing (pp. 1–4). https://doi.org/10.1109/WICOM.2009.5305347
Ren, Y., Cheng, Y., Wang, J., & Fang, L. (2015). Data protection based on multifunction digital watermark in wireless sensor network. In International Carnahan conference on security technology (pp. 37–41). https://doi.org/10.1109/CCST.2015.7389654
Hurrah, N. N., Parah, S. A., Loan, N. A., Sheikh, J. A., Elhoseny, M., & Muhammad, K. (2019). Dual watermarking framework for privacy protection and content authentication of multimedia. Future Generation Computer Systems, 94, 654–673. https://doi.org/10.1016/j.future.2018.12.036
Shaik, A., & Masilamani, V. (2018). Zero-watermarking in transform domain and quadtree decomposition for under water images captured by robot. Procedia Computer Science, 133, 385–392. https://doi.org/10.1016/j.procs.2018.07.047
Ali, Z., et al. (2019). Protection of records and data authentication based on secret shares and watermarking. Future Generation Computer Systems, 98, 331–341. https://doi.org/10.1016/j.future.2019.01.050
Gaj, S., Kanetkar, A., Sur, A., & Bora, P. (2017). Drift compensated robust watermarking algorithm for H.265/HEVC video stream. ACM Transactions on Multimedia Computing, Communications, and Applications, 13(11), 1–23. https://doi.org/10.1145/3009910
Dutta, T., & Gupta, H. (2017). An efficient framework for compressed domain watermarking in P frames of high-efficiency video coding (HEVC)-encoded video. ACM Transactions on Multimedia Computing, Communications, and Applications, 13(12), 1–24. https://doi.org/10.1145/3002178
Lu, C., & Liao, H. (2003). Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Transactions on Multimedia, 5, 161–172. https://doi.org/10.1109/TMM.2003.811621
Singh, M., Kaur, H., & Kakkar, A. (2015). Digital signature verification scheme for image authentication. In International conference on recent advances in engineering and computational sciences (RAECS) (pp. 1–5). https://doi.org/10.1109/RAECS.2015.7453277
Sun, Q., & Chang, S. (2005). A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Transactions on Multimedia, 7, 480–494. https://doi.org/10.1109/TMM.2005.846776
Kim, J., Lee, J., Ko, H., Oh, D., Han, S., Jeong, G., & Oh, H. (2019). AuthCropper: Authenticated image cropper for privacy preserving surveillance systems. ACM Transactions on Embedded Computing Systems, 18, 62.1–62.17. https://doi.org/10.1145/3358195
Yang, J., Fan, M., & Wang, G. (2020). Encryption scheme with mixed homomorphic signature based on message authentication for digital image. The Journal of Supercomputing, 76, 1201–1211. https://doi.org/10.1007/s11227-018-2528-x
Fazli, A., Asli, M., Ghasedi, K., & Zanjankhah, H. (2011). Watermarking security analysis based on information theory. In IEEE international conference on signal and image processing applications (ICSIPA) (pp. 599–603). https://doi.org/10.1109/ICSIPA.2011.6144080
Perez-Freire, L., Comesana, P., Troncoso-Pastoriza, J., & Perez-Gonzalez, F. (2006). Watermarking security: A survey. In Transactions on data hiding and multimedia security I. Lecture notes in computer science (Vol. 4300, pp. 41–72). https://doi.org/10.1007/11926214_2
Wuyong, Z., Jianhua, C., & Yufeng, Z. (2018). Global resynchronization-based image watermarking resilient to geometric attacks. Computers & Electrical Engineering, 67, 182–194. https://doi.org/10.1016/j.compeleceng.2018.02.051
Singh, A. K., Dave, M., & Mohan, A. (2013). A hybrid algorithm for image watermarking against signal processing attacks. Multi-disciplinary Trends in Artificial Intelligence (MIWAI), 8271, 235–246. https://doi.org/10.1007/978-3-642-44949-9_22
Chowdhury, A., & DasBit, S. (2015). LMAC: A lightweight message authentication code for wireless sensor network. In Global communications conference (GLOBECOM) (pp. 1–6). https://doi.org/10.1109/GLOCOM.2015.7417118
Pal, T., & DasBit, S. (2015). A new CFA based image compression technique for energy-starved wireless multimedia sensor network. In INDICON (pp. 1–6). https://doi.org/10.1109/INDICON.2015.7443409
Uhsadel, L. (2007). Comparison of low-power public key cryptography on Micaz 8-bit micro controller. Diploma Thesis, Ruhr-University Bochum.
Meulenaer, G., Gosset, F., Standaert, F., & Vandendorpe, L. (2008). On the energy cost of communication and cryptography in wireless sensor networks. In Proceeding of IEEE international conference on wireless and mobile computing (pp. 580–585). https://doi.org/10.1109/WiMob.2008.16
Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2002). An application specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670. https://doi.org/10.1109/TWC.2002.804190
Kugler, P., Nordhus, P., & Eskofier, B. (2013). Shimmer, Cooja and Contiki: A new toolset for the simulation of on-node signal processing algorithms. In Proceedings of international conference on body sensor networks (pp. 1–6). https://doi.org/10.1109/BSN.2013.6575497
Kuhn, F., Wattenhofer, R., & Zollinger, A. (2003). Ad-hoc networks beyond unit disk graphs. In Proceeding of the 2003 joint workshop on foundations of mobile computing (DIALM-POMC ’03), (pp. 69–78). https://doi.org/10.1007/s11276-007-0045-6
Banerjee, R., Chatterjee, S., & DasBit, S. (2015). An energy saving audio compression scheme for wireless multimedia sensor networks using spatio-temporal partial discrete wavelet transform. Elsevier Computers and Electrical Engineering, 48, 389–404. https://doi.org/10.1016/j.compeleceng.2015.09.009
He, D., Zhou, J., Shang, X., Tang, X., Luo, J., & Chen, S. L. (2023). De-noising of photoacoustic microscopy images by attentive generative adversarial network. IEEE Transactions on Medical Imaging, 42(5), 1349–1362. https://doi.org/10.1109/TMI.2022.3227105
Bakurov, I., et al. (2023). Full-reference image quality expression via genetic programming. IEEE Transactions on Image Processing, 32, 1458–1473. https://doi.org/10.1109/TIP.2023.3244662
Azim, M., & Jiang, X. (2015). Wireless Sensor Multimedia Networks: Architecture, Protocols and Applications (1st ed.). CRC Press.
Patel, A., & Shah, D. (2015). SSIM based image quality assessment for vector quantization based lossy image compression using LZW coding. University Journal of Research, 1, 16–29.
Funding
The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no relevant financial or non-financial interests to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Pal, T., Das Bit, S. An Improved Low-Overhead Secure Image Compression over Wireless Multimedia Sensor Network. Wireless Pers Commun 132, 1049–1081 (2023). https://doi.org/10.1007/s11277-023-10648-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10648-1