Skip to main content
Log in

Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Confidentiality in storing and transmitting images is needed for different fields such as medical, military, online personal albums, confidential communications and video conferencing, etc. Many image encryption techniques are proposed to ensure confidentiality of data. Digital images are different from text data as they have more data, higher data redundancy and correlation between image pixels. In wireless sensor networks (WSN), many encryption techniques are proposed. Sensor nodes have limited resources in memory, energy and processing capabilities; therefore, the proposed techniques must consider these limitations. However, most of the proposed techniques are not applicable for digital images due to image structure and size; therefore, the traditional cryptosystems can not be applied on WSN. In this paper, the following two digital images transformation techniques: (1) discrete cosine transform and (2) discrete wavelet transform are used to propose digital images encryption techniques for WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  • Ishiyama K, Sugiura Y, Shimamura T (2016) Optimized three scores combination for image quality assessment. In: Asia pacific conference on circuits and systems. IEEE, pp 5–8

  • Li X, Zhang G, Zhang X (2015) Image encryption algorithm with compound chaotic maps. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-013-0217-4

    Article  Google Scholar 

  • Puech W (2008) Image encryption and compression for medical image security. In: 2008 1st international workshops on image processing theory, tools and applications, IPTA 2008

  • Ren G et al (2016) High security multiple-image encryption using discrete cosine transform and discrete multiple-parameter fractional fourier transform. J Commun 11(5):491–497. http://www.jocm.us/index.php?m=content&c=index&a=show&catid=161&id=980

  • Sheltami T, Musaddiqa M, Shakshuki E (2016) Data compression techniques in wireless sensor networks. Future Gener Comput Syst 64:151–162

    Article  Google Scholar 

  • Shoeran MA, Sikha T (2015) Image encryption and decryption using discrete cosine transform (DCT). Int J Electr Electron Eng 7(1):646–654

    Google Scholar 

  • Singh S et al (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-017-0494-4

    Article  Google Scholar 

  • Tedmori S, Al-Najdawi N (2012) Lossless image cryptography algorithm based on discrete cosine transform. Int Arab J Inf Technol 9(5):471–478. http://www.ccis2k.org/iajit/PDF/vol.9,no.5/3007-11.pdf

  • Tedmori S, Al-Najdawi N (2014) Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci 269:21–34. https://doi.org/10.1016/j.ins.2014.02.004

    Article  MathSciNet  MATH  Google Scholar 

  • Zhou Y, Panetta K, Agaian S (2009) Image encryption using discrete parametric cosine transform. In: 2009 conference record of the forty-third Asilomar conference on image processing, pp 395–399

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tarek R. Sheltami.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shaheen, A.M., Sheltami, T.R., Al-Kharoubi, T.M. et al. Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Human Comput 10, 4733–4750 (2019). https://doi.org/10.1007/s12652-018-0850-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-0850-z

Keywords

Navigation