IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network

Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network
View Sample PDF
Author(s): Mohamed Elhoseny (Mansoura University, Egypt & Scientific Research Group in Egypt (SRGE), Egypt), Ahmed Farouk (Zewail City of Science and Technology, Egypt & Mansoura University, Egypt), Josep Batle (Universitat de les Illes Balears, Spain), Abdulaziz Shehab (Mansoura University, Egypt)and Aboul Ella Hassanien (Cairo University, Giza, Egypt & Scientific Research Group in Egypt (SRGE), Egypt)
Copyright: 2017
Pages: 19
Source title: Handbook of Research on Machine Learning Innovations and Trends
Source Author(s)/Editor(s): Aboul Ella Hassanien (Cairo University, Egypt)and Tarek Gaber (Suez Canal University, Egypt)
DOI: 10.4018/978-1-5225-2229-4.ch045

Purchase

View Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network on the publisher's website for pricing and purchasing information.

Abstract

WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, health care and military applications. Although there are a lot of secure image processing schemas designed for image transmission over a network, the limited resources and the dynamic environment make it invisible to be used with Wireless Sensor Networks (WSNs). In addition, the current secure data transmission schemas in WSN are concentrated on the text data and are not applicable for image transmission's applications. Furthermore, secure image transmission is a big challenging issue in WSNs especially for the application that uses image as its main data such as military applications. The reason why is because the limited resources of the sensor nodes which are usually deployed in unattended environments. This chapter introduces a secure image processing and transmission schema in WSN using Elliptic Curve Cryptography (ECC) and Homomorphic Encryption (HE).

Related Content

Bhargav Naidu Matcha, Sivakumar Sivanesan, K. C. Ng, Se Yong Eh Noum, Aman Sharma. © 2023. 60 pages.
Lavanya Sendhilvel, Kush Diwakar Desai, Simran Adake, Rachit Bisaria, Hemang Ghanshyambhai Vekariya. © 2023. 15 pages.
Jayanthi Ganapathy, Purushothaman R., Ramya M., Joselyn Diana C.. © 2023. 14 pages.
Prince Rajak, Anjali Sagar Jangde, Govind P. Gupta. © 2023. 14 pages.
Mustafa Eren Akpınar. © 2023. 9 pages.
Sreekantha Desai Karanam, Krithin M., R. V. Kulkarni. © 2023. 34 pages.
Omprakash Nayak, Tejaswini Pallapothala, Govind P. Gupta. © 2023. 19 pages.
Body Bottom