Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Review on Secured Image Transmission with Energy Optimization in Wireless Sensor Network  
  Authors : Shraddha Bhasme; Sampada Deshpande; Surabhi Bhagat
  Cite as:

 

A wireless sensor network (WSNs) consists of variety of multimedia-based applications like image and video transmission. And applications, multimedia sensor nodes should maximize quality and minimize energy expenditures in communication. The key obstacle to communicating images over WSN has been lack of suitable processing architecture and communication strategies to deal with large volume data. With fast progression of data exchange in electronic way, information security is also becoming more important in data transmission. Because of widely using images in industrial process, it is important to protect confidential image data from unauthorized access. In this paper, we propose a review about transmission structures derived by various researchers for secured and energyefficient image transmission. It also proposes collaborative image transmission schemes for image sensors to utilize co-relation between sensors and decide transmission and security sharing pattern based on path diversities.

 

Published In : IJCSN Journal Volume 4, Issue 2

Date of Publication : April 2015

Pages : 357 - 359

Figures : --

Tables : --

Publication Link : Review on Secured Image Transmission with Energy Optimization in Wireless Sensor Network

 

 

 

Shraddha Bhasme : Computer Technology Department, RTMNU, Rajiv Gandhi College of Engineering & Research, Nagpur Nagpur, Maharashtra, India

Sampada Deshpande : Computer Technology Department, RTMNU, Rajiv Gandhi College of Engineering & Research, Nagpur Nagpur, Maharashtra, India

Surabhi Bhagat : Computer Technology Department, RTMNU, Rajiv Gandhi College of Engineering & Research, Nagpur Nagpur, Maharashtra, India

 

 

 

 

 

 

 

Wireless Sensor Network

Image Transmission

Image Security

Image Quality

Routing

In this paper we have reviewed the ways in which image sensors within wireless sensor network can transmit images to end users in optimize manner and methods for image transmission in multi-hop regions. It is found that collaborative image transmissions is determined by image sensors and select the minimum path for transmission. Path Diversity for image transmission also satisfies Image Quality metrics. It was also found that Image Encryption and Decryption using AES was used to protect the sensitive data from unauthorized access. A successful Implementation of AES algorithm is one of the best encryption and decryption standard available till now.

 

 

 

 

 

 

 

 

 

[1] I. F. Akyildiz, Weilian Su, Y. Sankarasubramaniam , E. Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, v.40 n.8, p.102-114, August 2002 [2] S. Back, G. Veciana, and Xun-Su, “Minimizing energy consumption in large-scale sensor networks through distributed data compression and hierarchical aggregation," IEEE J. Select. Areas Commun., vol. 22, no. 6, pp. 1130-1140, Aug. 2004. [3] Yang Yu , V. K. Prassana , B. Krishnamachari, Energy Minimization for Real-Time Data Gathering in Wireless Sensor Networks, IEEE Transactions on Wireless Communications, v.5 n.11, p.3087-3096, November 2006 [4] D. Niyato, E. Hossain, and A. Fallahi, “Sleep and wakeup strategies in solar-powered wireless sensor/mesh networks: performance analysis and Optimization," IEEE Trans. Mobile Computing, vol. 6, no. 2, pp. 221-236, Feb. 2007. [5] C. Schurgers and M. B. Srivastava, “Energy efficient routing in wireless sensor networks," in Proc. Military Commun. Conf., vol. 1, pp. 357-361, 2001. [6] N. Gogate, D. Chung, S. S. Panwar, and Y. Wang, “Supporting image/video applications in a multi-hop radio environment using route diversity and multiple description coding," IEEE Trans. Circuits and Systems for Video Technology, vol. 11, pp. 777-792, 2002. [7] S. Mao, S. Lin, S. S. Panwar, Y. Wang, and E. Celebi, “Video transport over ad hoc networks: multistream coding with multipath transport," IEEE J. Select. Areas Commun., pp. 1721-1737, 2003. [8] W. Yu, Z. Sahinoglu, and A.Vetro, “Energy efficient JPEG 2000 image transmission over wireless sensor networks," in Proc. Global Telecommunications Conf., Dec. 2004, pp. 2738-2743. [9] L. Ferrigno, S. Marano, V. Paciello, A. Pietrosanto, “Balancing computational and transmission power consumption in wireless image sensor networks," in Proc. IEEE International Conf. Virtual Environments, Human-Computer Interfaces and Measurement Syst., vol. 18-20, pp. 6, July 2005, [10] C. Chiasserini and E. Magli, “Energy consumption and image quality in wireless video-surveillance networks," in Proc. 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 5, pp. 2357-2361, Sept. 2002. [11] Jolly Shah, Dr. Vikas Saxena," Performance Study on Image Encryption Schemes ", IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011. [12] M. Van Droogenbroeck and R. Benedett, Techniques for a selective encryption of uncompressed and compressed images, “in Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS), Ghent, Belgium, September 9-11,2002,pp. 90-97. [13] Manoj. B, Manjula N Harihar," Image Encryption and Decryption using AES ",International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012