A wireless sensor network (WSNs) consists of
variety of multimedia-based applications like image and video
transmission. And applications, multimedia sensor nodes should
maximize quality and minimize energy expenditures in
communication. The key obstacle to communicating images over
WSN has been lack of suitable processing architecture and
communication strategies to deal with large volume data. With
fast progression of data exchange in electronic way, information
security is also becoming more important in data transmission.
Because of widely using images in industrial process, it is
important to protect confidential image data from unauthorized
access. In this paper, we propose a review about transmission
structures derived by various researchers for secured and energyefficient
image transmission. It also proposes collaborative image
transmission schemes for image sensors to utilize co-relation
between sensors and decide transmission and security sharing
pattern based on path diversities.
Shraddha Bhasme : Computer Technology Department, RTMNU,
Rajiv Gandhi College of Engineering & Research, Nagpur
Nagpur, Maharashtra, India
Sampada Deshpande : Computer Technology Department, RTMNU,
Rajiv Gandhi College of Engineering & Research, Nagpur
Nagpur, Maharashtra, India
Surabhi Bhagat : Computer Technology Department, RTMNU,
Rajiv Gandhi College of Engineering & Research, Nagpur
Nagpur, Maharashtra, India
Wireless Sensor Network
Image Transmission
Image Security
Image Quality
Routing
In this paper we have reviewed the ways in which image
sensors within wireless sensor network can transmit
images to end users in optimize manner and methods for
image transmission in multi-hop regions. It is found that
collaborative image transmissions is determined by image
sensors and select the minimum path for transmission.
Path Diversity for image transmission also satisfies Image
Quality metrics. It was also found that Image Encryption
and Decryption using AES was used to protect the
sensitive data from unauthorized access. A successful
Implementation of AES algorithm is one of the best
encryption and decryption standard available till now.
[1] I. F. Akyildiz, Weilian Su, Y. Sankarasubramaniam , E.
Cayirci, “A survey on sensor networks”, IEEE
Communications Magazine, v.40 n.8, p.102-114, August
2002
[2] S. Back, G. Veciana, and Xun-Su, “Minimizing energy
consumption in large-scale sensor networks through
distributed data compression and hierarchical
aggregation," IEEE J. Select. Areas Commun., vol. 22,
no. 6, pp. 1130-1140, Aug. 2004.
[3] Yang Yu , V. K. Prassana , B. Krishnamachari, Energy
Minimization for Real-Time Data Gathering in Wireless
Sensor Networks, IEEE Transactions on Wireless
Communications, v.5 n.11, p.3087-3096, November 2006
[4] D. Niyato, E. Hossain, and A. Fallahi, “Sleep and wakeup
strategies in solar-powered wireless sensor/mesh
networks: performance analysis and Optimization," IEEE
Trans. Mobile Computing, vol. 6, no. 2, pp. 221-236, Feb.
2007.
[5] C. Schurgers and M. B. Srivastava, “Energy efficient
routing in wireless sensor networks," in Proc. Military
Commun. Conf., vol. 1, pp. 357-361, 2001.
[6] N. Gogate, D. Chung, S. S. Panwar, and Y. Wang,
“Supporting image/video applications in a multi-hop
radio environment using route diversity and multiple
description coding," IEEE Trans. Circuits and Systems
for Video Technology, vol. 11, pp. 777-792, 2002.
[7] S. Mao, S. Lin, S. S. Panwar, Y. Wang, and E. Celebi,
“Video transport over ad hoc networks: multistream
coding with multipath transport," IEEE J. Select. Areas
Commun., pp. 1721-1737, 2003.
[8] W. Yu, Z. Sahinoglu, and A.Vetro, “Energy efficient
JPEG 2000 image transmission over wireless sensor
networks," in Proc. Global Telecommunications Conf.,
Dec. 2004, pp. 2738-2743.
[9] L. Ferrigno, S. Marano, V. Paciello, A. Pietrosanto,
“Balancing computational and transmission power
consumption in wireless image sensor networks," in
Proc. IEEE International Conf. Virtual Environments,
Human-Computer Interfaces and Measurement Syst., vol.
18-20, pp. 6, July 2005,
[10] C. Chiasserini and E. Magli, “Energy consumption and
image quality in wireless video-surveillance networks," in
Proc. 13th IEEE International Symposium on Personal,
Indoor and Mobile Radio Communications, vol. 5, pp.
2357-2361, Sept. 2002.
[11] Jolly Shah, Dr. Vikas Saxena," Performance Study on
Image Encryption Schemes ", IJCSI International Journal
of Computer Science Issues, Vol. 8, Issue 4, No 1, July
2011.
[12] M. Van Droogenbroeck and R. Benedett, Techniques for
a selective encryption of uncompressed and compressed
images, “in Proceedings of Advanced Concepts for
Intelligent Vision Systems (ACIVS), Ghent, Belgium,
September 9-11,2002,pp. 90-97.
[13] Manoj. B, Manjula N Harihar," Image Encryption and
Decryption using AES ",International Journal of
Engineering and Advanced Technology (IJEAT) ISSN:
2249 – 8958, Volume-1, Issue-5, June 2012