Adaptive optimal multi key based encryption for digital image security

The security of digital images is an essential and challenging task on shared communication Model. Generally, high secure working environment and data are also secured with an encryption and decryption method by using secret and public keys. In this paper, the innovative encryption technique for image security, ie, Multiple key‐based Homomorphic Encryption (MHE) technique is proposed. For increasing the security level of encryption and decryption processes, the optimal key is selected using Adaptive Whale Optimization (AWO) algorithm. Fitness function was considered for optimization as PSNR of plain and cipher images. The original image was transformed into blocks and then rearranged utilizing encryption process, this work achieved maximum security, much better than other encryption techniques. From the outcomes, one can achieve incredible quality of the proposed model, the maximum PSNR, and the minimum MSE contrasted with other encryption schemes.

[1]  Kartik Shankar,et al.  Sharing a Secret Image with Encapsulated Shares in Visual Cryptography , 2015 .

[2]  Xiaonan Luo,et al.  Integrated chaotic systems for image encryption , 2018, Signal Process..

[3]  Jenny Torres,et al.  RSA encryption algorithm optimization to improve performance and security level of network messages , 2016 .

[4]  K. Shankar,et al.  A new k out of n secret image sharing scheme in visual cryptography , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[5]  W. Puech,et al.  Image Encryption and Compression for Medical Image Security , 2008, 2008 First Workshops on Image Processing Theory, Tools and Applications.

[6]  Zhihua Gan,et al.  A new chaos-based image encryption algorithm with dynamic key selection mechanisms , 2016, Multimedia Tools and Applications.

[7]  I-Ling Yen,et al.  An Efficient Homomorphic Encryption Protocol for Multi-User Systems , 2012, IACR Cryptol. ePrint Arch..

[8]  Kalpna Sagar,et al.  A critical analysis of a hierarchy based Usability Model , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[9]  Andino Maseleno,et al.  Optimal feature-based multi-kernel SVM approach for thyroid disease classification , 2018, The Journal of Supercomputing.

[10]  Rajeev Anand Sahu,et al.  Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings , 2017, ICISC.

[11]  Deepak Gupta,et al.  Taxonomy of GUM and usability prediction using GUM multistage fuzzy expert system , 2019, Int. Arab J. Inf. Technol..

[12]  Jian An,et al.  An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service , 2017, Secur. Commun. Networks.

[13]  Andino Maseleno,et al.  Nur algorithm on data encryption and decryption , 2018 .

[14]  Deepak Gupta,et al.  Unique Identification System , 2010 .

[15]  Mohamed Abdel-Basset,et al.  A comprehensive review of quadratic assignment problem: variants, hybrids and applications , 2018, Journal of Ambient Intelligence and Humanized Computing.

[16]  Shafali Agarwal,et al.  Image Encryption Techniques Using Fractal Function:A Review , 2017 .

[17]  Mohamed Elhoseny,et al.  A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..

[18]  Yannis Avrithis,et al.  Regions of interest for accurate object detection , 2008, 2008 International Workshop on Content-Based Multimedia Indexing.

[19]  Deepak Gupta,et al.  Usability Determination Using Multistage Fuzzy System , 2016 .

[20]  Mai Mohamed,et al.  RETRACTED: The role of single valued neutrosophic sets and rough sets in smart city: Imperfect and incomplete information systems , 2018, Measurement.

[21]  Joel J. P. C. Rodrigues,et al.  Ranking Analysis for Online Customer Reviews of Products Using Opinion Mining with Clustering , 2018, Complex..

[22]  Kwok-Wo Wong,et al.  On the Security of a Class of Diffusion Mechanisms for Image Encryption , 2015, IEEE Transactions on Cybernetics.

[23]  Nitesh Naik,et al.  Image security using image encryption and image stitching , 2017, 2017 International Conference on Computing Methodologies and Communication (ICCMC).

[24]  Mohamed Abdel-Basset,et al.  2-Levels of clustering strategy to detect and locate copy-move forgery in digital images , 2018, Multimedia Tools and Applications.

[25]  Saleh Mesbah,et al.  Efficiency and Security of Some Image Encryption Algorithms , 2008 .

[26]  Kartik Shankar,et al.  Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm , 2018 .

[27]  Deepak Gupta,et al.  Usability Prediction of ‘Live Auction’ Using Multistage Fuzzy System , 2017 .

[28]  Seyed Mohammad Mirjalili,et al.  Whale optimization approaches for wrapper feature selection , 2018, Appl. Soft Comput..

[29]  Kalpna Sagar,et al.  Usability Prediction & Ranking of SDLC Models Using Fuzzy Hierarchical Usability Model , 2017 .

[30]  K. Shankar,et al.  RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.

[31]  Khumanthem Manglem Singh,et al.  Image Encryption using Elliptic Curve Cryptography , 2015 .

[32]  N. Sasikaladevi,et al.  An Efficient Homomorphic Medical Image Encryption Algorithm For Cloud Storage Security , 2017 .

[33]  S. Ramakrishnan,et al.  Chaotic Image Encryption with Hash Keying as Key Generator , 2017 .

[34]  Mohamed Abdel-Basset,et al.  A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem , 2018, Future Gener. Comput. Syst..

[35]  Deepak Gupta,et al.  Usability Feature Optimization Using MWOA , 2019 .

[36]  Frederik Vercauteren,et al.  Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.

[37]  Jian Weng,et al.  Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC , 2017, Secur. Commun. Networks.

[38]  Deepak Gupta,et al.  Usability feature selection via MBBAT: A novel approach , 2017, J. Comput. Sci..

[39]  Victor I. Chang,et al.  NMCDA: A framework for evaluating cloud computing services , 2018, Future Gener. Comput. Syst..

[40]  Jiantao Zhou,et al.  A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.

[41]  Deepak Gupta,et al.  Software usability datasets , 2017 .

[42]  Deepak Gupta,et al.  Remote File Synchronization Single-Round Algorithms , 2010 .

[43]  P. Eswaran,et al.  RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique , 2016, J. Circuits Syst. Comput..

[44]  Peijia Zheng,et al.  An efficient image homomorphic encryption scheme with small ciphertext expansion , 2013, ACM Multimedia.

[45]  Lisheng Xu,et al.  Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression , 2018 .

[46]  Joel J. P. C. Rodrigues,et al.  Usability feature extraction using modified crow search algorithm: a novel approach , 2018, Neural Computing and Applications.

[47]  Mohamed Abdel-Basset,et al.  An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems , 2018, Personal and Ubiquitous Computing.