Skip to main content
Erschienen in: The Journal of Supercomputing 11/2016

01.11.2016

Application of distributed parallel computing for dynamic visual cryptography

verfasst von: Raimondas Čiegis, Vadimas Starikovičius, Natalija Tumanova, Minvydas Ragulskis

Erschienen in: The Journal of Supercomputing | Ausgabe 11/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We consider one applied global optimization problem where a set of feasible solutions is discrete and very large. The goal is to find optimal perfect gratings, which can guarantee high quality and security of the visual cryptography method. A priori estimation techniques, such as branch and bound type methods, cannot be applied to exclude an essential part of elements from the feasible set. Thus, a full search is required to solve this global optimization problem exactly, which is very computationally demanding. A library of C++ templates is developed that allows its user to implement parallel master–slave algorithms for his/her application without any knowledge of parallel programming API (application programming interface). Design of the templates allows users to build a parallel solver using MPI (message passing interface) API or distributed computing application using BOINC (Berkeley open infrastructure for network computing) API from the same C/C++ code with implementation of application-specific tasks. We build parallel and distributed computing solvers for the considered optimization problem and present results of computational experiments using a computer cluster and BOINC project for volunteer computing. Heuristic methods are also considered as an alternative to the full search algorithm. Due to complicated conditions defining feasible solutions (perfect gratings), genetic algorithms cannot be used to solve this problem efficiently. We propose two memetic heuristic algorithms, when a basic stochastic or simplified full search algorithm is combined with a local search algorithm. Parallel heuristic algorithms are also proposed and implemented. The efficiency and accuracy of heuristics are investigated and results of experiments are presented.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Allen B et al (2013) The Einstein@Home search for radio pulsars and PSR J2007+2722 discovery. Astrophys J 773(2):91CrossRef Allen B et al (2013) The Einstein@Home search for radio pulsars and PSR J2007+2722 discovery. Astrophys J 773(2):91CrossRef
2.
Zurück zum Zitat Anderson DP (2004) Boinc: a system for public resource computing and storage. In: Proceedings of the 5th IEEE/ACM international workshop on grid computing, pp 1–7 Anderson DP (2004) Boinc: a system for public resource computing and storage. In: Proceedings of the 5th IEEE/ACM international workshop on grid computing, pp 1–7
3.
Zurück zum Zitat Baravykaite M, Čiegis R (2007) An implementation of a parallel generalized branch and bound template. Math Model Anal 12(3):277–289CrossRefMATH Baravykaite M, Čiegis R (2007) An implementation of a parallel generalized branch and bound template. Math Model Anal 12(3):277–289CrossRefMATH
4.
Zurück zum Zitat Beberg AL, Ensign DL, Jayachandran G, Khaliq S, Pande VS (2009) Folding@Home: lessons from eight years of volunteer distributed computing. Parallel and Distributed Processing Symposium, International, pp 1–8 Beberg AL, Ensign DL, Jayachandran G, Khaliq S, Pande VS (2009) Folding@Home: lessons from eight years of volunteer distributed computing. Parallel and Distributed Processing Symposium, International, pp 1–8
5.
Zurück zum Zitat Blesa MJ, Hernàndez L, Xhafa F (2002) Parallel processing and applied mathematics: 4th international conference, PPAM 2001, Poland, September 9–12, 2001 Revised Papers, chap Parallel skeletons for Tabu search method based on search strategies and neighborhood partition, pp 185–193 Blesa MJ, Hernàndez L, Xhafa F (2002) Parallel processing and applied mathematics: 4th international conference, PPAM 2001, Poland, September 9–12, 2001 Revised Papers, chap Parallel skeletons for Tabu search method based on search strategies and neighborhood partition, pp 185–193
6.
Zurück zum Zitat Čiegis R, Starikovičius V, Tumanova N, Ragulskis M, Palivonaite R (2015) Distributed parallel computing for visual cryptography algorithms. In: Proceedings of the second international workshop on sustainable ultrascale computing systems (NESUS 2015), pp 23–28 Čiegis R, Starikovičius V, Tumanova N, Ragulskis M, Palivonaite R (2015) Distributed parallel computing for visual cryptography algorithms. In: Proceedings of the second international workshop on sustainable ultrascale computing systems (NESUS 2015), pp 23–28
7.
Zurück zum Zitat Davies DW, Price WL (1989) Security for computer networks, 2nd edn. Wiley, New York Davies DW, Price WL (1989) Security for computer networks, 2nd edn. Wiley, New York
8.
Zurück zum Zitat Depolli M, Trobec R, Filipič B (2013) Asynchronous master-slave parallelization of differential evolution for multi-objective optimization. Evol Comput 21(2):261–291CrossRef Depolli M, Trobec R, Filipič B (2013) Asynchronous master-slave parallelization of differential evolution for multi-objective optimization. Evol Comput 21(2):261–291CrossRef
9.
Zurück zum Zitat Dorta I, Leon C, Rodriguez C, Rojas A (2003) Parallel skeletons for divide-and-conquer and branch-and-bound techniques. In: Proceedings of 11th Euromicro conference on parallel, distributed and network-based processing (Euro-PDP’03), IEEE, pp 292–298 Dorta I, Leon C, Rodriguez C, Rojas A (2003) Parallel skeletons for divide-and-conquer and branch-and-bound techniques. In: Proceedings of 11th Euromicro conference on parallel, distributed and network-based processing (Euro-PDP’03), IEEE, pp 292–298
10.
Zurück zum Zitat Gerald CF, Wheatley PO (2004) Applied numerical analysis. Addison-Wesley, BostonMATH Gerald CF, Wheatley PO (2004) Applied numerical analysis. Addison-Wesley, BostonMATH
11.
Zurück zum Zitat Glover F, Kochenberger GA (2003) Handbook of metaheuristics, international series in operations research and management science. Springer, BerlinCrossRef Glover F, Kochenberger GA (2003) Handbook of metaheuristics, international series in operations research and management science. Springer, BerlinCrossRef
12.
Zurück zum Zitat Goldberg D (2002) The design of innovation: lessons from and for competent genetic algorithms. Kluwer Academic Publishers, DordrechtCrossRefMATH Goldberg D (2002) The design of innovation: lessons from and for competent genetic algorithms. Kluwer Academic Publishers, DordrechtCrossRefMATH
13.
Zurück zum Zitat Gonzalez-Velez H, Leyton M (2010) A survey of algorithmic skeleton frameworks: high-level structured parallel programming enablers. Softw Pract Exp 40(12):1135–1160CrossRef Gonzalez-Velez H, Leyton M (2010) A survey of algorithmic skeleton frameworks: high-level structured parallel programming enablers. Softw Pract Exp 40(12):1135–1160CrossRef
14.
Zurück zum Zitat Hegde C, Manu S, Shenoy PD, Venugopal K, Patnaik L (2008) Secure authentication using image processing and visual cryptography for banking applications. In: ADCOM 2008. 16th international conference on advanced computing and communications, IEEE, pp 65–72 Hegde C, Manu S, Shenoy PD, Venugopal K, Patnaik L (2008) Secure authentication using image processing and visual cryptography for banking applications. In: ADCOM 2008. 16th international conference on advanced computing and communications, IEEE, pp 65–72
15.
Zurück zum Zitat Horst R, Pardalos PM, Thoai NV (2000) Introduction to global optimization, 2nd edn. Kluwer Academic Publishers, DordrechtCrossRefMATH Horst R, Pardalos PM, Thoai NV (2000) Introduction to global optimization, 2nd edn. Kluwer Academic Publishers, DordrechtCrossRefMATH
16.
Zurück zum Zitat Korpela EJ (2012) SETI@Home, BOINC, and volunteer distributed computing. Annu Rev Earth Planet Sci 40(1):69–87CrossRef Korpela EJ (2012) SETI@Home, BOINC, and volunteer distributed computing. Annu Rev Earth Planet Sci 40(1):69–87CrossRef
17.
Zurück zum Zitat Kumar V, Grama A, Gupta A, Karypis G (1994) Introduction to parallel computing: design and analysis of algorithms. Benjamin/Cummings, San FranciscoMATH Kumar V, Grama A, Gupta A, Karypis G (1994) Introduction to parallel computing: design and analysis of algorithms. Benjamin/Cummings, San FranciscoMATH
18.
Zurück zum Zitat Lewis A, Mostaghim S, Scriven I (2009) Asynchronous multi-objective optimisation in unreliable distributed environments. In: Lewis A, Mostaghim S, Randall M (eds) Biologically-inspired optimisation methods: parallel algorithms, systems and applications, studies in computational intelligence, vol 210. Springer, Heidelberg, pp 51–78 Lewis A, Mostaghim S, Scriven I (2009) Asynchronous multi-objective optimisation in unreliable distributed environments. In: Lewis A, Mostaghim S, Randall M (eds) Biologically-inspired optimisation methods: parallel algorithms, systems and applications, studies in computational intelligence, vol 210. Springer, Heidelberg, pp 51–78
19.
Zurück zum Zitat Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca RatonCrossRefMATH Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca RatonCrossRefMATH
21.
Zurück zum Zitat Mostaghim S, Branke J, Lewis A, Schmeck H (2008) Parallel multi-objective optimization using master–slave model on heterogeneous resources. In: Evolutionary computation, 2008. CEC 2008. IEEE world congress on computational intelligence, pp 1981–1987 Mostaghim S, Branke J, Lewis A, Schmeck H (2008) Parallel multi-objective optimization using master–slave model on heterogeneous resources. In: Evolutionary computation, 2008. CEC 2008. IEEE world congress on computational intelligence, pp 1981–1987
22.
Zurück zum Zitat Naor M, Shamir A (1995) Visual cryptography. In: De Santis A (ed) Advances in cryptology—EUROCRYPT’94, lecture notes in computer science, vol 950. Springer, Berlin, pp 1–12 Naor M, Shamir A (1995) Visual cryptography. In: De Santis A (ed) Advances in cryptology—EUROCRYPT’94, lecture notes in computer science, vol 950. Springer, Berlin, pp 1–12
23.
Zurück zum Zitat Palivonaite R, Fedaravicius A, Aleksa A, Ragulskis M (2013) Near-optimal moire grating for chaotic dynamic visual cryptography. In: Zaman H, Robinson P, Olivier P, Shih T, Velastin S (eds) Advances in visual informatics, lecture notes in computer science, vol 8237. Springer International Publishing, Switzerland, pp 48–58CrossRef Palivonaite R, Fedaravicius A, Aleksa A, Ragulskis M (2013) Near-optimal moire grating for chaotic dynamic visual cryptography. In: Zaman H, Robinson P, Olivier P, Shih T, Velastin S (eds) Advances in visual informatics, lecture notes in computer science, vol 8237. Springer International Publishing, Switzerland, pp 48–58CrossRef
24.
Zurück zum Zitat Ragulskis M, Aleksa A (2009) Image hiding based on time-averaging moiré. Opt Commun 282(14):2752–2759CrossRef Ragulskis M, Aleksa A (2009) Image hiding based on time-averaging moiré. Opt Commun 282(14):2752–2759CrossRef
25.
Zurück zum Zitat Ragulskis M, Aleksa A, Maskeliunas R (2009) Contrast enhancement of time averaged fringes based on moving average mapping functions. Opt Lasers Eng 47(7–8):768–773CrossRef Ragulskis M, Aleksa A, Maskeliunas R (2009) Contrast enhancement of time averaged fringes based on moving average mapping functions. Opt Lasers Eng 47(7–8):768–773CrossRef
26.
Zurück zum Zitat Ross A, Othman A (2011) Visual cryptography for biometric privacy. IEEE Trans Inform Forensics Secur 6(1):70–81CrossRef Ross A, Othman A (2011) Visual cryptography for biometric privacy. IEEE Trans Inform Forensics Secur 6(1):70–81CrossRef
27.
Zurück zum Zitat Starikovičius V, Čiegis R, Iliev O (2011) A parallel solver for the design of oil filters. Math Model Anal 16(2):326–341CrossRefMATH Starikovičius V, Čiegis R, Iliev O (2011) A parallel solver for the design of oil filters. Math Model Anal 16(2):326–341CrossRefMATH
28.
Zurück zum Zitat Talbi EG, Mostaghim S, Okabe T, Ishibuchi H, Rudolph G, Coello Coello CA (2008) Parallel approaches for multiobjective optimization. In: Branke J, Deb K, Miettinen K, Slowinski R (eds) Multiobjective optimization: interactive and evolutionary approaches, lecture notes in computer science, vol 5252. Springer, Heidelberg, pp 349–372 Talbi EG, Mostaghim S, Okabe T, Ishibuchi H, Rudolph G, Coello Coello CA (2008) Parallel approaches for multiobjective optimization. In: Branke J, Deb K, Miettinen K, Slowinski R (eds) Multiobjective optimization: interactive and evolutionary approaches, lecture notes in computer science, vol 5252. Springer, Heidelberg, pp 349–372
Metadaten
Titel
Application of distributed parallel computing for dynamic visual cryptography
verfasst von
Raimondas Čiegis
Vadimas Starikovičius
Natalija Tumanova
Minvydas Ragulskis
Publikationsdatum
01.11.2016
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 11/2016
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-016-1733-8

Weitere Artikel der Ausgabe 11/2016

The Journal of Supercomputing 11/2016 Zur Ausgabe

Premium Partner