Skip to main content

2019 | OriginalPaper | Buchkapitel

10. Optimal Stream Encryption for Multiple Shares of Images by Improved Cuckoo Search Model

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security of the media information such as image and video is one of the fundamental prerequisites for broadcasting communications and computer systems. Most of image security system, for famous systems, similar to the Internet, is not reasonable for wireless sensor systems, requesting legitimate examination around there. In the proposed investigation, the security of Digital Images (DI) is upgraded by utilizing a Lightweight encryption algorithm. To ensure security, the images selected for security investigation was shared by a number of copies. With the help of the presented share creation model, for example, Chinese Remainder Theorem (CRT), the image was encoded into a number of shares and the created shares were highly secured by the proposed Stream Encryption (SE) algorithm. The metaheuristic algorithm was introduced by passing the selection of optimal public and private keys to encrypt as well as decrypt the image in secure transmission. With the help of Improved Cuckoo Search Algorithm (ICSA), the optimal keys were selected with fitness function as maximum throughput. The proposed SE-based ICSA algorithm consumed the least time in creating key value to decrypt the image in WSN security model. The simulation result exhibited that the SE-based ICSA algorithm enhanced the exactness of DI security for all input images (Lena, Barbara, baboon, house, and airplane) when compared with existing algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Patel, T., & Srivastava, R. (2016, August). A new technique for color share generation using visual cryptography. In International Conference on Inventive Computation Technologies (ICICT) (Vol. 2, pp. 1–4). IEEE. Patel, T., & Srivastava, R. (2016, August). A new technique for color share generation using visual cryptography. In International Conference on Inventive Computation Technologies (ICICT) (Vol. 2, pp. 1–4). IEEE.
2.
Zurück zum Zitat Khokhar, P., & Jena, D. (2017). Color image visual cryptography scheme with enhanced security. In Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications (pp. 267–279). Singapore: Springer. Khokhar, P., & Jena, D. (2017). Color image visual cryptography scheme with enhanced security. In Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications (pp. 267–279). Singapore: Springer.
3.
Zurück zum Zitat Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with the oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.CrossRef Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with the oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.CrossRef
4.
Zurück zum Zitat Gupta, M., & Chauhan, D. (2015). A visual cryptographic scheme to secure image shares using digital watermarking. International Journal of Computer Science and Information Technologies (IJCSIT). Gupta, M., & Chauhan, D. (2015). A visual cryptographic scheme to secure image shares using digital watermarking. International Journal of Computer Science and Information Technologies (IJCSIT).
5.
Zurück zum Zitat Shinde, K. V., Kaur, H., & Patil, P. (2015, February). Enhance security for spontaneous wireless ad hoc network creation. In 2015 International Conference on Computing Communication Control and Automation (ICCUBEA) (pp. 247–250). IEEE. Shinde, K. V., Kaur, H., & Patil, P. (2015, February). Enhance security for spontaneous wireless ad hoc network creation. In 2015 International Conference on Computing Communication Control and Automation (ICCUBEA) (pp. 247–250). IEEE.
6.
Zurück zum Zitat Elhoseny, M., & Hassanien, A. E. (2019). Dynamic wireless sensor networks: New directions for smart technologies. Published in Studies in Systems, Decision and Control. Springer. Elhoseny, M., & Hassanien, A. E. (2019). Dynamic wireless sensor networks: New directions for smart technologies. Published in Studies in Systems, Decision and Control. Springer.
7.
Zurück zum Zitat Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468. Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462–468.
8.
Zurück zum Zitat Begum, A. A. S., & Nirmala, S. (2018). Secure visual cryptography for medical image using modified cuckoo search. Multimedia Tools and Applications, 1–20. Begum, A. A. S., & Nirmala, S. (2018). Secure visual cryptography for medical image using modified cuckoo search. Multimedia Tools and Applications, 1–20.
9.
Zurück zum Zitat Wadi, S. M., & Zainal, N. (2017). Enhanced hybrid image security algorithms for high definition images in multiple applications. Multidimensional Systems and Signal Processing, 1–24. Wadi, S. M., & Zainal, N. (2017). Enhanced hybrid image security algorithms for high definition images in multiple applications. Multidimensional Systems and Signal Processing, 1–24.
10.
Zurück zum Zitat Kita, N., & Miyata, K. (2018). Magic sheets: Visual cryptography with common shares. Computational Visual Media, 4(2), 185–195.CrossRef Kita, N., & Miyata, K. (2018). Magic sheets: Visual cryptography with common shares. Computational Visual Media, 4(2), 185–195.CrossRef
11.
Zurück zum Zitat Do, Q., Martini, B., & Choo, K. K. R. (2018). The role of the adversary model in applied security research. Computers & Security. Do, Q., Martini, B., & Choo, K. K. R. (2018). The role of the adversary model in applied security research. Computers & Security.
12.
Zurück zum Zitat Sreelaja, N. K., & Pai, G. V. (2012). Stream cipher for binary image encryption using Ant Colony Optimization based key generation. Applied Soft Computing, 12(9), 2879–2895.CrossRef Sreelaja, N. K., & Pai, G. V. (2012). Stream cipher for binary image encryption using Ant Colony Optimization based key generation. Applied Soft Computing, 12(9), 2879–2895.CrossRef
13.
Zurück zum Zitat Aïssa, B., Nadir, D., & Mohamed, R. (2011, July). Image encryption using stream cipher algorithm with nonlinear filtering function. In 2011 International Conference on High Performance Computing and Simulation (HPCS) (pp. 830–835). IEEE. Aïssa, B., Nadir, D., & Mohamed, R. (2011, July). Image encryption using stream cipher algorithm with nonlinear filtering function. In 2011 International Conference on High Performance Computing and Simulation (HPCS) (pp. 830–835). IEEE.
14.
Zurück zum Zitat El‐Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies, e3523. El‐Shorbagy, M. A., Elhoseny, M., Hassanien, A. E., & Ahmed, S. H. (2018). A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Transactions on Emerging Telecommunications Technologies, e3523.
15.
Zurück zum Zitat Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. (2018). Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, e5122. Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. (2018). Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, e5122.
16.
Zurück zum Zitat Li, Y., Xiong, C., Han, X., Du, H., & He, F. (2018). Internet-scale secret sharing algorithm with multimedia applications. Multimedia Tools and Applications, 1–6. Li, Y., Xiong, C., Han, X., Du, H., & He, F. (2018). Internet-scale secret sharing algorithm with multimedia applications. Multimedia Tools and Applications, 1–6.
17.
Zurück zum Zitat Liu, Y., & Chang, C. C. (2018). A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools and Applications, 1–16. Liu, Y., & Chang, C. C. (2018). A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools and Applications, 1–16.
18.
Zurück zum Zitat Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13. Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1–13.
19.
Zurück zum Zitat Al-Khalid, R. I., Al-Dallah, R. A., Al-Anani, A. M., Barham, R. M., & Hajir, S. I. (2017). A secure visual cryptography scheme using private key with invariant share sizes. Journal of Software Engineering and Applications, 10(1), 1–10.CrossRef Al-Khalid, R. I., Al-Dallah, R. A., Al-Anani, A. M., Barham, R. M., & Hajir, S. I. (2017). A secure visual cryptography scheme using private key with invariant share sizes. Journal of Software Engineering and Applications, 10(1), 1–10.CrossRef
20.
Zurück zum Zitat Elhoseny, M., Farouk, A., Zhou, N., Wang, M.-M., Abdalla, S., & Batle, J. (2017). Dynamic multi-hop clustering in a wireless sensor network: Performance improvement. Wireless Personal Communications, Springer US, 95(4), 3733–3753. Elhoseny, M., Farouk, A., Zhou, N., Wang, M.-M., Abdalla, S., & Batle, J. (2017). Dynamic multi-hop clustering in a wireless sensor network: Performance improvement. Wireless Personal Communications, Springer US, 95(4), 3733–3753.
21.
Zurück zum Zitat Elhoseny, M., Tharwat, A., Yuan, X., & Hassanien, A. E. (2018). Optimizing K-coverage of mobile WSNs. Expert Systems with Applications, 92, 142–153.CrossRef Elhoseny, M., Tharwat, A., Yuan, X., & Hassanien, A. E. (2018). Optimizing K-coverage of mobile WSNs. Expert Systems with Applications, 92, 142–153.CrossRef
Metadaten
Titel
Optimal Stream Encryption for Multiple Shares of Images by Improved Cuckoo Search Model
verfasst von
K. Shankar
Mohamed Elhoseny
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-20816-5_10

Neuer Inhalt