Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm
-
2018-03-01 https://doi.org/10.14419/ijet.v7i1.9.9729 -
Ant Lion Optimization, Decryption, Encryption, Entropy, Homomorphic Encryption, Image Security. -
Abstract
The security of digital images is a basic and difficult task on the shared communication channel. Different strategies are utilized to secure the digital image, for example, encryption, steganography and watermarking. These are the techniques for the security of digital image to accomplish security objectives, i.e. secrecy, trustworthiness, and accessibility. In the proposed study, Homomorphic Encryption (HE) with optimal key selection for image security is utilized. Here the histogram equalization is introduced for altering image intensities to improve contrast. The histogram of an image generally speaks to the comparative frequency of occurrence of the different gray levels in the image. To increase the security level inspired Ant Lion Optimization (ALO) is considered, where the fitness function as max entropy the best-encrypted image is characterized as the image with most astounding entropy among adjacent pixels. Analyzing the outcomes from the performed experimental outcomes can accomplish abnormal state and great strength of proposed model compared with other encryption strategies.
-
References
[1] Chen, J., Zhang, Y., Qi, L., Fu, C. and Xu, L., “Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression.†Optics & Laser Technology, Vol. 99, pp.238-248. 2018.https://doi.org/10.1016/j.optlastec.2017.09.008.
[2] Ping, P., Xu, F., Mao, Y. and Wang, Z., “Designing permutation-substitution image encryption networks with Henon mapâ€. Neurocomputing, pp.1-17. 2017.
[3] Han, C., Shen, Y. and Ma, W. Iteration and superposition encryption scheme for image sequences based on multi-dimensional keys. Optics Communications, Vol. 405, pp.101-106.2017.
[4] Challa, R., Vijayakumar, G. and Sunny, B., “Secure Image processing using LWE based Homomorphic encryptionâ€. In Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on pp. 1-6. IEEE.2015.https://doi.org/10.1109/ICECCT.2015.7226064.
[5] Meneses, F., Fuertes, W., Sancho, J., Salvador, S., Flores, D., Aules, H., Castro, F., Torres, J., Miranda, A.,andNuela, D.,. RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages. International Journal of Computer Science and Network Security (IJCSNS), Vol.16, No.8, pp.55-62. 2016.
[6] Kumari, A. and Goyal, S., “Encryption and Code Breaking of Image Using Genetic Algorithm in MATLABâ€. International Journal of Advance Research in Computer Science and Management Studies, Vol.4, No.7, pp.356-361.2016.
[7] Kaushal, S., Thada, V. and Jatain, M.A., “Effect of Optimization Algorithm on Image Security and Reliabilityâ€. Journal of Advanced Research in Computer Engineering & Technology, Vol.5, No.5, pp.1475-1478. 2016.
[8] Palvi Gupta, and Ridhi Kapoor, “Image Security using Optimized AES with GAâ€, Journal of Advances in Science and Technology, Vol.3, No.3, pp.56-61.2015.
[9] Sayiema Amin, Durfi Ashraf and Amardeep Singh Virk, “Optimization of Steganography Technique using AESâ€, Journal of Innovative Research in Science, Engineering, and Technology, Vol.4, No.8, pp.7498-7505. 2015.
[10] Praveenkumar,P.Devi,S. Thenmozhi,. Rayappan and Amirtharajan, R., “Stego integrated Image encryption using row and column indexingâ€, Conference on Computer Communication and Informatics, pp.1-4. 2017.
[11] Reddy.V, and Siddaiah.P. “Genetic Algorithm Optimized Multi-Objective Optimization for Medical Image Watermarking using DWT and SVDâ€, Journal of Scientific & Engineering Research, Vol.6, No.1, pp.1467-1479. 2015.
[12] Sindhuja, K. and Devi, P.S., “A symmetric key encryption technique using a genetic algorithmâ€. International Journal of Computer Science and Information Technologies, Vol.5, No.1, pp.414-416. 2014.
[13] Pandey, L.N.,and Shukla, N.,. “Visual cryptography schemes using compressed random sharesâ€. International Journal of Advance Research in Computer Science and Management Studies, Vol.1, No.4, pp.62-66, 2013.
[14] Sasi, S.B. and Sivanandam, N., “A survey on cryptography using optimization algorithms in WSNsâ€. Indian Journal of Science and Technology, Vol.8, No.3, pp. 216-221. 2015.https://doi.org/10.17485/ijst/2015/v8i3/59585.
[15] Yuan, S., Yang, Y., Liu, X., Zhou, X. and Wei, Z., “Optical image transformation and encryption by phase-retrieval-based double random-phase encoding and compressive ghost imagingâ€. Optics and Lasers in Engineering, Vol.100, pp.105-110. 2018.https://doi.org/10.1016/j.optlaseng.2017.07.015.
[16] Chen, J., Zhang, Y., Qi, L., Fu, C. and Xu, L., “Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compressionâ€. Optics & Laser Technology, Vol.99, pp.238-248.2018.
[17] Singh, L.D., and Singh, K.M., “Image encryption using elliptic curve cryptographyâ€. Procedia Computer Science, Vol.54, pp.472-481. 2015.https://doi.org/10.1016/j.procs.2015.06.054.
[18] Elhoseny, M., Elminir, H., Riad, A. and Yuan, X.,. “A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryptionâ€. Journal of King Saud University-Computer and Information Sciences, Vol. 28, No.3, pp.262-275, 2016.https://doi.org/10.1016/j.jksuci.2015.11.001.
[19] Mokhtar, M.A., Sadek, N.M. and Mohamed, A.G. Design of image encryption algorithm based on the different chaotic mapping. In Radio Science Conference (NRSC), 2017 34th National pp. 197-204. IEEE. 2017.https://doi.org/10.1109/NRSC.2017.7893504.
[20] Mirjalili, S. “The ant lion optimizerâ€. Advances in Engineering Software, Vol.83, pp.80-98. 2015.https://doi.org/10.1016/j.advengsoft.2015.01.010.
[21] Singh, R.P., and Dixit, M. “Histogram equalization: a strong technique for image enhancementâ€. International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol.8, No.8, pp.345-352.2015.
[22] Zheng, P. and Huang, J. “An efficient image homomorphic encryption scheme with small ciphertext expansionâ€. In Proceedings of the 21st ACM international conference on Multimedia, pp. 803-812. ACM. 2013.https://doi.org/10.1145/2502081.2502105.
[23] Mostafa, A., Houseni, M., Allam, N., Hassanien, A.E., Hefny, H. and Tsai, P.W. “Antlion Optimization Based Segmentation for MRI Liver Imagesâ€. In International Conference on Genetic and Evolutionary Computing, Springer, pp. 265-272. 2016.
[24] Shankar, K., and P. Eswaran. “RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography.†China Communications 14.2 (2017): 118-130.https://doi.org/10.1109/CC.2017.7868160.
[25] Shankar, K., and P. Eswaran. “Sharing a secret image with encapsulated shares in visual cryptography.†Procedia Computer Science 70 (2015): 462-468.https://doi.org/10.1016/j.procs.2015.10.080.
[26] Shankar, K., and P. Eswaran. “A new k out of n secret image sharing scheme in visual cryptography.†Intelligent Systems and Control (ISCO), 2016 10th International Conference on. IEEE, 2016.https://doi.org/10.1109/ISCO.2016.7726969.
-
Downloads
-
How to Cite
K, S., & S.K, L. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(1.9), 22-27. https://doi.org/10.14419/ijet.v7i1.9.9729Received date: 2018-02-26
Accepted date: 2018-02-26
Published date: 2018-03-01