Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The security of digital images is a basic and difficult task on the shared communication channel. Different strategies are utilized to secure the digital image, for example, encryption, steganography and watermarking. These are the techniques for the security of digital image to accomplish security objectives, i.e. secrecy, trustworthiness, and accessibility. In the proposed study, Homomorphic Encryption (HE) with optimal key selection for image security is utilized. Here the histogram equalization is introduced for altering image intensities to improve contrast. The histogram of an image generally speaks to the comparative frequency of occurrence of the different gray levels in the image. To increase the security level inspired Ant Lion Optimization (ALO) is considered, where the fitness function as max entropy the best-encrypted image is characterized as the image with most astounding entropy among adjacent pixels. Analyzing the outcomes from the performed experimental outcomes can accomplish abnormal state and great strength of proposed model compared with other encryption strategies.

  • Keywords

    Ant Lion Optimization; Decryption; Encryption; Entropy; Homomorphic Encryption; Image Security.

  • References

      [1] Chen, J., Zhang, Y., Qi, L., Fu, C. and Xu, L., “Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression.” Optics & Laser Technology, Vol. 99, pp.238-248. 2018.https://doi.org/10.1016/j.optlastec.2017.09.008.

      [2] Ping, P., Xu, F., Mao, Y. and Wang, Z., “Designing permutation-substitution image encryption networks with Henon map”. Neurocomputing, pp.1-17. 2017.

      [3] Han, C., Shen, Y. and Ma, W. Iteration and superposition encryption scheme for image sequences based on multi-dimensional keys. Optics Communications, Vol. 405, pp.101-106.2017.

      [4] Challa, R., Vijayakumar, G. and Sunny, B., “Secure Image processing using LWE based Homomorphic encryption”. In Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on pp. 1-6. IEEE.2015.https://doi.org/10.1109/ICECCT.2015.7226064.

      [5] Meneses, F., Fuertes, W., Sancho, J., Salvador, S., Flores, D., Aules, H., Castro, F., Torres, J., Miranda, A.,andNuela, D.,. RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages. International Journal of Computer Science and Network Security (IJCSNS), Vol.16, No.8, pp.55-62. 2016.

      [6] Kumari, A. and Goyal, S., “Encryption and Code Breaking of Image Using Genetic Algorithm in MATLAB”. International Journal of Advance Research in Computer Science and Management Studies, Vol.4, No.7, pp.356-361.2016.

      [7] Kaushal, S., Thada, V. and Jatain, M.A., “Effect of Optimization Algorithm on Image Security and Reliability”. Journal of Advanced Research in Computer Engineering & Technology, Vol.5, No.5, pp.1475-1478. 2016.

      [8] Palvi Gupta, and Ridhi Kapoor, “Image Security using Optimized AES with GA”, Journal of Advances in Science and Technology, Vol.3, No.3, pp.56-61.2015.

      [9] Sayiema Amin, Durfi Ashraf and Amardeep Singh Virk, “Optimization of Steganography Technique using AES”, Journal of Innovative Research in Science, Engineering, and Technology, Vol.4, No.8, pp.7498-7505. 2015.

      [10] Praveenkumar,P.Devi,S. Thenmozhi,. Rayappan and Amirtharajan, R., “Stego integrated Image encryption using row and column indexing”, Conference on Computer Communication and Informatics, pp.1-4. 2017.

      [11] Reddy.V, and Siddaiah.P. “Genetic Algorithm Optimized Multi-Objective Optimization for Medical Image Watermarking using DWT and SVD”, Journal of Scientific & Engineering Research, Vol.6, No.1, pp.1467-1479. 2015.

      [12] Sindhuja, K. and Devi, P.S., “A symmetric key encryption technique using a genetic algorithm”. International Journal of Computer Science and Information Technologies, Vol.5, No.1, pp.414-416. 2014.

      [13] Pandey, L.N.,and Shukla, N.,. “Visual cryptography schemes using compressed random shares”. International Journal of Advance Research in Computer Science and Management Studies, Vol.1, No.4, pp.62-66, 2013.

      [14] Sasi, S.B. and Sivanandam, N., “A survey on cryptography using optimization algorithms in WSNs”. Indian Journal of Science and Technology, Vol.8, No.3, pp. 216-221. 2015.https://doi.org/10.17485/ijst/2015/v8i3/59585.

      [15] Yuan, S., Yang, Y., Liu, X., Zhou, X. and Wei, Z., “Optical image transformation and encryption by phase-retrieval-based double random-phase encoding and compressive ghost imaging”. Optics and Lasers in Engineering, Vol.100, pp.105-110. 2018.https://doi.org/10.1016/j.optlaseng.2017.07.015.

      [16] Chen, J., Zhang, Y., Qi, L., Fu, C. and Xu, L., “Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression”. Optics & Laser Technology, Vol.99, pp.238-248.2018.

      [17] Singh, L.D., and Singh, K.M., “Image encryption using elliptic curve cryptography”. Procedia Computer Science, Vol.54, pp.472-481. 2015.https://doi.org/10.1016/j.procs.2015.06.054.

      [18] Elhoseny, M., Elminir, H., Riad, A. and Yuan, X.,. “A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption”. Journal of King Saud University-Computer and Information Sciences, Vol. 28, No.3, pp.262-275, 2016.https://doi.org/10.1016/j.jksuci.2015.11.001.

      [19] Mokhtar, M.A., Sadek, N.M. and Mohamed, A.G. Design of image encryption algorithm based on the different chaotic mapping. In Radio Science Conference (NRSC), 2017 34th National pp. 197-204. IEEE. 2017.https://doi.org/10.1109/NRSC.2017.7893504.

      [20] Mirjalili, S. “The ant lion optimizer”. Advances in Engineering Software, Vol.83, pp.80-98. 2015.https://doi.org/10.1016/j.advengsoft.2015.01.010.

      [21] Singh, R.P., and Dixit, M. “Histogram equalization: a strong technique for image enhancement”. International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol.8, No.8, pp.345-352.2015.

      [22] Zheng, P. and Huang, J. “An efficient image homomorphic encryption scheme with small ciphertext expansion”. In Proceedings of the 21st ACM international conference on Multimedia, pp. 803-812. ACM. 2013.https://doi.org/10.1145/2502081.2502105.

      [23] Mostafa, A., Houseni, M., Allam, N., Hassanien, A.E., Hefny, H. and Tsai, P.W. “Antlion Optimization Based Segmentation for MRI Liver Images”. In International Conference on Genetic and Evolutionary Computing, Springer, pp. 265-272. 2016.

      [24] Shankar, K., and P. Eswaran. “RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography.” China Communications 14.2 (2017): 118-130.https://doi.org/10.1109/CC.2017.7868160.

      [25] Shankar, K., and P. Eswaran. “Sharing a secret image with encapsulated shares in visual cryptography.” Procedia Computer Science 70 (2015): 462-468.https://doi.org/10.1016/j.procs.2015.10.080.

      [26] Shankar, K., and P. Eswaran. “A new k out of n secret image sharing scheme in visual cryptography.” Intelligent Systems and Control (ISCO), 2016 10th International Conference on. IEEE, 2016.https://doi.org/10.1109/ISCO.2016.7726969.




Article ID: 9729
DOI: 10.14419/ijet.v7i1.9.9729

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.