scholarly journals Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm

2018 ◽  
Vol 7 (1.9) ◽  
pp. 22 ◽  
Author(s):  
Shankar K ◽  
Lakshmanaprabu S.K

The security of digital images is a basic and difficult task on the shared communication channel. Different strategies are utilized to secure the digital image, for example, encryption, steganography and watermarking. These are the techniques for the security of digital image to accomplish security objectives, i.e. secrecy, trustworthiness, and accessibility. In the proposed study, Homomorphic Encryption (HE) with optimal key selection for image security is utilized. Here the histogram equalization is introduced for altering image intensities to improve contrast. The histogram of an image generally speaks to the comparative frequency of occurrence of the different gray levels in the image. To increase the security level inspired Ant Lion Optimization (ALO) is considered, where the fitness function as max entropy the best-encrypted image is characterized as the image with most astounding entropy among adjacent pixels. Analyzing the outcomes from the performed experimental outcomes can accomplish abnormal state and great strength of proposed model compared with other encryption strategies.

2021 ◽  
Vol 63 (5) ◽  
pp. 442-447
Author(s):  
Hammoudi Abderazek ◽  
Ferhat Hamza ◽  
Ali Riza Yildiz ◽  
Liang Gao ◽  
Sadiq M. Sait

Abstract Metaheuristic optimization algorithms have gained relevance and have effectively been investigated for solving complex real design problems in diverse fields of science and engineering. In this paper, a recent meta-heuristic approach inspired by human social concepts, namely the queuing search algorithm (QSA), is implemented for the first time to optimize the main parameters of the spur gear, in particular, to minimize the weight of a single-stage spur gear. The effectiveness of the algorithm introduced is examined in two steps. First, the algorithm used is compared with descriptions in previous studies and indicates that the final results obtained by QSA lead to a reduction in gear weight by 7.5 %. Furthermore, the outcomes obtained are compared with those for the other five algorithms. The results reveal that the QSA outperforms the techniques with which it is compared such as the sine-cosine optimization algorithm, the ant lion optimization algorithm, the interior search algorithm, the teaching-learning-based algorithm, and the jaya algorithm in terms of robustness, success rate, and convergence capability.


Author(s):  
Mohamad Tariq Barakat ◽  
Rushdi Abu Zneit ◽  
Ziad A. Alqadi

Multiple methods are used to hide secret messages in digital color images, and the most important and most common is the least significant bit (LSB) method. The LSB method is a known and exposed method, and anyone with programming experience can retrieve the secret message embedded in the digital image. In this paper research we will add some enhancements to improve the security level of LSB method to protect the embedded secret message from being hacked. A simple method of secret message cryptography will be used to encrypt the secret message before bedding it using LSB method. The method will be based on using color image as an image_key; this image_key will be resized to generate the needed secret private key used to encrypt-decrypt secret message. The length and the contents of the generated private key will dynamically change depending on the message length and the selected image_key. The selected image_key will be kept in secret without transmission and will be known only by the sender and receiver and it can be changed any time when needed. The proposed crypto_steganographic method will be implemented to show how it will increase the level o secret message protection.


Author(s):  
Rezoana Bente Arif ◽  
Mohammad Mahmudur Rahman Khan ◽  
Md. Abu Bakr Siddique

This paper has two major parts. In the first part histogram equalization for the image enhancement was implemented without using the built-in function in MATLAB. Here, at first, a color image of a rat was chosen and the image was transformed into a grayscale image. After this conversion, histogram equalization was implemented on the grayscale image. Later on, in the same image for each RGB channel, histogram equalization was implemented to observe the effect of histogram equalization on each channel. In the end, the histogram equalization was implemented to this specific color image of a rat. In the second part, for the grayscale image in part 1, the desired histogram of another colored image of a rat was introduced and histogram specification was implemented on the original colored image.


Sign in / Sign up

Export Citation Format

Share Document