A New Image Encryption Method Based on Improved Cipher Block Chaining with Optimization Technique

Author(s):  
Kuppusamy Krishnamoorthy ◽  
Mahalakshmi Jeyabalu

Security of images in transmission medium is most prime issue found in literature. Encryption of images is a way to secure it from unauthorized access. The authors in this chapter insist on the encryption of images via block ciphers. Block ciphers works simultaneously as well as on chunks. In this chapter, an encryption method using improved cipher block chaining is proposed to encrypt RGB color images. For every encryption methodology, key generation process is the most important phase. The authors proposed sub-optimal key generation algorithm and this nature inspired optimization technique reveals complex keys, remains very useful for decision making in dynamic environment. Key generation is crafted as complex with this mathematical model that overcomes the predicament key problem exists in existing methods and upgrades quality of encryption. Results of the proposed algorithm show the efficiency and its resistance against various cryptanalytic attacks.

Author(s):  
Kuppusamy Krishnamoorthy ◽  
Mahalakshmi Jeyabalu

Security of images in transmission medium is most prime issue found in literature. Encryption of images is a way to secure it from unauthorized access. The authors in this chapter insist on the encryption of images via block ciphers. Block ciphers works simultaneously as well as on chunks. In this chapter, an encryption method using improved cipher block chaining is proposed to encrypt RGB color images. For every encryption methodology, key generation process is the most important phase. The authors proposed sub-optimal key generation algorithm and this nature inspired optimization technique reveals complex keys, remains very useful for decision making in dynamic environment. Key generation is crafted as complex with this mathematical model that overcomes the predicament key problem exists in existing methods and upgrades quality of encryption. Results of the proposed algorithm show the efficiency and its resistance against various cryptanalytic attacks.


Author(s):  
Raghunandan K. R. ◽  
Ganesh Aithal ◽  
Surendra Shetty ◽  
Bhavya K.

Cryptography systems face new threats with the transformation of time and technology. Each innovation tries to contest challenges posed by the previous system by analyzing approaches that are able to provide impressive outcomes. The prime aim of this work is to urge ways in which the concept of Pell’s equation can be used in Public key Cryptography techniques.The main aim of this approach is secure and can be computed very fast. Using Cubic Pell’s equation defined in Quadratic Case, a secure public key technique for Key generation process is showcased. The paper highlights that a key generation time of proposed scheme using Pell’s Quadratic case equation is fast compared to existing methods.The strength and quality  of the proposed method is proved and analyzed by obtaining the results of entropy, differential analysis, correlation analysis and avalanche effect. The superiority of the proposed method over the conventional AES and DES is confirmed by a 50% increase in the execution speed and shows that Standard diviation and Entropy analysis of proposed scheme gives immunity to guess the encryption key and also it is hard to deduce the private key from public key using  Diffrential analysis.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


2020 ◽  
Vol 10 (1) ◽  
pp. 194-219 ◽  
Author(s):  
Sanjoy Debnath ◽  
Wasim Arif ◽  
Srimanta Baishya

AbstractNature inspired swarm based meta-heuristic optimization technique is getting considerable attention and established to be very competitive with evolution based and physical based algorithms. This paper proposes a novel Buyer Inspired Meta-heuristic optimization Algorithm (BIMA) inspired form the social behaviour of human being in searching and bargaining for products. In BIMA, exploration and exploitation are achieved through shop to shop hoping and bargaining for products to be purchased based on cost, quality of the product, choice and distance to the shop. Comprehensive simulations are performed on 23 standard mathematical and CEC2017 benchmark functions and 3 engineering problems. An exhaustive comparative analysis with other algorithms is done by performing 30 independent runs and comparing the mean, standard deviation as well as by performing statistical test. The results showed significant improvement in terms of optimum value, convergence speed, and is also statistically more significant in comparison to most of the reported popular algorithms.


Electronics ◽  
2018 ◽  
Vol 7 (9) ◽  
pp. 163 ◽  
Author(s):  
Honorio Martin ◽  
Pedro Martin-Holgado ◽  
Yolanda Morilla ◽  
Luis Entrena ◽  
Enrique San-Millan

Physical Unclonable Functions (PUFs) are hardware security primitives that are increasingly being used for authentication and key generation in ICs and FPGAs. For space systems, they are a promising approach to meet the needs for secure communications at low cost. To this purpose, it is essential to determine if they are reliable in the space radiation environment. In this work we evaluate the Total Ionizing Dose effects on a delay-based PUF implemented in SRAM-FPGA, namely a Ring Oscillator PUF. Several major quality metrics have been used to analyze the evolution of the PUF response with the total ionizing dose. Experimental results demonstrate that total ionizing dose has a perceptible effect on the quality of the PUF response, but it could still be used for space applications by making some appropriate corrections.


Author(s):  
Alexander A. Musaev ◽  
◽  
Andrey V. Gaikov ◽  

The problem of the of a non-stationary system state predicting is considered. The decision based on the joint processing of the results obtained by a group of independent statistical extrapolators. In the terminology of multiagent systems, each extrapolator is an intelligent agent. The quality of the agent solutions is evaluated on retrospective data and is used as weight characteristic in the problem of a terminal solution estimation. The specificity of non-stationary processes with a chaotic system component leads to the empiricca version of the forecast generation algorithm


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
ChunHua Cao ◽  
YaNa Tang ◽  
DeYan Huang ◽  
WeiMin Gan ◽  
Chunjiong Zhang

Wireless sensor networks (WSN) have problems such as limited power, weak computing power, poor communication ability, and vulnerability to attack. However, the existing encryption methods cannot effectively solve the above problems when applied to WSN. To this end, according to WSN’s characteristics and based on the identity-based encryption idea, an improved identity-based encryption algorithm (IIBE) is proposed, which can effectively simplify the key generation process, reduce the network traffic, and improve the network security. The design idea of this algorithm lies between the traditional public key encryption and identity-based public tweezers’ encryption. Compared with the traditional public key encryption, the algorithm does not need a public key certificate and avoids the management of the certificate. Compared with identity-based public key encryption, the algorithm addresses the key escrow and key revocation problems. The results of the actual network distribution experiments demonstrate that IIBE has low energy consumption and high security, which are suitable for application in WSN with high requirements on security.


2018 ◽  
Vol 111 (1) ◽  
pp. 97-112
Author(s):  
Tim vor der Brück

Abstract Rule-based natural language generation denotes the process of converting a semantic input structure into a surface representation by means of a grammar. In the following, we assume that this grammar is handcrafted and not automatically created for instance by a deep neural network. Such a grammar might comprise of a large set of rules. A single error in these rules can already have a large impact on the quality of the generated sentences, potentially causing even a complete failure of the entire generation process. Searching for errors in these rules can be quite tedious and time-consuming due to potentially complex and recursive dependencies. This work proposes a statistical approach to recognizing errors and providing suggestions for correcting certain kinds of errors by cross-checking the grammar with the semantic input structure. The basic assumption is the correctness of the latter, which is usually a valid hypothesis due to the fact that these input structures are often automatically created. Our evaluation reveals that in many cases an automatic error detection and correction is indeed possible.


Sign in / Sign up

Export Citation Format

Share Document