Skip to main content
Log in

Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

A Correction to this article was published on 02 April 2021

This article has been updated

Abstract

At present times, medical image security becomes a hot research topic in the healthcare sector. This paper presents an efficient lightweight image encryption model based on the Dynamic key generating Attribute based encryption (ABE) method with Opposition based joint Grey Wolf-Whale Optimization Algorithm (OjGW-WOA). The proposed encryption method undergoes certain pre-encryption steps like rotation and random column addition steps. Once the pre-encryption steps are done, ABE with OjGW-WOA is incorporated, where the optimal key is generated based on entropy value. In addition, the oppositional based learning concept is introduced to enhance the convergence rate and searching process of GWO and WOA algorithms. Next, the proposed encryption method is designed with a dynamic key generating model that generates updated keys during every time period. Therefore, during decryption, two-level key verification is done. At the first decryption stage, the key corresponding to that particular time period is required, then the original key is generated from that key and then employed for decrypting the original data. The proposed method is simulated using MATLAB tool and a detailed comparative results analysis is carried out. The performance of the proposed work is validated with the aid of performance metrics like Peak Signal to Noise Ratio (PSNR), number of changing pixel rate (NPCR) and unified averaged changed intensity (UACI). The experimental results stated that the presented model has resulted to a higher PSNR of 62.29 dB, NPCR of 99.23%, and UACI of 23.67%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Availability of Data and Material

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

Code Availability

Custom code.

Change history

References

  1. Tan, Y., Xue, Y., Liang, C., Zheng, J., Zhang, Q., Zheng, J., & Li, Y. (2018). A root privilege management scheme with revocable authorization for android devices. Journal of Network and Computer Applications, 107, 69–82.

    Article  Google Scholar 

  2. Cao, Y., Zhou, Z., Sun, X., & Gao, C. (2018). Coverless information hiding based on the molecular structure images of material. Computers, Materials and Continua, 54(2), 197–207.

    Google Scholar 

  3. Deng, X., Chen, Z., Zeng, F., Zhang, Y., & Mao, Y. (2013). Authentication and recovery of medical diagnostic image using dual reversible digital watermarking. Journal of Nanoscience and Nanotechnology, 13(3), 2099–2107.

    Article  Google Scholar 

  4. Das, S., & Kundu, M. K. (2012). Effective management of medical information through a novel blind watermarking technique. Journal of Medical Systems, 36(5), 3339–3351.

    Article  Google Scholar 

  5. Kanso, A., & Ghebleh, M. (2015). An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation, 24, 98–116.

    Article  MathSciNet  MATH  Google Scholar 

  6. Lima, J. B., Madeiro, F., & Sales, F. J. R. (2015). Encryption of medical images based on the cosine number transform. Signal Processing: Image Communication, 35, 1–8.

    Google Scholar 

  7. Mukhedkar, M., Powar, P., Gaikwad, P. (2015). Secure nonreal time image encryption algorithm development using cryptography & Steganography. In India conference (INDICON), 2015 annual IEEE (pp. 1–6). IEEE.

  8. Daniel, R. M., Rajsingh, E. B., & Silas, S. A. (2018). Forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. Journal of King Saud University-Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2018.02.004

    Article  Google Scholar 

  9. Nabil, E. (2016). A modified flower pollination algorithm for global optimization. Expert Systems with Applications, 57, 192–203.

    Article  Google Scholar 

  10. Abdel-Basset, M., Manogaran, G., & Mohamed, M. (2018). Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems. Future Generation Computer Systems., 86, 614–628.

    Article  Google Scholar 

  11. Abdel-Basset, M., Manogaran, G., El-Shahat, D., & Mirjalili, S. (2018). A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem. Future Generation Computer Systems, 85, 129–145.

    Article  Google Scholar 

  12. Song, Y., Wang, H., Wei, X., & Wu, L. (2019). Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Security and Communication Networks2019, 1–9.

    Google Scholar 

  13. Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.

    Article  Google Scholar 

  14. Sivaram, M., Lydia, E. L., Pustokhina, I. V., Pustokhin, D. A., Elhoseny, M., Joshi, G. P., & Shankar, K. (2020). An optimal least square support vector machine based earnings prediction of blockchain financial products. IEEE Access, 8, 120321–120330.

    Article  Google Scholar 

  15. Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. (2020). Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, 32(4), e5122.

    Article  Google Scholar 

Download references

Funding

The author(s) received no specific funding for this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Raja.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article has been revised: The authors’ affiliation has been corrected.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raja, M., Dhanasekaran, S. & Vasudevan, V. Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication. Wireless Pers Commun 127, 635–655 (2022). https://doi.org/10.1007/s11277-021-08357-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08357-8

Keywords

Navigation