Advertisement

An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herding Optimization

  • K. ShankarEmail author
  • Mohamed Elhoseny
  • Eswaran Perumal
  • M. Ilayaraja
  • K. Sathesh Kumar
Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

IoT makes incorporated communication circumstances of interconnected devices and stages by drawing in both practical and substantial worlds simultaneously. The researchers of the study distinguished and examined the vital open difficulties in fortifying the security in IoT that combines encryption strategies to offer security to exchanged images between connected networks of the two parties. The device is primarily based on a hybrid algorithm that applies the strategies of encryption and optimization techniques are used. This proposed image safety model signcryption with elephant based optimization method used. The purpose of the use of optimization in encryption method is to pick the most advantageous keys in encryption algorithms, here Adaptive Elephant Herding Optimization (AEHO) used. This technique Signcryption is the technique that mixes the functionality of encryption and digital signature in a single logical step. From the implementation, the results are evaluated through the usage of the Peak Signal to Noise Ratio (PSNR) and Mean square errors (MSE).

Keywords

IoT Networks Image security Encryption Signcryption Optimization 

References

  1. 1.
    Zhang W, Yu H, Zhu ZL (2018) An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Sig Process 151:130–143CrossRefGoogle Scholar
  2. 2.
    Mahmood AS, Rahim MSM (2018) Novel method for image security system based on improved SCAN method and pixel rotation technique. J Inf Secur Appl 42:57–70Google Scholar
  3. 3.
    Khizrai MSQ, Bodkhe ST (2014) Image encryption using different techniques for high security transmission over a network. Int J Eng Res Gen Sci 2(4):299–306Google Scholar
  4. 4.
    Al-Haj A, Abdel-Nabi H (2017) Digital image security based on data hiding and cryptography. In: 2017 3rd International Conference on Information Management (ICIM). IEEE, pp. 437–440Google Scholar
  5. 5.
    Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput SystGoogle Scholar
  6. 6.
    Rani P, Arora A (2015) Image security system using encryption and steganography. Int J Innov Res Sci, Eng Technol, 4(6):2249–0604Google Scholar
  7. 7.
    Iyer SC, Sedamkar RR, Gupta S (2016) A novel idea on multimedia encryption using hybrid crypto approach. Procedia Comput Sci 79:293–298CrossRefGoogle Scholar
  8. 8.
    Siregar R (2018) Performance analysis of AES-Blowfish hybrid algorithm for security of patient medical record data. J Phys: Conf Ser 1007(1):012018 IOP PublishingGoogle Scholar
  9. 9.
    Shaikh P, Kaul V (2014) Enhanced security algorithm using hybrid encryption and ECC. IOSR J Comput Eng (IOSR-JCE), 16(3):80–85CrossRefGoogle Scholar
  10. 10.
    Hassanien AE, Alamry E (2015) Swarm intelligence: principles, advances, and applications. CRC—Taylor & Francis Group. ISBN 9781498741064—CAT# K26721Google Scholar
  11. 11.
    Sharma S, Chopra V (2016) December. Analysis of AES encryption with ECC. In: Proceedings of international interdisciplinary conference on engineering science & management, ISBN: 9788193137383Google Scholar
  12. 12.
    Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circ Syst Comput 25(11):1650138CrossRefGoogle Scholar
  13. 13.
    Shankar K, Eswaran P (2015) Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput Sci 70:462–468CrossRefGoogle Scholar
  14. 14.
    Sathesh Kumar K, Shankar K, Ilayaraja M, Rajesh M (2017) Sensitive data security in cloud computing aid of different encryption techniques. J Adv Res Dyn Control Syst 9(18):2888–2899Google Scholar
  15. 15.
    Rajesh M, Kumar KS, Shankar K, Ilayaraja M, sensitive data security in cloud computing aid of different encryption techniques. J Adv Res Dyn Control Syst 18 Google Scholar
  16. 16.
    Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):208CrossRefGoogle Scholar
  17. 17.
    Karthikeyan K, Sunder R, Shankar K, Lakshmanaprabu SK, Vijayakumar V, Elhoseny M, Manogaran G (2018) Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC–BA). J Supercomput  https://doi.org/10.1007/s11227-018-2583-3
  18. 18.
    Shankar K, Eswaran P (2016) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. In: Artificial intelligence and evolutionary computations in engineering systems. Springer, New Delhi, pp 705–714Google Scholar
  19. 19.
    Shankar K, Eswaran P (2016) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th international conference on intelligent systems and control (ISCO). IEEE, pp 369–374Google Scholar
  20. 20.
    Shankar K, Eswaran P (2015) A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Aust J Basic Appl Sci 9(36):150–163Google Scholar
  21. 21.
    Shankar K, Eswaran P (2015) ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J Appl Eng Res 10(55):1841–1845Google Scholar
  22. 22.
    Raman PS, Shankar K, Ilayaraja M (2018) Securing cluster based routing against cooperative black hole attack in mobile ad hoc network. Int J Eng Technol, 7(9):6–9Google Scholar
  23. 23.
    Ramya Princess Mary I, Eswaran P, Shankar K (2018, Feb) Multi secret image sharing scheme based on DNA cryptography with XOR. Int J Pure Appl Math 118(7):393–398Google Scholar
  24. 24.
    Aminudin N, Maseleno A, Shankar K, Hemalatha S, Sathesh kumar K, Fauzi, RI, Muslihudin M (2018) Nur algorithm on data encryption and decryption. Int J Eng Technol 7(2.26):109–118CrossRefGoogle Scholar
  25. 25.
    Thakur S, Kumar Singh A, Ghrera SP, Elhoseny M (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl.  https://doi.org/10.1007/s11042-018-6263-3CrossRefGoogle Scholar
  26. 26.
    Elhoseny M, Hosny A, Hassanien AE, Muhammad K, Sangaiah AK (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Trans Sustain Comput PP(99)  https://doi.org/10.1109/tsusc.2017.2782737
  27. 27.
    Elhoseny M, Yuan X, ElMinir HK, Riad AM (2016) An energy efficient encryption method for secure dynamic WSN. Secur Commun Netw, Wiley 9(13):2024–2031.  https://doi.org/10.1002/sec.1459CrossRefGoogle Scholar
  28. 28.
    Elhoseny M, Elminir H, Riad A, Yuan X (2016) A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption. Journal of King Saud University—Computer and Information Sciences, Elsevier, 28(3):262–275. http://dx.doi.org/10.1016/j.jksuci.2015.11.001CrossRefGoogle Scholar
  29. 29.
    Elhoseny M, Yuan X, Yu Z, Mao C, El-Minir H, Riad A (2015) Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Commun Lett, IEEE 19(12):2194–2197.  https://doi.org/10.1109/LCOMM.2014.2381226CrossRefGoogle Scholar
  30. 30.
    Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications 14(2):118–130CrossRefGoogle Scholar
  31. 31.
    Shankar K, Elhoseny M, Lakshmanaprabu SK, Ilayaraja M, Vidhyavathi RM, Alkhambashi M (2018) Optimal feature level fusion based ANFIS classifier for brain MRI image classification. Concurr Comput Pract Exper e4887.  https://doi.org/10.1002/cpe.4887

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • K. Shankar
    • 1
    Email author
  • Mohamed Elhoseny
    • 2
  • Eswaran Perumal
    • 3
  • M. Ilayaraja
    • 1
  • K. Sathesh Kumar
    • 1
  1. 1.School of ComputingKalasalingam Academy of Research and EducationKrishnankoilIndia
  2. 2.Faculty of Computers and InformationMansoura UniversityMansouraEgypt
  3. 3.Department of Computer ApplicationsAlagappa UniversityKaraikudiIndia

Personalised recommendations