Skip to main content
Log in

Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

In this digital era, an unprecedented volume of data theft and other criminal activities have rapidly increased on communication systems over wireless channels. To protect the data, various methods have been carried out over the past decade. Data hiding combined with steganography and cryptography is one of the solutions to address the data theft issue. Steganography is used to embed data inside any carrier image file, whereas cryptography is used to maintain the private information in a secure manner. In this paper, the cryptographic algorithm Rivest, Shamir & Adelman (RSA) and Elliptical Curve Cryptography (ECC) are used in cohesion with the data embedding technique. Also, this compares the performance of the encryption algorithms with the hiding technique. Here, the encrypted data is hidden inside the selected location using the Fruit fly Optimization hybridized Improved Seeker (FOIS) algorithm. After finding the optimization pixels, the difference is calculated between the optimization pixels and nearest pixels using Pixel Value Differencing (PVD) to enhance the performance. This work presents the usage of the proposed algorithm based on the evidence from the comparative analysis and threat simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Neil FJ, Sushil J (1998) Exploring steganography seeing the unseen. IEEE Comput Soc 31(2):26–34. https://doi.org/10.1109/MC.1998.4655281

    Article  Google Scholar 

  2. Kanan HR, Nazeri B, Quot (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm & quot. Expert Syst Appl 41(14):6123–6130. https://doi.org/10.1016/j.eswa.2014.04.022

    Article  Google Scholar 

  3. Sameh AA, Taha IBA, Fayed FMG, Sohier MK, Quot (2015) Optimized video steganography using Cuckoo Search algorithm. In: Intelligent Computing and Information Systems (ICICIS) IEEE Seventh International Conference, pp 572–577. https://doi.org/10.1109/INTELCIS.2015.7397279.

  4. Yang X-S, Deb S (2009) Cuckoo search via Levy flights. In: Proc. of World Congress on Nature & Biologically Inspired Computing (NaBIC 2009). IEEE Publications, pp 210–214. https://doi.org/10.1109/NABIC.2009.5393690

  5. Hongqing Z, Yongquan Z (2012) A novel cuckoo search optimization algorithm base on gauss distribution. J Comput Inf Syst 8(10):4193–4200

    Google Scholar 

  6. Xiaoxia L, Jianjun W (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 177(15): 3099-3109 https://doi.org/10.1016/j.ins.2007.02.008

  7. Chang C-C, Chen T-S, Chung L-Z (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141(1–2):123–138. https://doi.org/10.1016/S0020-0255(01)00194-3

    Article  MATH  Google Scholar 

  8. Bedi P, Bansal R, Sehgal P (2013) Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput Electr Eng 39(2):640–654. https://doi.org/10.1016/j.compeleceng.2012.12.021

    Article  Google Scholar 

  9. Ghasemi E, Shanbehzadeh J, Fassihi N (2012) High capacity image steganography based on genetic algorithm and wavelet transform, intelligent control and innovative computing. Lecture Notes Electr Eng. https://doi.org/10.1007/978-1-4614-1695-1_30

    Article  Google Scholar 

  10. Naitik PK, Dipesh GK, Dharmesh NK. Performance evaluation of lsb based steganography for optimization of PSNR and MSE. J Inf Knowl Res Electron Commun Eng 2 (2): 505–509

  11. Rivest S, Adleman A (1978) Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, pp 120- 126. https://doi.org/10.1145/359340.359342

  12. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209

    Article  MathSciNet  Google Scholar 

  13. Ronald P, Haff Eric Jackson S, Moscetti R, Massantini R (2015) Detection of fruit-fly infestation in olives using X-Ray imaging: Algorithm development and prospects. Columbia Int Publ Am J Agric Sci Technol 4(1):1–8. https://doi.org/10.7726/ajast.2016.1001

    Article  Google Scholar 

  14. Chaohua Dai, Weirong Chen, Yunfang Zhu and Xuexia Zhang, (2009) Seeker Optimization Algorithm for OptimalReactive Power Dispatch, IEEE Transactions on Power Systems, 24 (3):1218–1231. https://doi.org/10.1109/TPWRS.2009.2021226.

  15. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67. https://doi.org/10.1016/j.advengsoft.2016.01.008

    Article  Google Scholar 

  16. Carvalho D, Lima R, Silva WGD, Morais AHO (2017) Optimizing image steganography using particle Swarm optimization algorithm. Int J Comput Appl 164(7):1–5. https://doi.org/10.5120/ijca2017913686

    Article  Google Scholar 

  17. Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61. https://doi.org/10.1016/j.advengsoft.2013.12.007

    Article  Google Scholar 

  18. Weber AG (1997) The USC-SIPI Image Database: Version 5, Original release: Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering, ed.

  19. Sree ST, Ramar K, SreeRenga RT (2013) Impact of Applying preprocessing Techniques for Improving Classification Accuracy, Signal Image and Video Processing, Springer-Verlag London Limited 8 (1):149-157. https://doi.org/10.1007/s11760-013-0505-7

  20. Sree ST, Ramar K, SreeRenga RT (2013) Comparative analysis of satellite image preprocessing techniques. J Comput Sci 9(2):176–182 https://doi.org/10.3844/jcssp.2013.176.182

  21. Sree ST, Ramar K, SreeRenga RT (2013) Developing an efficient technique for satellite image denoising and resolution enhancement for improving classification accuracy. J Electron Imaging. https://doi.org/10.1117/1.JEI.22.1.013013

    Article  Google Scholar 

  22. Sree ST, Ramar K Efficient Analysis of Hybrid Directional Lifting Technique for Satellite Image Denoising, Signal Image and Video Processing, Springer-Verlag London Limited 8 (7): 1399–1404. https://doi.org/10.1007/s11760-012-0369-2.

  23. Roselin Kiruba R, Sree Sharmila T (2021) Secure data hiding by fruit fly optimization improved hybridized seeker algorithm. Multidim Syst Sign Proacess 32:405–430. https://doi.org/10.1007/s11045-019-00697-w

    Article  MathSciNet  MATH  Google Scholar 

  24. RoselinKiruba R, Sharmila TS (2018) Hiding Data in Videos Using Optimal Selection of Key-Frames. International Conference on Computer, Communication, and Signal Processing (ICCCSP), pp 1–6. https://doi.org/10.1109/ICCCSP.2018.8452834.

  25. RoselinKiruba R, Sharmila TS (2017) Performance analysis in secured image encryption and data hiding using LSB algorithm, IEEE International Conference on Circuits and Systems (ICCS), pp112–117. https://doi.org/10.1109/ICCS1.2017.8325974.

  26. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. Multimedia, IEEE 8(4):22–28. https://doi.org/10.1109/93.959097

    Article  Google Scholar 

  27. SteveBaker RCD (1984) Clarification of the use of Chi-square and likelihood functions in fits to histograms. Nucl Instrum Methods Phys Res 221(2):437–442. https://doi.org/10.1016/0167-5087(84)90016-4

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Roselinkiruba.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Roselinkiruba, R., Sharmila, T.S. Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm. Int. j. inf. tecnol. 13, 1797–1803 (2021). https://doi.org/10.1007/s41870-021-00774-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-021-00774-z

Keywords

Navigation