ASPG Menu
search

American Scientific Publishing Group

verified Journal

Journal of Intelligent Systems and Internet of Things

ISSN
Online: 2690-6791 Print: 2769-786X
Frequency

Continuous publication

Publication Model

Open access · Articles freely available online · APC applies after acceptance

Journal of Intelligent Systems and Internet of Things
Full Length Article

Volume 0Issue 1PP: 26-36 • 2019

Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security

Abdul Rahaman Wahab Sait 1* ,
Irina Pustokhina 2 ,
M. Ilayaraja 3
1King Faisal University, Kingdom of Saudi Arabia
2Plekhanov Russian University of Economics, Moscow, Russia
3Department of Computer Science and Information Technology, Kalasalingam Academy of Research and Education, Krishnankoil, India
* Corresponding Author.

Abstract

Digital image security plays an essential role in the shared communication model. Encryption and decryption process is commonly applied to securely transmit the images in various real-time applications. In addition, the generation of encryption/decryption keys is also essential to achieve enhanced image security. This study presents a multiple share creation scheme with an optimal signcryption (MSS-OSC) technique for digital image security. The MSS-OSC technique primarily generates a set of various shares for every digital image that needs to be transmitted. In addition, the encryption of generated shares takes place via the optimal signcryption (OSC) technique. Moreover, genetic programming (GP) is employed to optimally choose the keys involved in the encryption and decryption process. The detailed experimental validation of the MSS-OSC technique is investigated using a set of benchmark test images. The results analysis demonstrated that the MSS-OSC technique had a superior performance by accomplishing maximum digital image security.

Keywords

Digital image security Signcryption Share creation Encryption Optimal key generation Genetic programming

References

[1]      Razzaq, M.A., Sheikh, R.A., Baig, A. and Ahmad, A., 2017. Digital image security: Fusion of encryption, steganography and watermarking. International Journal of Advanced Computer Science and Applications, 8(5), pp.224-228.

[2]      Shankar, K. and Lakshmanaprabu, S.K., 2018. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(9), pp.22-27.

[3]      Liu, Y., Tang, S., Liu, R., Zhang, L. and Ma, Z., 2018. Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Systems with Applications, 97, pp.95-105.

[4]      Dorothy, A.B., Kumar, S.B.R. and Sharmila, J.J., 2017, February. IoT based home security through digital image processing algorithms. In 2017 World Congress on Computing and Communication Technologies (WCCCT) (pp. 20-23). IEEE.

[5]      Loan, N.A., Hurrah, N.N., Parah, S.A., Lee, J.W., Sheikh, J.A. and Bhat, G.M., 2018. Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access, 6, pp.19876-19897.

[6]      Ardy, R.D., Indriani, O.R., Sari, C.A. and Rachmawanto, E.H., 2017, November. Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5). In 2017 International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS) (pp. 87-92). IEEE.

[7]      Mehran, N. and Khayyambashi, M.R., 2017. Performance evaluation of authentication-encryption and confidentiality block cipher modes of operation on digital image. International Journal of Computer Network and Information Security, 11(9), p.30.

[8]      Avudaiappan, T., Balasubramanian, R., Pandiyan, S.S., Saravanan, M., Lakshmanaprabu, S.K. and Shankar, K., 2018. Medical image security using dual encryption with oppositional based optimization algorithm. Journal of medical systems, 42(11), pp.1-11.

[9]      Kankonkar, J.T. and Naik, N., 2017, July. Image security using image encryption and image stitching. In 2017 International Conference on Computing Methodologies and Communication (ICCMC) (pp. 151-154). IEEE.

[10]   Ilaga, K.R., Sari, C.A. and Rachmawanto, E.H., 2018. A high result for image security using crypto-stegano based on ECB mode and LSB encryption. Journal of Applied Intelligent System, 3(1), pp.28-38.

[11]   Saranya, M.R., Mohan, A.K. and Anusudha, K., 2015, February. Algorithm for enhanced image security using DNA and genetic algorithm. In 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES) (pp. 1-5). IEEE.

[12]   Rajput, S.K. and Nishchal, N.K., 2017. Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm. Optics Communications, 388, pp.38-46.

[13]   Saranya, M.R., Mohan, A.K. and Anusudha, K., 2015, January. A hybrid algorithm for enhanced image security using chaos and DNA theory. In 2015 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-4). IEEE.

[14]   Ramya, M.S., Soman, P.S. and Deepthi, L.R., 2017, September. A novel approach for image security using reversible watermarking. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 338-343). IEEE.

[15]   Brar, S.S. and Brar, A., 2016. Double Layer Image Security System using Encryption and Steganography. International Journal of Computer Network & Information Security, 8(3).

[16]   Forrester, P.L., Shimizu, U.K., Soriano‐Meier, H., Garza‐Reyes, J.A. and Basso, L.F.C., 2010. Lean production, market share and value creation in the agricultural machinery sector in Brazil. Journal of Manufacturing Technology Management.

[17]   Li, F.G., Masaaki, S. and Tsuyoshi, T., 2008. Analysis and improvement of authenticatable ring signcryption scheme. Journal of Shanghai Jiaotong University (Science), 13(6), pp.679-683.

 

[18]   Brameier, M. and Banzhaf, W., 2001. A comparison of linear genetic programming and neural networks in medical data mining. IEEE Transactions on Evolutionary Computation, 5(1), pp.17-26.

Cite This Article

Choose your preferred format

format_quote
Sait, Abdul Rahaman Wahab, Pustokhina, Irina, Ilayaraja, M.. "Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security." Journal of Intelligent Systems and Internet of Things, vol. Volume 0, no. Issue 1, 2019, pp. 26-36. DOI: https://doi.org/10.54216/JISIoT.000103
Sait, A., Pustokhina, I., Ilayaraja, M. (2019). Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security. Journal of Intelligent Systems and Internet of Things, Volume 0(Issue 1), 26-36. DOI: https://doi.org/10.54216/JISIoT.000103
Sait, Abdul Rahaman Wahab, Pustokhina, Irina, Ilayaraja, M.. "Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security." Journal of Intelligent Systems and Internet of Things Volume 0, no. Issue 1 (2019): 26-36. DOI: https://doi.org/10.54216/JISIoT.000103
Sait, A., Pustokhina, I., Ilayaraja, M. (2019) 'Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security', Journal of Intelligent Systems and Internet of Things, Volume 0(Issue 1), pp. 26-36. DOI: https://doi.org/10.54216/JISIoT.000103
Sait A, Pustokhina I, Ilayaraja M. Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security. Journal of Intelligent Systems and Internet of Things. 2019;Volume 0(Issue 1):26-36. DOI: https://doi.org/10.54216/JISIoT.000103
A. Sait, I. Pustokhina, M. Ilayaraja, "Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security," Journal of Intelligent Systems and Internet of Things, vol. Volume 0, no. Issue 1, pp. 26-36, 2019. DOI: https://doi.org/10.54216/JISIoT.000103
Digital Archive Ready