Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 0 , Issue 1 , PP: 26-36, 2019 | Cite this article as | XML | PDF | Full Length Article

Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security

Abdul Rahaman Wahab Sait 1 * , Irina Pustokhina 2 , M. Ilayaraja 3

  • 1 King Faisal University, Kingdom of Saudi Arabia - (asait@kfu.edu.sa )
  • 2 Plekhanov Russian University of Economics, Moscow, Russia - (ivpustokhina@yandex.ru)
  • 3 Department of Computer Science and Information Technology, Kalasalingam Academy of Research and Education, Krishnankoil, India - (ilayaraja.m@klu.ac.in)
  • Doi: https://doi.org/10.54216/JISIoT.000103

    Abstract

    Digital image security plays an essential role in the shared communication model. Encryption and decryption process is commonly applied to securely transmit the images in various real-time applications. In addition, the generation of encryption/decryption keys is also essential to achieve enhanced image security. This study presents a multiple share creation scheme with an optimal signcryption (MSS-OSC) technique for digital image security. The MSS-OSC technique primarily generates a set of various shares for every digital image that needs to be transmitted. In addition, the encryption of generated shares takes place via the optimal signcryption (OSC) technique. Moreover, genetic programming (GP) is employed to optimally choose the keys involved in the encryption and decryption process. The detailed experimental validation of the MSS-OSC technique is investigated using a set of benchmark test images. The results analysis demonstrated that the MSS-OSC technique had a superior performance by accomplishing maximum digital image security.

    Keywords :

    Digital image security, Signcryption, Share creation, Encryption, Optimal key generation, Genetic programming

    References

    [1]      Razzaq, M.A., Sheikh, R.A., Baig, A. and Ahmad, A., 2017. Digital image security: Fusion of encryption, steganography and watermarking. International Journal of Advanced Computer Science and Applications, 8(5), pp.224-228.

    [2]      Shankar, K. and Lakshmanaprabu, S.K., 2018. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(9), pp.22-27.

    [3]      Liu, Y., Tang, S., Liu, R., Zhang, L. and Ma, Z., 2018. Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Systems with Applications, 97, pp.95-105.

    [4]      Dorothy, A.B., Kumar, S.B.R. and Sharmila, J.J., 2017, February. IoT based home security through digital image processing algorithms. In 2017 World Congress on Computing and Communication Technologies (WCCCT) (pp. 20-23). IEEE.

    [5]      Loan, N.A., Hurrah, N.N., Parah, S.A., Lee, J.W., Sheikh, J.A. and Bhat, G.M., 2018. Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access, 6, pp.19876-19897.

    [6]      Ardy, R.D., Indriani, O.R., Sari, C.A. and Rachmawanto, E.H., 2017, November. Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5). In 2017 International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS) (pp. 87-92). IEEE.

    [7]      Mehran, N. and Khayyambashi, M.R., 2017. Performance evaluation of authentication-encryption and confidentiality block cipher modes of operation on digital image. International Journal of Computer Network and Information Security, 11(9), p.30.

    [8]      Avudaiappan, T., Balasubramanian, R., Pandiyan, S.S., Saravanan, M., Lakshmanaprabu, S.K. and Shankar, K., 2018. Medical image security using dual encryption with oppositional based optimization algorithm. Journal of medical systems, 42(11), pp.1-11.

    [9]      Kankonkar, J.T. and Naik, N., 2017, July. Image security using image encryption and image stitching. In 2017 International Conference on Computing Methodologies and Communication (ICCMC) (pp. 151-154). IEEE.

    [10]   Ilaga, K.R., Sari, C.A. and Rachmawanto, E.H., 2018. A high result for image security using crypto-stegano based on ECB mode and LSB encryption. Journal of Applied Intelligent System, 3(1), pp.28-38.

    [11]   Saranya, M.R., Mohan, A.K. and Anusudha, K., 2015, February. Algorithm for enhanced image security using DNA and genetic algorithm. In 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES) (pp. 1-5). IEEE.

    [12]   Rajput, S.K. and Nishchal, N.K., 2017. Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm. Optics Communications, 388, pp.38-46.

    [13]   Saranya, M.R., Mohan, A.K. and Anusudha, K., 2015, January. A hybrid algorithm for enhanced image security using chaos and DNA theory. In 2015 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-4). IEEE.

    [14]   Ramya, M.S., Soman, P.S. and Deepthi, L.R., 2017, September. A novel approach for image security using reversible watermarking. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 338-343). IEEE.

    [15]   Brar, S.S. and Brar, A., 2016. Double Layer Image Security System using Encryption and Steganography. International Journal of Computer Network & Information Security, 8(3).

    [16]   Forrester, P.L., Shimizu, U.K., Soriano‐Meier, H., Garza‐Reyes, J.A. and Basso, L.F.C., 2010. Lean production, market share and value creation in the agricultural machinery sector in Brazil. Journal of Manufacturing Technology Management.

    [17]   Li, F.G., Masaaki, S. and Tsuyoshi, T., 2008. Analysis and improvement of authenticatable ring signcryption scheme. Journal of Shanghai Jiaotong University (Science), 13(6), pp.679-683.

     

    [18]   Brameier, M. and Banzhaf, W., 2001. A comparison of linear genetic programming and neural networks in medical data mining. IEEE Transactions on Evolutionary Computation, 5(1), pp.17-26.

    Cite This Article As :
    Rahaman, Abdul. , Pustokhina, Irina. , Ilayaraja, M.. Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2019, pp. 26-36. DOI: https://doi.org/10.54216/JISIoT.000103
    Rahaman, A. Pustokhina, I. Ilayaraja, M. (2019). Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security. Journal of Intelligent Systems and Internet of Things, (), 26-36. DOI: https://doi.org/10.54216/JISIoT.000103
    Rahaman, Abdul. Pustokhina, Irina. Ilayaraja, M.. Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security. Journal of Intelligent Systems and Internet of Things , no. (2019): 26-36. DOI: https://doi.org/10.54216/JISIoT.000103
    Rahaman, A. , Pustokhina, I. , Ilayaraja, M. (2019) . Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security. Journal of Intelligent Systems and Internet of Things , () , 26-36 . DOI: https://doi.org/10.54216/JISIoT.000103
    Rahaman A. , Pustokhina I. , Ilayaraja M. [2019]. Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security. Journal of Intelligent Systems and Internet of Things. (): 26-36. DOI: https://doi.org/10.54216/JISIoT.000103
    Rahaman, A. Pustokhina, I. Ilayaraja, M. "Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 26-36, 2019. DOI: https://doi.org/10.54216/JISIoT.000103