Abstract
IoT makes incorporated communication circumstances of interconnected devices and stages by drawing in both practical and substantial worlds simultaneously. The researchers of the study distinguished and examined the vital open difficulties in fortifying the security in IoT that combines encryption strategies to offer security to exchanged images between connected networks of the two parties. The device is primarily based on a hybrid algorithm that applies the strategies of encryption and optimization techniques are used. This proposed image safety model signcryption with elephant based optimization method used. The purpose of the use of optimization in encryption method is to pick the most advantageous keys in encryption algorithms, here Adaptive Elephant Herding Optimization (AEHO) used. This technique Signcryption is the technique that mixes the functionality of encryption and digital signature in a single logical step. From the implementation, the results are evaluated through the usage of the Peak Signal to Noise Ratio (PSNR) and Mean square errors (MSE).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhang W, Yu H, Zhu ZL (2018) An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Sig Process 151:130–143
Mahmood AS, Rahim MSM (2018) Novel method for image security system based on improved SCAN method and pixel rotation technique. J Inf Secur Appl 42:57–70
Khizrai MSQ, Bodkhe ST (2014) Image encryption using different techniques for high security transmission over a network. Int J Eng Res Gen Sci 2(4):299–306
Al-Haj A, Abdel-Nabi H (2017) Digital image security based on data hiding and cryptography. In: 2017 3rd International Conference on Information Management (ICIM). IEEE, pp. 437–440
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput Syst
Rani P, Arora A (2015) Image security system using encryption and steganography. Int J Innov Res Sci, Eng Technol, 4(6):2249–0604
Iyer SC, Sedamkar RR, Gupta S (2016) A novel idea on multimedia encryption using hybrid crypto approach. Procedia Comput Sci 79:293–298
Siregar R (2018) Performance analysis of AES-Blowfish hybrid algorithm for security of patient medical record data. J Phys: Conf Ser 1007(1):012018 IOP Publishing
Shaikh P, Kaul V (2014) Enhanced security algorithm using hybrid encryption and ECC. IOSR J Comput Eng (IOSR-JCE), 16(3):80–85
Hassanien AE, Alamry E (2015) Swarm intelligence: principles, advances, and applications. CRC—Taylor & Francis Group. ISBN 9781498741064—CAT# K26721
Sharma S, Chopra V (2016) December. Analysis of AES encryption with ECC. In: Proceedings of international interdisciplinary conference on engineering science & management, ISBN: 9788193137383
Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circ Syst Comput 25(11):1650138
Shankar K, Eswaran P (2015) Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput Sci 70:462–468
Sathesh Kumar K, Shankar K, Ilayaraja M, Rajesh M (2017) Sensitive data security in cloud computing aid of different encryption techniques. J Adv Res Dyn Control Syst 9(18):2888–2899
Rajesh M, Kumar KS, Shankar K, Ilayaraja M, sensitive data security in cloud computing aid of different encryption techniques. J Adv Res Dyn Control Syst 18
Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):208
Karthikeyan K, Sunder R, Shankar K, Lakshmanaprabu SK, Vijayakumar V, Elhoseny M, Manogaran G (2018) Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC–BA). J Supercomput https://doi.org/10.1007/s11227-018-2583-3
Shankar K, Eswaran P (2016) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. In: Artificial intelligence and evolutionary computations in engineering systems. Springer, New Delhi, pp 705–714
Shankar K, Eswaran P (2016) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th international conference on intelligent systems and control (ISCO). IEEE, pp 369–374
Shankar K, Eswaran P (2015) A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Aust J Basic Appl Sci 9(36):150–163
Shankar K, Eswaran P (2015) ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J Appl Eng Res 10(55):1841–1845
Raman PS, Shankar K, Ilayaraja M (2018) Securing cluster based routing against cooperative black hole attack in mobile ad hoc network. Int J Eng Technol, 7(9):6–9
Ramya Princess Mary I, Eswaran P, Shankar K (2018, Feb) Multi secret image sharing scheme based on DNA cryptography with XOR. Int J Pure Appl Math 118(7):393–398
Aminudin N, Maseleno A, Shankar K, Hemalatha S, Sathesh kumar K, Fauzi, RI, Muslihudin M (2018) Nur algorithm on data encryption and decryption. Int J Eng Technol 7(2.26):109–118
Thakur S, Kumar Singh A, Ghrera SP, Elhoseny M (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6263-3
Elhoseny M, Hosny A, Hassanien AE, Muhammad K, Sangaiah AK (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Trans Sustain Comput PP(99) https://doi.org/10.1109/tsusc.2017.2782737
Elhoseny M, Yuan X, ElMinir HK, Riad AM (2016) An energy efficient encryption method for secure dynamic WSN. Secur Commun Netw, Wiley 9(13):2024–2031. https://doi.org/10.1002/sec.1459
Elhoseny M, Elminir H, Riad A, Yuan X (2016) A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption. Journal of King Saud University—Computer and Information Sciences, Elsevier, 28(3):262–275. http://dx.doi.org/10.1016/j.jksuci.2015.11.001
Elhoseny M, Yuan X, Yu Z, Mao C, El-Minir H, Riad A (2015) Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Commun Lett, IEEE 19(12):2194–2197. https://doi.org/10.1109/LCOMM.2014.2381226
Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications 14(2):118–130
Shankar K, Elhoseny M, Lakshmanaprabu SK, Ilayaraja M, Vidhyavathi RM, Alkhambashi M (2018) Optimal feature level fusion based ANFIS classifier for brain MRI image classification. Concurr Comput Pract Exper e4887. https://doi.org/10.1002/cpe.4887
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Shankar, K., Elhoseny, M., Perumal, E., Ilayaraja, M., Sathesh Kumar, K. (2019). An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herding Optimization. In: Hassanien, A., Elhoseny, M. (eds) Cybersecurity and Secure Information Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-16837-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-16837-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16836-0
Online ISBN: 978-3-030-16837-7
eBook Packages: Computer ScienceComputer Science (R0)