Skip to main content

An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herding Optimization

  • Chapter
  • First Online:

Abstract

IoT makes incorporated communication circumstances of interconnected devices and stages by drawing in both practical and substantial worlds simultaneously. The researchers of the study distinguished and examined the vital open difficulties in fortifying the security in IoT that combines encryption strategies to offer security to exchanged images between connected networks of the two parties. The device is primarily based on a hybrid algorithm that applies the strategies of encryption and optimization techniques are used. This proposed image safety model signcryption with elephant based optimization method used. The purpose of the use of optimization in encryption method is to pick the most advantageous keys in encryption algorithms, here Adaptive Elephant Herding Optimization (AEHO) used. This technique Signcryption is the technique that mixes the functionality of encryption and digital signature in a single logical step. From the implementation, the results are evaluated through the usage of the Peak Signal to Noise Ratio (PSNR) and Mean square errors (MSE).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhang W, Yu H, Zhu ZL (2018) An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Sig Process 151:130–143

    Article  Google Scholar 

  2. Mahmood AS, Rahim MSM (2018) Novel method for image security system based on improved SCAN method and pixel rotation technique. J Inf Secur Appl 42:57–70

    Google Scholar 

  3. Khizrai MSQ, Bodkhe ST (2014) Image encryption using different techniques for high security transmission over a network. Int J Eng Res Gen Sci 2(4):299–306

    Google Scholar 

  4. Al-Haj A, Abdel-Nabi H (2017) Digital image security based on data hiding and cryptography. In: 2017 3rd International Conference on Information Management (ICIM). IEEE, pp. 437–440

    Google Scholar 

  5. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput Syst

    Google Scholar 

  6. Rani P, Arora A (2015) Image security system using encryption and steganography. Int J Innov Res Sci, Eng Technol, 4(6):2249–0604

    Google Scholar 

  7. Iyer SC, Sedamkar RR, Gupta S (2016) A novel idea on multimedia encryption using hybrid crypto approach. Procedia Comput Sci 79:293–298

    Article  Google Scholar 

  8. Siregar R (2018) Performance analysis of AES-Blowfish hybrid algorithm for security of patient medical record data. J Phys: Conf Ser 1007(1):012018 IOP Publishing

    Google Scholar 

  9. Shaikh P, Kaul V (2014) Enhanced security algorithm using hybrid encryption and ECC. IOSR J Comput Eng (IOSR-JCE), 16(3):80–85

    Article  Google Scholar 

  10. Hassanien AE, Alamry E (2015) Swarm intelligence: principles, advances, and applications. CRC—Taylor & Francis Group. ISBN 9781498741064—CAT# K26721

    Google Scholar 

  11. Sharma S, Chopra V (2016) December. Analysis of AES encryption with ECC. In: Proceedings of international interdisciplinary conference on engineering science & management, ISBN: 9788193137383

    Google Scholar 

  12. Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J Circ Syst Comput 25(11):1650138

    Article  Google Scholar 

  13. Shankar K, Eswaran P (2015) Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput Sci 70:462–468

    Article  Google Scholar 

  14. Sathesh Kumar K, Shankar K, Ilayaraja M, Rajesh M (2017) Sensitive data security in cloud computing aid of different encryption techniques. J Adv Res Dyn Control Syst 9(18):2888–2899

    Google Scholar 

  15. Rajesh M, Kumar KS, Shankar K, Ilayaraja M, sensitive data security in cloud computing aid of different encryption techniques. J Adv Res Dyn Control Syst 18

    Google Scholar 

  16. Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu SK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42(11):208

    Article  Google Scholar 

  17. Karthikeyan K, Sunder R, Shankar K, Lakshmanaprabu SK, Vijayakumar V, Elhoseny M, Manogaran G (2018) Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC–BA). J Supercomput https://doi.org/10.1007/s11227-018-2583-3

  18. Shankar K, Eswaran P (2016) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. In: Artificial intelligence and evolutionary computations in engineering systems. Springer, New Delhi, pp 705–714

    Google Scholar 

  19. Shankar K, Eswaran P (2016) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th international conference on intelligent systems and control (ISCO). IEEE, pp 369–374

    Google Scholar 

  20. Shankar K, Eswaran P (2015) A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Aust J Basic Appl Sci 9(36):150–163

    Google Scholar 

  21. Shankar K, Eswaran P (2015) ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J Appl Eng Res 10(55):1841–1845

    Google Scholar 

  22. Raman PS, Shankar K, Ilayaraja M (2018) Securing cluster based routing against cooperative black hole attack in mobile ad hoc network. Int J Eng Technol, 7(9):6–9

    Google Scholar 

  23. Ramya Princess Mary I, Eswaran P, Shankar K (2018, Feb) Multi secret image sharing scheme based on DNA cryptography with XOR. Int J Pure Appl Math 118(7):393–398

    Google Scholar 

  24. Aminudin N, Maseleno A, Shankar K, Hemalatha S, Sathesh kumar K, Fauzi, RI, Muslihudin M (2018) Nur algorithm on data encryption and decryption. Int J Eng Technol 7(2.26):109–118

    Article  Google Scholar 

  25. Thakur S, Kumar Singh A, Ghrera SP, Elhoseny M (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6263-3

    Article  Google Scholar 

  26. Elhoseny M, Hosny A, Hassanien AE, Muhammad K, Sangaiah AK (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Trans Sustain Comput PP(99) https://doi.org/10.1109/tsusc.2017.2782737

  27. Elhoseny M, Yuan X, ElMinir HK, Riad AM (2016) An energy efficient encryption method for secure dynamic WSN. Secur Commun Netw, Wiley 9(13):2024–2031. https://doi.org/10.1002/sec.1459

    Article  Google Scholar 

  28. Elhoseny M, Elminir H, Riad A, Yuan X (2016) A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption. Journal of King Saud University—Computer and Information Sciences, Elsevier, 28(3):262–275. http://dx.doi.org/10.1016/j.jksuci.2015.11.001

    Article  Google Scholar 

  29. Elhoseny M, Yuan X, Yu Z, Mao C, El-Minir H, Riad A (2015) Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Commun Lett, IEEE 19(12):2194–2197. https://doi.org/10.1109/LCOMM.2014.2381226

    Article  Google Scholar 

  30. Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications 14(2):118–130

    Article  Google Scholar 

  31. Shankar K, Elhoseny M, Lakshmanaprabu SK, Ilayaraja M, Vidhyavathi RM, Alkhambashi M (2018) Optimal feature level fusion based ANFIS classifier for brain MRI image classification. Concurr Comput Pract Exper e4887. https://doi.org/10.1002/cpe.4887

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Shankar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shankar, K., Elhoseny, M., Perumal, E., Ilayaraja, M., Sathesh Kumar, K. (2019). An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herding Optimization. In: Hassanien, A., Elhoseny, M. (eds) Cybersecurity and Secure Information Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-16837-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-16837-7_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-16836-0

  • Online ISBN: 978-3-030-16837-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics