Adaptive firefly algorithm based optimized key generation for image security

被引:2
|
作者
Sinha, Rupesh Kumar [1 ]
Sahu, Sitanshu Sekhar [1 ]
机构
[1] BIT Mesra, Ranchi, Jharkhand, India
关键词
Encrypted image; DWT; Chebyshev polynomial; optimized secret key; Adaptive firefly (FF) optimization algorithm; DIFFUSION;
D O I
10.3233/JIFS-169998
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cryptography is the most peculiar way to secure data and most of the encryption algorithms are mainly used for textual data and not suitable for transmission data such as images. It is seen that the generation of secure key in Image cryptography has been a challenging task in the way of providing secured key generation for the transmitted data. In order to aid secured key generation in this context, an optimized secret key generation based on Chebyshev polynomial with Adaptive Firefly (FF) optimization technique is proposed. The optimized key is utilized with process of shuffling, diffusion, and swapping to get a better encrypted image. At the receiver end, reverse process is applied with optimized key to retrieve the original input image. The efficiency of our proposed method is assessed by the exhaustive experimental study. The results show that the proposed methodology provided correlation coefficient of 0.21, Number of Pixels Change Rate (NPCR) of 0.996, Unified Average Changing Intensity (UACI) of 0.3346 and Information Entropy of 7.995 as compared with the existing methods.
引用
收藏
页码:4437 / 4447
页数:11
相关论文
共 50 条
  • [21] Optimized deployment of a radar network based on an improved firefly algorithm
    Xue-jun Zhang
    Wei Jia
    Xiang-min Guan
    Guo-qiang Xu
    Jun Chen
    Yan-bo Zhu
    Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 425 - 437
  • [22] Multilevel Image Segmentation Based on an Improved Firefly Algorithm
    Chen, Kai
    Zhou, Yifan
    Zhang, Zhisheng
    Dai, Min
    Chao, Yuan
    Shi, Jinfei
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [23] Multilevel image thresholding selection based on the firefly algorithm
    Horng, Ming-Huwi
    Jiang, Ting-Wei
    ICIC Express Letters, 2011, 5 (02): : 557 - 562
  • [24] Scramble-Based Secret Key Generation Algorithm in Physical Layer Security
    Wang, Dan
    Chen, Feng
    Chen, Yongtai
    Zheng, Mingjie
    Zheng, Jingui
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [25] Security Analysis of an RSA Key Generation Algorithm with a Large Private Key
    Kong, Fanyu
    Yu, Jia
    Wu, Lei
    INFORMATION SECURITY, 2011, 7001 : 95 - +
  • [26] Wind power generation prediction using LSTM model optimized by sparrow search algorithm and firefly algorithm
    Wenjing Zhang
    Hongjing Yan
    Lili Xiang
    Linling Shao
    Energy Informatics, 8 (1)
  • [27] qFA: An Optimized Based-Tracking Approach Using Firefly Algorithm
    Varela, Victor P. L.
    Oliveira, Arthur
    Rodrigues, Paulo S.
    Horvath, Miller
    2018 7TH BRAZILIAN CONFERENCE ON INTELLIGENT SYSTEMS (BRACIS), 2018, : 302 - 306
  • [28] Optimized Firefly Algorithm Based on Levy Flight and Gaussian Inertial Weight
    Tang Hongyi
    Xu Wu
    Chen Yingjun
    Yang Haodong
    THIRTEENTH INTERNATIONAL CONFERENCE ON GRAPHICS AND IMAGE PROCESSING (ICGIP 2021), 2022, 12083
  • [29] Self-adaptive memetic firefly algorithm and CatBoost-based security framework for IoT healthcare environment
    Dash, Pandit Byomokesha
    Senapati, Manas Ranjan
    Behera, H. S.
    Nayak, Janmenjoy
    Vimal, S.
    JOURNAL OF ENGINEERING MATHEMATICS, 2024, 144 (01)
  • [30] Self-adaptive memetic firefly algorithm and CatBoost-based security framework for IoT healthcare environment
    Pandit Byomokesha Dash
    Manas Ranjan Senapati
    H. S. Behera
    Janmenjoy Nayak
    S. Vimal
    Journal of Engineering Mathematics, 2024, 144