[go: up one dir, main page]

Skip to main content

Modified Elephant Herd Optimization-Based Advanced Encryption Standard

  • Conference paper
  • First Online:
Intelligent Data Engineering and Analytics (FICTA 2023)

Abstract

Cryptography is commonly employed to ensure secure data transfer via unsecure communication networks. With the rising need for picture transmission confidentiality and privacy, an efficient encryption approach becomes vital. The architectural flow of the newly created technique is implied in the proposal. Based on Cryptographic Method for Digital Picture Security, the design of an efficient Modified Elephant Herd Optimization-based Advanced Encryption Standard (MEHO-AES) is presented. The suggested MEHO-AES approach employs multilevel discrete Cosine transform (DCT) for image decomposition, with the input picture divided into RGB components for examining the fundamental colors of all image sections. Moreover, the AES encryption technology is used throughout the encryption procedure. Additionally, the MEHO method is used to determine the best encryption keys.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhao, C., Zhao, S., Zhao, M., Chen, Z., Gao, C.Z., Li, H., Tan, Y.A.: Secure multi-party computation: theory, practice and applications. Inf. Sci. 476, 357–372 (2019)

    Article  Google Scholar 

  2. Hakamin, Z.U., Mary, P., Kirshnakanth, K.K.: Lossless and reversible data hiding in encrypted images with public key cryptography. Int. J. Human Comput. Intell. 1(1), 13–17 (2022)

    Google Scholar 

  3. Tayal, S., Gupta, N., Gupta, P., Goyal, D., Goyal, M.: A review paper on network security and cryptography. Adv. Comput. Sci. Technol. 10(5), 763–770 (2017)

    Google Scholar 

  4. Anusha, R., Shankari, N., Shetty, V.S., Bhat, S.: Analysis and comparison of symmetric key cryptographic algorithms on FPGA. In: 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 293–300. IEEE (2022)

    Google Scholar 

  5. Jyothi, V.E., Prasad, B.D.C.N., Mojjada, R.K.: Analysis of cryptography encryption for network security. In: IOP Conference Series: Materials Science and Engineering, vol. 981, pp. 022028. IOP Publishing (2020)

    Google Scholar 

  6. Hebbar, P., Hegde, P., Nayak, S., Kerni, S., Rajgopal, K.T.: Study and performance evaluation of different symmetric key cryptography technique for encryption. Int. Res. J. Eng. Technol. (IRJET) 6(5), 1151–1154 (2019)

    Google Scholar 

  7. Arpaia, P., Bonavolonta, F., Cioffi, A.: Problems of the advanced encryption standard in protecting Internet of Things sensor networks. Measurement 161, 107853 (2020)

    Article  Google Scholar 

  8. Chhabra, S., Lata, K.: Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications. Concurr. Comput. Pract. Exp. 34(21), e7058 (2022)

    Article  Google Scholar 

  9. Mulya, M., Arsalan, O., Alhaura, L., Wijaya, R., Ramadhan, A.S., Yeremia, C.: Text steganography on digital video using discrete wavelet transform and cryptographic advanced encryption standard algorithm. In: Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019), pp. 141–145. Atlantis Press (2019)

    Google Scholar 

  10. Rahman, Z., Yi, X., Billah, M., Sumi, M., Anwar, A.: Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home. Electronics 11(7), 1083 (2022)

    Article  Google Scholar 

  11. El-Shafai, W., Almomani, I., Ara, A., Alkhayer, A.: An optical-based encryption and authentication algorithm for color and grayscale medical images. Multimed. Tools Appl. 82, 23735–23770 (2022)

    Google Scholar 

  12. Zhou, K., Fan, J., Fan, H., Li, M.: Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt. Laser Technol. 121, 105769 (2022)

    Article  Google Scholar 

  13. Chai, X., Bi, J., Gan, Z., Liu, X., Zhang, Y., Chen, Y.: Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process. 176, 107684 (2020)

    Article  Google Scholar 

  14. Rani, N., Sharma, S.R., Mishra, V.: Grayscale and colored image encryption model using a novel fused magic cube. Nonlinear Dyn. 108(2), 1773–1796 (2022)

    Article  Google Scholar 

  15. Zhao, J., Zhang, T., Jiang, J., Fang, T., Ma, H.: Color image encryption scheme based on alternate quantum walk and controlled Rubik’s Cube. Sci. Rep. 12(1), 14253 (2022)

    Article  Google Scholar 

  16. Liu, G., Li, W., Fan, X., Li, Z., Wang, Y., Ma, H.: An image encryption algorithm based on discrete-time alternating quantum walk and advanced encryption standard. Entropy 24(5), 608 (2022)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the reviewers for all of their careful, constructive, and insightful comments in relation to this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Surendiran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Surendiran, R. et al. (2023). Modified Elephant Herd Optimization-Based Advanced Encryption Standard. In: Bhateja, V., Carroll, F., Tavares, J.M.R.S., Sengar, S.S., Peer, P. (eds) Intelligent Data Engineering and Analytics. FICTA 2023. Smart Innovation, Systems and Technologies, vol 371. Springer, Singapore. https://doi.org/10.1007/978-981-99-6706-3_46

Download citation

Publish with us

Policies and ethics