Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Kalaiarasan, D.a; * | Ahilan, A.b | Ramalingam, S.c
Affiliations: [a] Department of ECE, Government College of Engineering, Srirangam, Tamilnadu, India | [b] Department of Electronics and Communication Engineering, PSN College of Engineering and Technology, Tirunelveli | [c] Department of ECE, Centre for Advances in Signal Processing and Sensor Networks, Sri Eshwar College of Engineering, Coimbatore, Tamilnadu, India
Correspondence: [*] Corresponding author. D. Kalaiarasan, Assistant professor, Department of ECE, Government College of Engineering, Srirangam, Tamilnadu, India. E-mail: kalaiarasand@gces.edu.in.
Abstract: Image security plays a vital role in communication networks. Despite advancements in encryption, securing protective image data remains a computationally challenging problem, requiring the use of a secure environment to secure data transmitted from the device through the network. Encryption is essential for safeguarding essential data against unauthorized access or malfunction, especially for images. The contribution of the proposed model is to provide an analytical hybrid Harris Hawk Optimization (HHO) with a chaotic map approach which can be used to improve the overall performance of standard encryption techniques in image-based encrypted communication. Previously, the algorithm computes numerous chaotic Logistic map and an encrypted images, where the pending plain image calculates the session key for the map’s input parameters. Afterwards, encrypted images are presented as hawks and made to work well with HHO. The optimized ciphered image is expressed as a fitness function using correlation coefficients related to nearby pixels. When compared to existing algorithms, the proposed NPCR (99%), UACI (33%), and entropy (7.97) demonstrate superior performance. The proposed hybrid approach outperforms traditional algorithms in terms of security while preserving image quality.
Keywords: Harris Hawk Optimization, image security, multimedia, chaotic map, cryptography
DOI: 10.3233/JIFS-213337
Journal: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 11035-11057, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl