An Optimal Teaching and Learning based Optimization with Multi-Key Homomorphic Encryption for Image Security
نویسندگان
چکیده
Due to the drastic rise in multimedia content, digital images have become a major carrier of data. Generally, are communicated or archived via wireless communication changes, and significance data security gets increased. In order accomplish security, encryption is an effective technique which used encrypt using secret keys such way that it not readable by hacker. this view, study focuses on design Teaching Learning based Optimization (TLBO) with Multi-Key Homomorphic Encryption (MHE) technique, called MHE-TLBO algorithm. The goal algorithm optimally select multiple TLBO for decryption processes. addition, has derived fitness function involving peak signal noise ratio (PSNR) thereby ensures superior quality reconstructed image. For validating performance algorithm, comprehensive result analysis made simulation results ensured betterment interms different aspects.
منابع مشابه
Homomorphic Encryption with CCA Security
We address the problem of constructing public-key encryption schemes that meaningfullycombine useful computability features with non-malleability. In particular, we investigate schemesin which anyone can change an encryption of an unknown message m into an encryption of T (m)(as a feature), for a specific set of allowed functions T , but the scheme is “non-malleable” withrespect...
متن کاملHomomorphic Encryption with Chosen-Ciphertext Security
We address the problem of constructing public-key encryption schemes that meaningfullycombine useful computability features with non-malleability. In particular, we investigate schemesin which anyone can change an encryption of an unknown messagem into an encryption of T (m)(as a feature), for a specific set of allowed functions T , but the scheme is “non-malleable” withrespect ...
متن کاملPrivacy Preserving Multi-party Machine Learning with Homomorphic Encryption
Privacy preserving multi-party machine learning approaches enable multiple parties to train a machine learning model from aggregate data while ensuring the privacy of their individual datasets is preserved. In this paper, we propose a privacy preserving multi-party machine learning approach based on homomorphic encryption where the machine learning algorithm of choice is deep neural networks. W...
متن کاملRing-based Fully Homomorphic Encryption Key Management Schema for Multicast Security in Mobile Ad Hoc Networks
In Mobile Ad Hoc Networks (MANET), because of moveable nodes, congregation mobility and changing of infrastructure, given that protected communications is a huge challenge. Frequently cryptography methods have been proposed to solve this problem in MANET. In cryptographic techniques, asymmetric cryptography is extensively second-hand because of its factors like verification, reliability, and pr...
متن کاملLimits of Provable Security for Homomorphic Encryption
We show that public-key bit encryption schemes which support weak (i.e., compact) homomorphic evaluation of any sufficiently “sensitive” collection of functions cannot be proved message indistinguishable beyond AM ∩ coAM via general (adaptive) reductions, and beyond statistical zero-knowledge via reductions of constant query complexity. Examples of sensitive collections include parities, majori...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of cybersecurity and information management
سال: 2021
ISSN: ['2690-6775', '2769-7851']
DOI: https://doi.org/10.54216/jcim.070203