An Optimal Teaching and Learning based Optimization with Multi-Key Homomorphic Encryption for Image Security

نویسندگان

چکیده

Due to the drastic rise in multimedia content, digital images have become a major carrier of data. Generally, are communicated or archived via wireless communication changes, and significance data security gets increased. In order accomplish security, encryption is an effective technique which used encrypt using secret keys such way that it not readable by hacker. this view, study focuses on design Teaching Learning based Optimization (TLBO) with Multi-Key Homomorphic Encryption (MHE) technique, called MHE-TLBO algorithm. The goal algorithm optimally select multiple TLBO for decryption processes. addition, has derived fitness function involving peak signal noise ratio (PSNR) thereby ensures superior quality reconstructed image. For validating performance algorithm, comprehensive result analysis made simulation results ensured betterment interms different aspects.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Homomorphic Encryption with CCA Security

We address the problem of constructing public-key encryption schemes that meaningfullycombine useful computability features with non-malleability. In particular, we investigate schemesin which anyone can change an encryption of an unknown message m into an encryption of T (m)(as a feature), for a specific set of allowed functions T , but the scheme is “non-malleable” withrespect...

متن کامل

Homomorphic Encryption with Chosen-Ciphertext Security

We address the problem of constructing public-key encryption schemes that meaningfullycombine useful computability features with non-malleability. In particular, we investigate schemesin which anyone can change an encryption of an unknown messagem into an encryption of T (m)(as a feature), for a specific set of allowed functions T , but the scheme is “non-malleable” withrespect ...

متن کامل

Privacy Preserving Multi-party Machine Learning with Homomorphic Encryption

Privacy preserving multi-party machine learning approaches enable multiple parties to train a machine learning model from aggregate data while ensuring the privacy of their individual datasets is preserved. In this paper, we propose a privacy preserving multi-party machine learning approach based on homomorphic encryption where the machine learning algorithm of choice is deep neural networks. W...

متن کامل

Ring-based Fully Homomorphic Encryption Key Management Schema for Multicast Security in Mobile Ad Hoc Networks

In Mobile Ad Hoc Networks (MANET), because of moveable nodes, congregation mobility and changing of infrastructure, given that protected communications is a huge challenge. Frequently cryptography methods have been proposed to solve this problem in MANET. In cryptographic techniques, asymmetric cryptography is extensively second-hand because of its factors like verification, reliability, and pr...

متن کامل

Limits of Provable Security for Homomorphic Encryption

We show that public-key bit encryption schemes which support weak (i.e., compact) homomorphic evaluation of any sufficiently “sensitive” collection of functions cannot be proved message indistinguishable beyond AM ∩ coAM via general (adaptive) reductions, and beyond statistical zero-knowledge via reductions of constant query complexity. Examples of sensitive collections include parities, majori...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of cybersecurity and information management

سال: 2021

ISSN: ['2690-6775', '2769-7851']

DOI: https://doi.org/10.54216/jcim.070203