Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm
نویسندگان
چکیده
منابع مشابه
Locating and Offering Optimal Price Distributed Generation Resources to Increase Profit Using Ant Lion Optimization Algorithm
Distribution of distributed generation resources in distribution systems has several advantages, including reducing losses, improving voltage profiles, reducing pollution, and increasing system reliability. However, one of the most important points regarding the placement of these resources in distribution networks is economic issues and the return on investment and the increase in profits from...
متن کاملColor Image Enhancement Based on Ant Colony Optimization Algorithm
In the collection, transmission, decoding process, the images are likely to produce noise. Noise makes the image color distorted and the articulation dropped, and also affects the image quality. Due to different causes, there are different types of noise, and the impulse noise is most common among them which exert great influence on the image quality. This paper, according to the characteristic...
متن کاملStream cipher for binary image encryption using Ant Colony Optimization based key generation
Encryption of binary images is essential since it is vulnerable to eavesdropping in wired and wireless networks. The security of data becomes important since the communications over open network occur frequently. This paper focuses on encryption of binary image using a stream cipher method. In this paper we propose an Ant Colony Optimization (ACO) based approach of generating keys for encryptio...
متن کاملStream Cipher for Image Encryption Using Ant Colony Optimization Based Key Generation
This chapter deals with a stream cipher method for encrypting images. As digital devices such as scanners and digital cameras become more and more available and mass storage media for digital data become more affordable, the use of digital images in practical applications are becoming more widespread. The wired and wireless IP networks are vulnerable to eavesdropping making essential the data t...
متن کاملImproved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme
Abstract. At EUROCRYPT 2011, Gentry and Halevi implemented a variant of Gentry’s fully homomorphic encryption scheme. The core part in their key generation is to generate an odd-determinant ideal lattice having a particular type of Hermite Normal Form. However, they did not give a rigorous proof for the correctness. We present a better key generation algorithm, improving their algorithm from tw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2018
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i1.9.9729