Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment
Abstract
:1. Introduction
2. Related Works
3. The Proposed Model
3.1. Singular Value Decomposition
3.2. Optimal Pixel Selection Using COA
3.3. Secret Image Encryption Using MKHE Technique
- Setup: MKHE. . Proceeds the secured parameter as input and returned the public parameterization. It can be considered that every other technique implicitly gets as input.
- Key Generation: MKHE. . Resultants a pair of confidential and public keys.
- Encryption: <KHE.. Encrypting a plaintext and resultants a cipher-text
- Decryption: MKHE. . To provide a cipher-text with equivalent order of confidential keys, outcomes a plaintext
3.4. Key Generation Using PRO Algorithm
- Solution encoding
- Initial population
- Fitness Function
- Generating new solutions
4. Experimental Validation
4.1. Implementation Data
4.2. Discussion
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Dudeja, R.K.; Bali, R.S.; Aujla, G.S. Internet of Everything: Background and Challenges. In Software Defined Internet of Everything; Springer: Cham, Switzerland, 2022; pp. 3–12. [Google Scholar]
- Lu, H.; Su, S.; Tian, Z.; Zhu, C. A novel search engine for Internet of Everything based on dynamic prediction. China Commun. 2019, 16, 42–52. [Google Scholar]
- Juneja, S.; Gahlan, M.; Dhiman, G.; Kautish, S. Futuristic cyber-twin architecture for 6G technology to support internet of everything. Sci. Program. 2021, 2021, 9101782. [Google Scholar] [CrossRef]
- Petrescu, M.; Krishen, A.; Bui, M. The internet of everything: Implications of marketing analytics from a consumer policy perspective. J. Consum. Mark. 2020, 37, 675–686. [Google Scholar] [CrossRef]
- Sajid, M.; Harris, A.; Habib, S. Internet of Everything: Applications, and Security Challenges. In Proceedings of the 2021 International Conference on Innovative Computing (ICIC), Lahore, Pakistan, 9–10 November 2021; pp. 1–9. [Google Scholar]
- Padhi, P.; Charrua-Santos, F. 6G Enabled Industrial Internet of Everything: Towards a Theoretical Framework. Appl. Syst. Innov. 2021, 4, 11. [Google Scholar] [CrossRef]
- Wang, M.; Zhou, Z.; Ding, C. Blockchain-Based Decentralized Reputation Management System for Internet of Everything in 6G-Enabled Cybertwin Architecture. J. New Media 2021, 3, 137–150. [Google Scholar] [CrossRef]
- Sadi, M. Homomorphic encryption. In Emerging Topics in Hardware Security; Springer: Cham, Switzerland, 2021; pp. 281–307. [Google Scholar]
- Zhang, Z.; Cao, S.; Yang, X.; Liu, X.; Han, L. An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments. Peer-to-Peer Netw. Appl. 2021, 14, 3488–3501. [Google Scholar] [CrossRef]
- Srivastava, V.; Debnath, S.K.; Stǎnicǎ, P.; Pal, S.K. A multivariate identity-based broadcast encryption with applications to the internet of things. Adv. Math. Commun. 2021. [Google Scholar] [CrossRef]
- Pant, S.; Sharma, M.; Sharma, D.K.; Gupta, D.; Rodrigues, J.J.P.C. Enforcing Intelligent Learning-Based Security in the Internet of Everything. IEEE Internet Things J. 2021, 1. [Google Scholar] [CrossRef]
- Karthiban, M.K.; Raj, J.S. Big data analytics for developing secure internet of everything. J. ISMAC 2019, 1, 129–136. [Google Scholar]
- Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E.; Puthal, D. PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). IEEE Consum. Electron. Mag. 2020, 9, 8–16. [Google Scholar] [CrossRef] [Green Version]
- Miao, Y.; Liu, X.; Choo, K.-K.R.; Deng, R.H.; Wu, H.; Li, H. Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything. IEEE Internet Things J. 2019, 6, 7201–7212. [Google Scholar] [CrossRef]
- Singh, P.; Nayyar, A.; Kaur, A.; Ghosh, U. Blockchain and Fog Based Architecture for Internet of Everything in Smart Cities. Futur. Internet 2020, 12, 61. [Google Scholar] [CrossRef] [Green Version]
- Li, Z.; Tian, Y.; Zhang, W.; Liao, Q.; Liu, Y.; Du, X.; Guizani, M. RR-LADP: A Privacy-Enhanced Federated Learning Scheme for Internet of Everything. IEEE Consum. Electron. Mag. 2021, 10, 93–101. [Google Scholar] [CrossRef]
- Mohammed Abdelkader, E.; Moselhi, O.; Marzouk, M.; Zayed, T. HybridElman neural network and an invasive weed optimization method for bridge defect recognition. Transp. Res. Rec. 2021, 2675, 167–199. [Google Scholar] [CrossRef]
- Rezk, H.; Fathy, A.; Aly, M. A robust photovoltaic array reconfiguration strategy based on coyote optimization algorithm for enhancing the extracted power under partial shadow condition. Energy Rep. 2021, 7, 109–124. [Google Scholar] [CrossRef]
- Chen, H.; Dai, W.; Kim, M.; Song, Y. Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference. In In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 395–412. [Google Scholar]
- Moosavi, S.H.S.; Bardsiri, V.K. Poor and rich optimization algorithm: A new human-based and multi populations algorithm. Eng. Appl. Artif. Intell. 2019, 86, 165–181. [Google Scholar] [CrossRef]
Images | MSE | RMSE | ||||
---|---|---|---|---|---|---|
OMKHES-MS | WOA-EBS | GWO-EBS | OMKHES-MS | WOA-EBS | GWO-EBS | |
Barbara | 0.2715 | 0.2840 | 0.5407 | 0.5211 | 0.5329 | 0.7353 |
Boat | 0.3146 | 0.3447 | 0.8515 | 0.5609 | 0.5871 | 0.9228 |
Foreman | 0.1703 | 0.1913 | 0.2732 | 0.4127 | 0.4374 | 0.5227 |
House | 0.0595 | 0.0739 | 0.3037 | 0.2438 | 0.2718 | 0.5511 |
Isabe | 0.3134 | 0.3478 | 0.6824 | 0.5598 | 0.5897 | 0.8261 |
Peppers | 0.1937 | 0.2262 | 0.3053 | 0.4401 | 0.4756 | 0.5525 |
Images | Structural Content | Peak Signal Noise Ratio | ||||
---|---|---|---|---|---|---|
OMKHES-MS | WOA-EBS | GWO-EBS | OMKHES-MS | WOA-EBS | GWO-EBS | |
Barbara | 0.9986 | 0.9984 | 0.9984 | 59.4556 | 59.0647 | 53.4721 |
Boat | 0.9991 | 0.9990 | 0.9989 | 58.1759 | 57.3818 | 49.5272 |
Foreman | 0.9991 | 0.9990 | 0.9990 | 63.5057 | 62.4948 | 59.3999 |
House | 0.9986 | 0.9984 | 0.9984 | 72.6470 | 70.7592 | 58.4823 |
Isabe | 0.9986 | 0.9984 | 0.9985 | 58.2083 | 57.3049 | 51.4495 |
Peppers | 0.9987 | 0.9984 | 0.9985 | 62.3885 | 61.0412 | 58.4367 |
Images | Average Difference | Maximum Difference | ||||
---|---|---|---|---|---|---|
OMKHES-MS | WOA-EBS | GWO-EBS | OMKHES-MS | WOA-EBS | GWO-EBS | |
Barbara | 0.0053 | 0.0066 | 0.0067 | 45.4132 | 47.2942 | 46.6040 |
Boat | 0.0184 | 0.0194 | 0.0195 | 44.7870 | 46.8104 | 45.9838 |
Foreman | 0.0282 | 0.0296 | 0.0296 | 53.5160 | 54.9844 | 54.8858 |
House | 0.0009 | 0.0020 | 0.0022 | 53.1631 | 54.6097 | 54.3963 |
Isabe | 0.0008 | 0.0018 | 0.0017 | 43.8986 | 46.3907 | 45.2574 |
Peppers | 0.0005 | 0.0007 | 0.0008 | 47.0321 | 48.3379 | 49.8736 |
Images | Normalized Cross-Correlation | Normalized Absolute Error | ||||
---|---|---|---|---|---|---|
OMKHES-MS | WOA-EBS | GWO-EBS | OMKHES-MS | WOA-EBS | GWO-EBS | |
Barbara | 0.9985 | 0.9897 | 0.9905 | 0.0002 | 0.0016 | 0.0017 |
Boat | 0.9980 | 0.9899 | 0.9899 | 0.0002 | 0.0010 | 0.0013 |
Foreman | 0.9987 | 0.9910 | 0.9896 | 0.0001 | 0.0011 | 0.0013 |
House | 0.9985 | 0.9906 | 0.9900 | 0.0010 | 0.0017 | 0.0023 |
Isabe | 0.9994 | 0.9904 | 0.9907 | 0.0004 | 0.0014 | 0.0016 |
Peppers | 0.9998 | 0.9918 | 0.9903 | 0.0008 | 0.0017 | 0.0020 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Abunadi, I.; Abdullah Mengash, H.; S. Alotaibi, S.; Asiri, M.M.; Ahmed Hamza, M.; Zamani, A.S.; Motwakel, A.; Yaseen, I. Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment. Appl. Sci. 2022, 12, 4026. https://doi.org/10.3390/app12084026
Abunadi I, Abdullah Mengash H, S. Alotaibi S, Asiri MM, Ahmed Hamza M, Zamani AS, Motwakel A, Yaseen I. Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment. Applied Sciences. 2022; 12(8):4026. https://doi.org/10.3390/app12084026
Chicago/Turabian StyleAbunadi, Ibrahim, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel, and Ishfaq Yaseen. 2022. "Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment" Applied Sciences 12, no. 8: 4026. https://doi.org/10.3390/app12084026
APA StyleAbunadi, I., Abdullah Mengash, H., S. Alotaibi, S., Asiri, M. M., Ahmed Hamza, M., Zamani, A. S., Motwakel, A., & Yaseen, I. (2022). Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment. Applied Sciences, 12(8), 4026. https://doi.org/10.3390/app12084026