scispace - formally typeset
Search or ask a question
Author

E. Dhiravida Chelvi

Bio: E. Dhiravida Chelvi is an academic researcher. The author has contributed to research in topics: Key space & Computer security model. The author has an hindex of 1, co-authored 1 publications receiving 56 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Adaptive grasshopper optimization algorithm with PSNR and correlation coefficient fitness function was proposed to choose the optimal secret and public key of the system among the random numbers to enhance high-security investigation of the current proposed model compared to the existing methods.
Abstract: With the rapid development in the field of medical image encryption, researchers analyzed a number of encryption algorithms based on chaotic systems. But there is a difficulty lies, i.e., small key space and weak security in 1-D chaotic cryptosystems. To overcome this difficulty, an alternative security model was proposed in this paper. This paper investigated highly secure medical images with a couple of subkeys, initially where a couple of subkeys are given by utilizing chaotic logistic and tent maps. As per the chaotic (C-function) process, the security was investigated like diffusion as well as confusion. Based on the initial conditions, different random numbers were generated for each map from chaotic maps. Adaptive grasshopper optimization algorithm with PSNR and correlation coefficient fitness function was proposed to choose the optimal secret and public key of the system among the random numbers. The reason behind choosing adaptive process is to enhance high-security investigation of the current proposed model compared to the existing methods. At last, the proposed strategy results were compared with existing security methods and literary works, but found to be high performing.

84 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An inventive bio-inspired optimization based filtering system is considered for the MI denoising process, the filter named as Bilateral Filter (BF), and Gaussian and spatial weights are chosen by utilizing swarm based optimization that is Dragonfly (DF) and Modified Firefly (MFF) algorithm.

129 citations

Journal ArticleDOI
TL;DR: A comprehensive review of GOA based on more than 120 scientific articles published by leading publishers: IEEE, Springer, Elsevier, IET, Hindawi, and others is presented in this article.
Abstract: Grasshopper Optimization Algorithm (GOA) is a recent swarm intelligence algorithm inspired by the foraging and swarming behavior of grasshoppers in nature. The GOA algorithm has been successfully applied to solve various optimization problems in several domains and demonstrated its merits in the literature. This paper proposes a comprehensive review of GOA based on more than 120 scientific articles published by leading publishers: IEEE, Springer, Elsevier, IET, Hindawi, and others. It provides the GOA variants, including multi-objective and hybrid variants. It also discusses the main applications of GOA in various fields such as scheduling, economic dispatch, feature selection, load frequency control, distributed generation, wind energy system, and other engineering problems. Finally, the paper provides some possible future research directions in this area.

98 citations

Journal ArticleDOI
TL;DR: This paper focuses on improving reliable data transmission with high security in the MANET using an optimization technique and demonstrates that the MANet with optimization techniques achieves a high transmission rate and improves the reliable data security.
Abstract: In recent years, the need for high security with reliability in the wireless network has tremendously been increased. To provide high security in reliable networks, mobile ad hoc networks (MANETs) play a top role, like open network boundary, distributed network, and fast and quick implementation. By expanding the technology, the MANET faces a number of security challenges due to self-configuration and maintenance capabilities. Besides, traditional security solutions for wired networks are ineffective and inefficient because of the nature of highly dynamic and resource-constrained MANETs. In this paper, the researchers focus on improving reliable data transmission with high security in the MANET using an optimization technique. In the proposed MANET system, the nodes are clustered by utilizing an energy-efficient routing protocol. Then, the modified discrete particle swarm optimization is used to select the optimal cluster head. A secured routing protocol and a signcryption model can be used to improve the transmission security of the reliable MANET. The signcryption algorithm encrypts the digital signature, which can enhance the overall efficiency and confidentiality. The security-based analysis is performed on the basis of packet delivery ratio, energy consumption, network lifetime, and throughput. Finally, the result demonstrates that the MANET with optimization techniques achieves a high transmission rate and improves the reliable data security.

93 citations

Journal ArticleDOI
TL;DR: In this paper, a new image splitting technique based on image blocks was introduced, and the image blocks were scrambled using a zigzag pattern, rotation, and random permutation, and a chaotic logistic map generated a key to diffuse the scrambled image.
Abstract: Recently, diagnosing diseases using medical images became crucial. As these images are transmitted through the network, they need a high level of protection. If the data in these images are liable for unauthorized usage, this may lead to severe problems. There are different methods for securing images. One of the most efficient techniques for securing medical images is encryption. Confusion and diffusion are the two main steps used in encryption algorithms. This paper presents a new encryption algorithm for encrypting both grey and color medical images. A new image splitting technique based on image blocks introduced. Then, the image blocks scrambled using a zigzag pattern, rotation, and random permutation. Then, a chaotic logistic map generates a key to diffuse the scrambled image. The efficiency of our proposed method in encrypting medical images is evaluated using security analysis and time complexity. The security is tested in entropy, histogram differential attacks, correlation coefficient, PSNR, keyspace, and sensitivity. The achieved results show a high-performance security level reached by successful encryption of both grey and color medical images. A comparison with various encryption methods is performed. The proposed encryption algorithm outperformed the recent existing encryption methods in encrypting medical images.

80 citations