A Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm

被引:6
作者
Ibrahim, Dyala [1 ]
Sihwail, Rami [1 ]
Arrifin, Khairul Akram Zainol [2 ]
Abuthawabeh, Ala [3 ]
Mizher, Manar [1 ]
机构
[1] Amman Arab Univ, Coll Comp Sci & Informat, Dept Cyber Secur, Amman 11953, Jordan
[2] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Dept Cyber Secur, Bangi 43600, Selangor, Malaysia
[3] Amman Arab Univ, Coll Comp Sci & Informat, Dept Software Engn, Amman 11953, Jordan
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 07期
关键词
visual cryptography; Harris hawk optimization; HHO; optimization; image encryption; cyber security;
D O I
10.3390/sym15071305
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Hundreds of millions of people worldwide use computing devices and services, including smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most secure encryption methods for image encryption in many applications, such as voting security, online transaction security, and privacy protection. An essential step in VC is encrypting secret images into multiple digital shares to hide them with the intention of successfully reverting them to their original form. Hence, a single share cannot reveal information about the secret image. Issues including pixel enlargement, high processing costs, and low decryption quality influence the current state of VC. We address these issues by introducing a novel technique based on (2, 2) secret sharing and the algorithm of Harris hawks optimization (HHO) for color photos. For the encryption process, the appropriate color levels are determined using the HHO algorithm. Consequently, images are decrypted with improved quality and a small impact on the overall processing complexity. The suggested scheme is also non-expandable due to the equal size of the initial secret image and the shared images. This results in lower memory requirements and improved image quality. The approach is applied to a set of well-known benchmark images. Moreover, a set of standard metrics is used to assess the robustness of the proposed scheme, including its capability in defending against cryptanalytic attacks, a correlation, a histogram, and the quality of encryption. According to the findings, the proposed solution provides better reconstructed image quality, time-efficient encryption, and nearly optimal statistical properties compared to previous approaches.
引用
收藏
页数:17
相关论文
共 40 条
[1]   Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary Images [J].
Ahmad, Saleha ;
Hayat, Muhammad Faisal ;
Qureshi, Muhammad Ali ;
Asef, Shahzad ;
Saleem, Yasir .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (21-23) :32071-32090
[2]   Harris hawks optimization: a comprehensive review of recent variants and applications [J].
Alabool, Hamzeh Mohammad ;
Alarabiat, Deemah ;
Abualigah, Laith ;
Heidari, Ali Asghar .
NEURAL COMPUTING & APPLICATIONS, 2021, 33 (15) :8939-8980
[3]  
Alhabeeb OH, 2021, INT J ADV COMPUT SC, V12, P184
[4]   An optimization of color halftone visual cryptography scheme based on Bat algorithm [J].
Aswad, Firas Mohammed ;
Salman, Ihsan ;
Mostafa, Salama A. .
JOURNAL OF INTELLIGENT SYSTEMS, 2021, 30 (01) :816-835
[5]   A Design of Multi-Purpose Image-Based QR Code [J].
Chen, Shang-Kuan ;
Ti, Yen-Wu .
SYMMETRY-BASEL, 2021, 13 (12)
[6]   Ideal contrast visual cryptography schemes with reversing [J].
Cimato, S ;
De Santis, A ;
Ferrara, AL ;
Masucci, B .
INFORMATION PROCESSING LETTERS, 2005, 93 (04) :199-206
[7]  
El-Shorbagy M. A., 2020, International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019). Advances in Intelligent Systems and Computing (AISC 921), P143, DOI 10.1007/978-3-030-14118-9_15
[8]   Improved Equilibrium Optimization Algorithm Using Elite Opposition-Based Learning and New Local Search Strategy for Feature Selection in Medical Datasets [J].
Elgamal, Zenab Mohamed ;
Yasin, Norizan Mohd ;
Sabri, Aznul Qalid Md ;
Sihwail, Rami ;
Tubishat, Mohammad ;
Jarrah, Hazim .
COMPUTATION, 2021, 9 (06)
[9]   Perfect recovery of XOR-based visual cryptography scheme [J].
Fu, Zhengxin ;
Cheng, Yuqiao ;
Yu, Bin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) :2367-2384
[10]  
Ghoul Sami, 2022, 2022 International Conference on Cyber Resilience (ICCR), P1, DOI 10.1109/ICCR56254.2022.9995838