-Cryptography gets an essential role for secure the information's. In Every second, Enormous data is swap over through the communication channel, at this level the information security is required to digital data transaction. Without using the cryptography technique, the data sharing is inadequate. However, crypto method is extremely essential rather than the transaction speed. Even data as encrypted format, that data may steal in-between the communication. The embezzle technique has been threatening in mounting technology world. Security needs unbreakable cryptography mechanism better than the convention. Genetic algorithm is the powerful impartial optimization method and helps to encrypt the information in elegant way, which has some properties like selection, crossover, and mutation. The novel encryption method called image en-cipherment using genetic algorithm (IEGA). Which provides data security and it is propagated by the combination of cryptography and genetic algorithm. The images are encrypted and decrypted using IEGA method and results were compared in this paper by using some existing methods. The quality metrics such as SNR, PSNR, and MSE is used to justify the quality of our proposed IEGA methodology. Keyword -Cryptography, Genetic Algorithm, Security, Cross-over, Mutation I. INTRODUCTION A. CryptographyCryptography is the cram of information hiding and substantiation. It consist the algorithms, strategies and protocols to secure prevent or impediment unauthorized access to perceptive information and enable the verifiability of each component in a communication. Secret value is in cryptography, which can be identified as key. In addition to an algorithm which has a key that is difficult to maintain devising new fangled algorithm .which can be agree to reversible scramble of information. Cryptography is classified into two types such as Secret Key and Public Key. Secret key algorithms are used mainly for the core encryption of data. Huge number of probable keys and tremendously fast is to be in these algorithms. The vital symmetric key algorithm offer admirable secrecy. Already the information is encrypted with specified key there is no prompt way to decrypt the data without possessing the identical key. Mutually the dispatcher and the intentional receiver have to agree upon the key earlier than any communication begins [3] .Symmetric key algorithm could be divided into two phases: Stream and Block. Block algorithm are encrypt the data as distinct block at a time, whereas stream algorithm encrypt byte by byte or even bit by bit. Generally, encryption is a one of the methods to provide high security, which is well known that image encryption has extensively applications in internet communication, telemedicine, multimedia system etc [2].An efficient well-built and consistent encryption scheme is mandatory for surmount a secure communication of secret data over the network [6]. B. Genetic algorithm BasicsThe genetic algorithm is a method for resolve the both constraint and unconstraint optimiza...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.