“…The various data protection algorithms like AES, RSA, Blowfish, Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Two-parameter with a Wide-range system Mixed Coupled Map Lattice model (TWMCML), Double Parameters Fractal Sorting Matrix (DPFSM), Double Parameters Fractal Sorting Vector (DPFSV), Fractal Sorting Matrix (FSM), an algorithm based on the thought of improved ant colony walking path, triple-image encryption and hiding algorithm are implemented on cloud computing and image protection in the literature 2,[8][9][10][11][12][13][14][15] . Moreover, the various encryption methods include the application of Quantum Key Distribution (QKD) for information security [16][17][18][19] . In literature, physical layer impairment (PLI)-aware shared path protection (SPP) scheme for single-link failures in transparent optical WDM mesh networks have been considered.…”