2021
DOI: 10.1002/int.22717
|View full text |Cite
|
Sign up to set email alerts
|

Sailfish invasive weed optimization algorithm for multiple image sharing in cloud computing

Abstract: Visual cryptography (VC) is a secret sharing cryptographic technique, which permits visual information that is encrypted in such a way that the decrypted information shows the visual image. Security is the common problem that arises in the general VC technique. To secure the visual information, an effective method is proposed using a developed sailfish invasive weed optimization (SIWO) algorithm. At first, the grayscale image is shared with multiple parties, and here the shared images are encrypted and decrypt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…The IWO, as a biomimetic swarm intelligence optimization algorithm, has simple structure, strong robustness, and powerful local and global search performance. The main steps of the IWO algorithm are population initialization, growth and reproduction, spatial diffusion, and competitive exclusion [23][24]. The main process of the improved GA based on IWO is shown in Figure 5.…”
Section: B Algorithm Design For Solvingmentioning
confidence: 99%
“…The IWO, as a biomimetic swarm intelligence optimization algorithm, has simple structure, strong robustness, and powerful local and global search performance. The main steps of the IWO algorithm are population initialization, growth and reproduction, spatial diffusion, and competitive exclusion [23][24]. The main process of the improved GA based on IWO is shown in Figure 5.…”
Section: B Algorithm Design For Solvingmentioning
confidence: 99%
“…Computers can be used to process data in such a way until the permit is completed (Gutte & Parasar, 2022). The internet/wifi network can be used by officers to be able to reach things that are needed (Freddy et al, 2022).…”
Section: Not Only Problems Originating From Thementioning
confidence: 99%
“…Apart from core cryptography, Researchers have been using secret sharing concepts in various applications such as the cloud and IoT. Recently, Gutte and Paraser [15] have used secret sharing for visual cryptography and suggested a weed optimization algorithm for image sharing. Similarly, Wang et al [44] , and Ren et al [35] have worked on low latency cloud-based indoor localization system and secure, anonymous data aggregation schemes, respectively.…”
Section: Introductionmentioning
confidence: 99%