3.9 Article

Performance study of selective encryption in comparison to full encryption for still visual images

Publisher

ZHEJIANG UNIV
DOI: 10.1631/jzus.C1300262

Keywords

Selective image encryption; Edge detection; Face detection

Ask authors/readers for more resources

Securing digital images is becoming an important concern in today's information security due to the extensive use of secure images that are either transmitted over a network or stored on disks. Image encryption is the most effective way to fulfil confidentiality and protect the privacy of images. Nevertheless, owing to the large size and complex structure of digital images, the computational overhead and processing time needed to carry out full image encryption prove to be limiting factors that inhibit it of being used more heavily in real time. To solve this problem, many recent studies use the selective encryption approach to encrypt significant parts of images with a hope to reduce the encryption overhead. However, it is necessary to realistically evaluate its performance compared to full encryption. In this paper, we study the performance and efficiency of image segmentation methods used in the selective encryption approach, such as edges and face detection methods, in determining the most important parts of visual images. Experiments were performed to analyse the computational results obtained by selective image encryption compared to full image encryption using symmetric encryption algorithms. Experiment results have proven that the selective encryption approach based on edge and face detection can significantly reduce the time of encrypting still visual images as compared to full encryption. Thus, this approach can be considered a good alternative in the implementation of real-time applications that require adequate security levels.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.9
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Multidisciplinary Sciences

Color Revolution: A Novel Operator for Imperialist Competitive Algorithm in Solving Cloud Computing Service Composition Problem

Amin Jula, Elankovan A. Sundararajan, Zalinda Othman, Narjes Khatoon Naseri

Summary: This paper proposes a novel operator for the imperialist competitive algorithm called the color revolution operator (CRO), which significantly improves the algorithm's efficiency. The study applies this improved algorithm to optimize service time-cost in cloud computing service composition, showing that ICACRO is more efficient than traditional algorithms.

SYMMETRY-BASEL (2021)

Article Computer Science, Information Systems

An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks

Osama A. Khashan, Rami Ahmad, Nour M. Khafajah

Summary: This paper introduces the FlexCrypt scheme, which addresses the challenges of security and efficiency in WSNs by introducing features such as dynamic clustering and automated selection of encryption parameters, as well as providing flexible key management and authentication methods.

AD HOC NETWORKS (2021)

Review Computer Science, Information Systems

A Systematic Review of Density Grid-Based Clustering for Data Streams

Mustafa Tareq, Elankovan A. Sundararajan, Aaron Harwood, Azuraliza Abu Bakar

Summary: Clustering data streams, especially evolving data streams, presents challenges for conventional density grid-based clustering algorithms. In this study, a systematic literature review was conducted to summarize existing grid-based clustering algorithms, their limitations, and the challenges they face in handling evolving data streams. The findings revealed a variety of active research studies on density grid-based clustering.

IEEE ACCESS (2022)

Article Chemistry, Analytical

Fuzzy Clustering Algorithm Based on Improved Global Best-Guided Artificial Bee Colony with New Search Probability Model for Image Segmentation

Waleed Alomoush, Osama A. Khashan, Ayat Alrosan, Essam H. Houssein, Hani Attar, Mohammed Alweshah, Fuad Alhosban

Summary: This paper proposes a method to solve FCM problems by improving the balance between exploration and exploitation using an improved global best-guided artificial bee colony algorithm (IABC). The fuzzy clustering algorithm based on PIABC, abbreviated as PIABC-FCM, uses the balancing of PIABC to avoid getting stuck into local optima while searching for the best solution.

SENSORS (2022)

Article Multidisciplinary Sciences

Smart Root Search (SRS) in Solving Service Time-Cost Optimization in Cloud Computing Service Composition (STCOCCSC) Problems

Narjes Khatoon Naseri, Elankovan Sundararajan, Masri Ayob

Summary: In this paper, the performance of the novel heuristic search algorithm called Smart Root Search (SRS) was evaluated for solving service time-cost optimization problems in cloud computing service composition. The SRS algorithm showed significant improvements compared to other algorithms in terms of performance and efficiency. The use of symmetry concepts in dividing the problem search space helped the algorithm to avoid premature convergence and maintain high efficiency in higher-dimensional search spaces. The SRS algorithm has potential applications in various optimization problems.

SYMMETRY-BASEL (2023)

Article Telecommunications

GeoISA: A new road-topology-assisted geo-based content discovery scheme for vehicular named data networking

Hussein Al-Omaisi, Elankovan A. Sundararajan, Raed Alsaqour, Nor Fadzilah Abdullah, Khairul Azmi Abu Bakar

Summary: This paper proposes a new road-topology-assisted geo-based content discovery scheme called GeoISA to address the issues in vehicle-to-vehicle content discovery in vehicular named data networking. GeoISA utilizes a new mechanism called ISA for Interest forwarding suppression control and a strategy called GIDiS for distance-based TCB Interest forwarding to improve the efficiency of content source and network topology discovery.

VEHICULAR COMMUNICATIONS (2023)

Article Computer Science, Information Systems

Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems

Osama A. Khashan, Nour M. Khafajah

Summary: With the rapid increase in the number of IoT devices, the need for secure authentication mechanisms that are resource-efficient and scalable has become crucial. Conventional authentication approaches are not suitable for IoT devices due to their expensive cryptographic primitives and lack of scalability. Blockchain technology has been proposed as a solution, but existing blockchain-based authentication methods suffer from high overhead and authentication time delays. This study presents a hybrid centralized and blockchain-based authentication architecture for IoT systems, combining the efficiency of edge servers with the decentralized trust of blockchains. Lightweight cryptographic methods are implemented to achieve efficient authentication while limiting resource consumption. The proposed architecture demonstrates significant improvements in computation cost, execution time, and power consumption compared to traditional authentication schemes.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2023)

Article Engineering, Chemical

Accelerated Arithmetic Optimization Algorithm by Cuckoo Search for Solving Engineering Design Problems

Mohammad Hijjawi, Mohammad Alshinwan, Osama A. Khashan, Marah Alshdaifat, Waref Almanaseer, Waleed Alomoush, Harish Garg, Laith Abualigah

Summary: This paper proposes an improved arithmetic optimization algorithm (AOA) called AOACS based on the cuckoo search algorithm to solve engineering optimization problems. AOACS uses cuckoo search algorithm operators to enhance the exploitation operations of AOA and improve convergence ratio. The performance of AOACS is evaluated using benchmark functions and engineering design problems, and compared to state-of-the-art approaches, demonstrating its superior performance.

PROCESSES (2023)

Article Computer Science, Information Systems

From 5G to beyond 5G: A Comprehensive Survey of Wireless Network Evolution, Challenges, and Promising Technologies

Ali Sufyan, Khan Bahadar Khan, Osama A. Khashan, Talha Mir, Usama Mir

Summary: The emergence of 5G network addresses the challenges of rapid growth in mobile subscribers, disruptive IoT-based applications, and immense channel capacity requirements for connecting trillions of devices. It provides significant capacity gain, quality-of-service assurance, higher spectral efficiency, improved device battery life, and massive machine-type communication to meet user demands and tackle the traffic load and resource consumption in 5G applications.

ELECTRONICS (2023)

Article Computer Science, Information Systems

Digital image watermarking using discrete cosine transformation based linear modulation

Waleed Alomoush, Osama A. Khashan, Ayat Alrosan, Hani H. Attar, Ammar Almomani, Fuad Alhosban, Sharif Naser Makhadmeh

Summary: The proportion of multimedia traffic in data networks has increased due to advancements in IT. This necessitates addressing challenges in protecting multimedia data, such as preventing unauthorized disclosure, tracking the leak's origin, ensuring no unauthorized alterations, and safeguarding intellectual property. Watermarking is a technique used to transfer secure data over the network and prevent discovery by a third party.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors

Osama A. M. Khashan, Nour M. Khafajah, Waleed Alomoush, Mohammad Alshinwan, Sultan Samer Atawneh, Mutasem K. K. Alsmadi

Summary: Securing multimedia data on disk drives is a major concern due to their increasing volumes and security flaws. Existing cryptographic schemes have limitations in terms of computational costs and flexibility. Dynamic encryption file systems can mitigate these limitations by automating encryption operations with higher security. However, most current cryptographic file systems overlook the unique features of multimedia data and vulnerabilities in key management and multi-user sharing.

CRYPTOGRAPHY (2023)

Article Computer Science, Information Systems

Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments

Osama A. Khashan, Sultan Alamri, Waleed Alomoush, Mutasem K. Alsmadi, Samer Atawneh, Usama Mir

Summary: Recently, technology has made significant advancements and is now being integrated into educational settings to enhance distance learning and promote interaction between learners. The integration of the Internet of Things (IoT) into education can improve the teaching and learning process and broaden the learning context for students. However, it is crucial to protect sensitive learning data during transmission and storage.

CMC-COMPUTERS MATERIALS & CONTINUA (2023)

Article Environmental Sciences

A Hybrid MCDM Approach Based on Fuzzy-Logic and DEMATEL to Evaluate Adult Obesity

Mahmood Safaei, Elankovan A. Sundararajan, Shahla Asadi, Mehrbakhsh Nilashi, Mohd Juzaiddin Ab Aziz, M. S. Saravanan, Maha Abdelhaq, Raed Alsaqour

Summary: Obesity and its complications are a major global issue, and Malaysia ranks sixth among Asian countries in terms of adult obesity. This study aimed to investigate and assess the risk factors associated with obesity and overweight in Malaysia. The findings revealed that lack of physical activity, unhealthy diet, insufficient sleep, genetics, and perceived stress were the most significant risk factors for obesity.

INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH (2022)

Article Social Sciences, Interdisciplinary

Adaptive QoS-Aware Multi-Metrics Gateway Selection Scheme for Heterogenous Vehicular Network

Mahmoud Alawi, Raed Alsaqour, Maha Abdelhaq, Reem Alkanhel, Baraa Sharef, Elankovan Sundararajan, Mahamod Ismail

Summary: HetVNET is a promising network architecture that combines multiple network technologies for vehicles. We proposed a non-cluster adaptive QoS-aware gateway selection scheme that autonomously selects vehicles as LTE gateways based on network load and QoS requirements.

SYSTEMS (2022)

Proceedings Paper Computer Science, Theory & Methods

Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud Computing

Osama A. Khashan

Summary: Cloud computing allows for convenient storage and sharing of large volumes of data, with on-demand services. Security and protection from attacks are key issues. Proxy re-encryption can enhance data security in the cloud, but may lead to computational burdens and delays. This study proposes a novel parallel workload distribution scheme to improve big data re-encryption processes.

2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) (2021)

No Data Available