检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Mahmoud Ragab Ehab Bahaudien Ashary
机构地区:[1]Information Technology Department,Faculty of Computing and Information Technology,King Abdulaziz University,Jeddah,21589,Saudi Arabia [2]Centre of Artificial Intelligence for Precision Medicines,King Abdulaziz University,Jeddah,21589,Saudi Arabia [3]Mathematics Department,Faculty of Science,Al-Azhar University,Naser City,11884,Cairo,Egypt [4]Electrical and Computer Engineering Department,Faculty of Engineering,King Abdulaziz University,Jeddah,21589,Saudi Arabia
出 处:《Computers, Materials & Continua》2022年第8期3009-3023,共15页计算机、材料和连续体(英文)
基 金:This work was funded by the Deanship of Scientific Research(DSR),King Abdulaziz University,Jeddah,under Grant No.(D-387-135-1443).
摘 要:The advancements made in Internet of Things(IoT)is projected to alter the functioning of healthcare industry in addition to increased penetration of different applications.However,data security and private are challenging tasks to accomplish in IoT and necessary measures to be taken to ensure secure operation.With this background,the current paper proposes a novel lightweight cryptography method for enhance the security in IoT.The proposed encryption algorithm is a blend of Cross Correlation Coefficient(CCC)and Black Widow Optimization(BWO)algorithm.In the presented encryption technique,CCC operation is utilized to optimize the encryption process of cryptography method.The projected encryption algorithm works in line with encryption and decryption processes.Optimal key selection is performed with the help of Artificial Intelligence(AI)tool named BWO algorithm.With the combination of AI technique and CCC operation,optimal security operation is improved in IoT.Using different sets of images collected from databases,the projected technique was validated in MATLAB on the basis of few performance metrics such as encryption time,decryption time,Peak Signal to Noise Ratio(PSNR),CC,Error,encryption time and decryption time.The results were compared with existing methods such as Elliptical Curve cryptography(ECC)and Rivest-Shamir-Adleman(RSA)and the supremacy of the projected method is established.
关 键 词:Security images encryption time correlation coefficient black widow optimization artificial intelligence decryption time
分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.249