V. Dankan Gowda, Avinash Sharma, M. Nagabushanam, H. G. Govardhana Reddy, K. Raghavendra
{"title":"基于向量空间建模的安全通信智能二值图像加密","authors":"V. Dankan Gowda, Avinash Sharma, M. Nagabushanam, H. G. Govardhana Reddy, K. Raghavendra","doi":"10.1080/09720529.2022.2075090","DOIUrl":null,"url":null,"abstract":"Abstract In this research work, a secured routing technique is developed based on the LEACH algorithm. Many secure routing algorithms were proposed in the past by modifying the LEACH algorithm with trust management techniques, key generation, and distribution technique and intrusion detection algorithms. Most present solutions are unable to address the issue of modifying and intercepting assaults. To tackle this problem, a new secured routing algorithm is developed in this work that divides the image and messages into sub-components, represent them in a matrix format and add them to get a steganographic image which is encrypted using a suitable encryption algorithm selected by the rule system developed in this research work. Moreover, intelligent agents are incorporated in all the sensor nodes in the network to communicate the encrypted images to the neighbor nodes more reliably.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1157 - 1171"},"PeriodicalIF":1.2000,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Vector space modelling-based intelligent binary image encryption for secure communication\",\"authors\":\"V. Dankan Gowda, Avinash Sharma, M. Nagabushanam, H. G. Govardhana Reddy, K. Raghavendra\",\"doi\":\"10.1080/09720529.2022.2075090\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract In this research work, a secured routing technique is developed based on the LEACH algorithm. Many secure routing algorithms were proposed in the past by modifying the LEACH algorithm with trust management techniques, key generation, and distribution technique and intrusion detection algorithms. Most present solutions are unable to address the issue of modifying and intercepting assaults. To tackle this problem, a new secured routing algorithm is developed in this work that divides the image and messages into sub-components, represent them in a matrix format and add them to get a steganographic image which is encrypted using a suitable encryption algorithm selected by the rule system developed in this research work. Moreover, intelligent agents are incorporated in all the sensor nodes in the network to communicate the encrypted images to the neighbor nodes more reliably.\",\"PeriodicalId\":46563,\"journal\":{\"name\":\"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY\",\"volume\":\"25 1\",\"pages\":\"1157 - 1171\"},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2022-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/09720529.2022.2075090\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MATHEMATICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/09720529.2022.2075090","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
Vector space modelling-based intelligent binary image encryption for secure communication
Abstract In this research work, a secured routing technique is developed based on the LEACH algorithm. Many secure routing algorithms were proposed in the past by modifying the LEACH algorithm with trust management techniques, key generation, and distribution technique and intrusion detection algorithms. Most present solutions are unable to address the issue of modifying and intercepting assaults. To tackle this problem, a new secured routing algorithm is developed in this work that divides the image and messages into sub-components, represent them in a matrix format and add them to get a steganographic image which is encrypted using a suitable encryption algorithm selected by the rule system developed in this research work. Moreover, intelligent agents are incorporated in all the sensor nodes in the network to communicate the encrypted images to the neighbor nodes more reliably.