Username   Password       Forgot your password?  Forgot your username? 

 

Improved Security for Android System based on Multi-Chaotic Maps using a Novel Image Encryption Algorithm

Volume 15, Number 6, June 2019, pp. 1692-1701
DOI: 10.23940/ijpe.19.06.p20.16921701

Ge Jiaoa,b, Lang Lia,b, and Yi Zoua,b
aCollege of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China
bHunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China

 

(Submitted on March 20, 2019; Revised on April 12, 2019; Accepted on June 16, 2019)

Abstract:

Aimed at the unsatisfactory effect of security in mobile cloud computing, we propose a novel image encryption algorithm by using the Improved Fruit Fly Optimization Algorithm -- Artificial Bee Colony (hereafter referred to as IFOA-ABC). First, the feature of task scheduling function in mobile cloud computing is described to set up the task scheduling function; second, the population of fruit fly optimization algorithm is initialized by using orthogonal array and quantitative techniques, and the boundary of fruit fly optimization algorithm is processed, the step size in search is adjusted dynamically, and the artificial bee colony algorithm is used to help fruit fly optimization algorithm develop the global optimal solution; in the simulation experiment, the IFOA-ABC algorithm has obvious advantages over other intelligent algorithms in the comparison of four indicators of mobile cloud task scheduling, which means that the proposed algorithm can effectively improve the privacy and efficiency of cloud computing scheduling.

 

References: 16

  1. C. Roberta, G. Werner, and E. Fernando, “SWOT: Google Device Technologies, Worldwide,”(https://www.gartner.com/doc/3896269?ref=mrktg-srch, accessed December 2018)
  2. C. Pak and L. Huang, “A New Color Image Encryption using Combination of the 1D Chaotic Map,” Signal Processing, Vol. 138, pp. 129-137, 2017
  3. M. J. Rostami, A. Shahba, S. Saryazdi, and H. Nezamabadi-pour, “A Novel Parallel Image Encryption with Chaotic Windows based on Logistic Map,” Computers and Electrical Engineering, Vol. 62, pp. 384-400, 2017
  4. V. Patidar, N. K. Pareek, G. Purohit, and K. K. Sud, “Modified Substitution Diffusion Image Cipher using Chaotic Standard and Logistic Maps,” Communications in Nonlinear Science and Numerical Simulation, Vol. 15, No. 10, pp. 2755-3-2765, 2010
  5. S. Tayde and S. Siledar, “File Encryption, Decryption using AES Algorithm in Android Phone,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, No. 5, pp. 550-554, 2015
  6. W. T. Zheng, “Image Encryption Research based on Android Phones,” Central China Normal University, 2016
  7. Y. H. Zhao, “Image Encryption APP Design and Implementation on the Android Platform,” Chongqing Normal University, 2016
  8. Z. Jiang, “Color Image Encryption based on Chaotic Mapping Cat Android,” Industrial Control Computer, Vol. 30, No. 4, pp. 98-100, 2017
  9. Q. C. Zhong, Q. X. Zhu, and P. L. Zhang, “Multiple Chaotic Maps Encryption System,” Journal of University of Electronic Science and Technology of China, Vol. 38, No. 2, pp. 274-277, 2009
  10. C. X. Zhu, D. Z. Huang, and Y. Guo, “A New Image Encryption Algorithm based on Multiple Chaotic Maps and Output-Feedback,” Geomatics and Information Science of Wuhan University, Vol. 35, No. 5, pp. 528-531, 2010
  11. G. Jiao, X. Peng, and K. Duan, “Image Encryption with The Cross Diffusion of Two Chaotic Maps,” KSII Transactions on Internet and Information Systems, Vol. 13, No. 2, pp. 1064-1079, February 2019
  12. H. Lai, M. A. Orgun, J. Pieprzyk, J. Li, M. X. Luo, J. H. Xiao, et al., “High-Capacity Quantum Key Distribution using Chebyshev Map Values Corresponding to Lucas Numbers Coding,” Quantum Information Processing, Vol. 15, No. 11, pp. 4663-4679, 2016
  13. J. M. Liu, S. S. Qiu, F. Xiang, and H. J. Xiao, “Information Encryption Algorithm based on Multiple Chaotic Mappings,” Journal of South China University of Technology (Natural Science Edition), No. 5, pp. 1-5, 2007
  14. Z. G. Huang, “Watermarking Algorithm based on Best Permutation,” Communications Technology, Vol. 43, No. 3, pp. 150-152, 2010
  15. W. Wang and C. Jin, “Image Encryption Scheme for Android Mobile Platform,” Computer Science, Vol. 41, No. 8, pp. 94-96, 2014
  16. B. B. Du, “Research and Implementation of an Image Encryption System based on Android,” Wuhan University of Technology, 2013

 

Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

 
This site uses encryption for transmitting your passwords. ratmilwebsolutions.com