ECC Image Encryption Scheme using Whale Optimization Technique
Keywords:
Cryptography based on elliptic curves, optimization using whales, and protecting digital imagesAbstract
IoT develops integrated
communication possibilities for network devices
and stages by bringing together the practical
and substantial worlds at the same time. The
study's authors uncovered and investigated the
most pressing outstanding problems in
bolstering IoT security, such as the need for
encryption methods to safeguard photos being
sent across connected networks. The algorithm
used to construct the device is a hybrid,
meaning that it makes use of both encryption
and optimization strategies. This proposed
picture security model encrypted using the
Whale Optimization technique. Using
optimization in encryption techniques allows
one to choose optimal keys for use in
encryption algorithms. Once the proposed
technique has been applied, the results are
evaluated using the Peak Signal to Noise Ratio
(PSNR) and Mean Square Error (MSE) to
determine whether or not the strategy was
successful.