Back to Contents

Volume 1 Issue 1

July-December 2022

Optimal Digital Watermarking in the Spatial Domain using Rao Algorithm

Authors: Satveer Kaur, Puneet Jain, Ajay Kumar

Published: 04 August 2022

Journal: IRJEEE, Volume 1, Issue 1

Pages: 01-10

Keywords: Digital Watermarking, Least Significant Bit (LSB), RAO Algorithm, Spatial Domain, Security, Steganography

DOI: 10.55083/cct.irjeee.2022.v01i01004

PAPER ID: IRJEEEV1I107221222000004

It’s becoming increasingly challenging to safeguard multimedia’s authenticity and integrity due to the rapid growth of internet technologies. Watermarking has become a major factor in copyright protection, data authentication, and other areas in the last few decades. The main contribution of this paper is to design an optimal digital watermarking method in the spatial domain. To achieve this goal, ROA algorithm is taken under consideration. The RAO algorithm searches the optimal watermark data order for hiding in the cover image. ROA algorithm is successfully is applied in constrained and unconstrained optimization problems. Besides that, pre-processing on the cover image and watermark data is done to enhance the security of the proposed method. The pre-processing on the cover image is done to determine the optimal block based on the cover image based on the entropy parameter. 

Lightweight Encryption Authentication Scheme for Smart Grid using SLIM and JAYA Algorithm

Authors: Razaullah, Puneet Jain, Ajay Kumar

Published: 14 August 2022

Journal: IRJEEE, Volume 1, Issue 1

Pages: 11-20

Keywords: Authentication, Encryption, JAYA, SLIM, Security, Smart Grid

DOI: 10.55083/cct.ijmpc.2022.v01i01006

PAPER ID: IRJEEEV1I107221222000006

In this paper, a lightweight encryption authentication scheme is designed for smart grid data to achieve two security parameters known as encryption and authentication. To achieve this goal, encryption algorithm works under cipher-block-chaining (CBC) mode. The CBC mode requires initialization vector (IV) key. Therefore, in the proposed method, SLIM algorithm is taken as encryption algorithm. Further, JAYA algorithm is deployed for generate initialization vector key. The proposed method is simulated in MATLAB. The performance evaluation of the proposed method is done using various performance metrics. The results show that the proposed method superior over the existing methods.

Image Encryption Method based on Chaotic Logistic Map and JAYA Algorithm

Authors:Jaspreet Kaur, Puneet Jain, Sarabjeet Kaur, Ajay Kumar

Published: 01 November 2022

Journal: IRJEEE, Volume 1, Issue 1

Pages: 21-29

Keywords: Chaotic Logistic Map Algorithm, Digital Communication, Image Security, JAYA Algorithm

DOI: 10.55083/cct.ijmpc.2022.v01i01007

The Chaotic logistic map is the most preferred algorithm for image security. The security of it depends on its parameter values. In the literature, metaheuristic algorithm such as grasshopper optimization algorithm is successfully applied for determined optimal parameter values. However, this algorithm required a number of parameters which increases algorithm complexity. To overcome this limitation, we have used the JAYA algorithm for determining the optimal parameter value of the chaotic logistic map algorithm. JAYA algorithm is not required parameter tuning over other algorithms. Thus, we have selected for the proposed method. Entropy is taken as objective function in the JAYA algorithm. After determining the optimal parameter value, the image is encrypted using chaotic logistic map algorithm. The simulation results are performed in MATLAB for standard dataset images. Further, subjective and objective analysis is done. The result shows the proposed method provides better encryption and superior results over existing methods.