All Title Author
Keywords Abstract

Publish in OALib Journal
ISSN: 2333-9721
APC: Only $99

ViewsDownloads

Use Two Hybrid SCA-AOA and Fuzzy SCA-AOA Algorithms in Information Security

DOI: 10.4236/oalib.1107339, PP. 1-14

Subject Areas: Mathematics

Keywords: Sine Cosine Algorithm, Arithmetic Optimization, Hybrid, Cipher, Encryption, Decryption, Frequency, Fuzzy Logic, Steganography

Full-Text   Cite this paper   Add to My Lib

Abstract

This research suggests the improving Sine Cosine algorithm and Arithmetic optimization algorithm (SCA-AOA), and the application in two directions: First, in special functions (N-P hard) problems; second, in code analysis and decryption for the method of encryption substitution of simple cipher. The proposed algorithm mathematically simulates the behavior of SCA and Arithmetic algorithm behavior in Mathematical. The measure of SCA-AOA has been measured on a set of test functions to know the power of its performance and efficiency, and verify and compare it with SCA and AOA, each one alone. The numerical results have proved that the proposed algorithm (SCA-AOA) is able to present excellent results as compared with SCA-AOA itself. The applied results have proved that the proposed algorithm is able to analyze and break code. It could also avoid the falling the local solution and reaching to the global optimum resolutions in majority of functions that have been applied on. The adoptive Fuzzy SCA-AOA has been proposed and used in analyzing cipher text and breaking the code by merging the proposed algorithm SCA-AOA with properties of fuzzy logic. Moreover, the simple encoding method is explained and used to encode the proposed text. The method of masking by images is explained and used to hide text. The standards are used to measure the image resolution and find the image resolution. The encrypted text was analyzed and returned to the explicit text using the proposed method, SCA-AOA and Fuzzy SCA-AOA both separately, and the code for the encryption was broken by the proposed method.

Cite this paper

Khalaf, A. H. and Mitras, B. A. (2021). Use Two Hybrid SCA-AOA and Fuzzy SCA-AOA Algorithms in Information Security. Open Access Library Journal, 8, e7339. doi: http://dx.doi.org/10.4236/oalib.1107339.

References

[1]  Mirjalili, S. (2016) SCA: A Sine Cosine Algorithm for Solving Optimization Problems. Knowledge Based Systems, 96, 120-133. https://doi.org/10.1016/j.knosys.2015.12.022
[2]  Hameed, S.M. and Hmood, D.N. (2010) Particles Swarm Optimization for the Cryptanalysis of Transposition Cipher. Journal of Al-Nahrain University, 13, 211-215. https://doi.org/10.22401/JNUS.13.4.30
[3]  Hamad, A. and Mitras, B. (2020) Using Modified Conjugate Gradient Method to Improve SCA. Journal of Physics: Conference Series, 1591, 012050. https://doi.org/10.1088/1742-6596/1591/1/012050
[4]  Uddin, M.F. and Youssef, A.M. (2006) Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization. IEEE Congress on Evolutionary Computation, Vancouver, BC, Canada, date, 677-680.
[5]  Abualigah, L., Diabat, A., Mirjalili, S., Elaziz, M.A. and Gandomi, A.H. (2021) The Arithmetic Optimization Algorithm. Computer Methods in Applied Mechanics and Engineering, 376, 113609. https://doi.org/10.1016/j.cma.2020.113609
[6]  Chen, C.R. and Pham, T.T. (2001) Introduction to Fuzzy Set, Fuzzy Logic, Fuzzy Control Systems. LLC, USA. https://doi.org/10.1201/9781420039818
[7]  Miyamoto, S., Ichihashi, H. and Honda, K. (2008) Algorithms for Fuzzy Clustering, Methods in c-Means Clustering with Applications. In: Studies Fuzziness and Soft Computing, Vol. 229, Springer-Verlag, Berlin Heidelberg.
[8]  Mitras, B.A. and Btty, K.D. (2009) Estimation of Parameter for Gibbs Random Distribution Which Is Used in Image Processing. Iraq Journal of Statistical Sciences, 16, 73-94.
[9]  Qasim, W.A. and Mitras, B.A. (2020) Using Hybrid Intelligent Numerical Optimization Techniques in Steganography. College of Computer Sciences & Mathematics, Mosul University, Mosul, 7-9.
[10]  Hamid, N., Yahya, A., Ahmad, R.B. and Al-Qershi, O.M. (2012) Image Steganography Techniques: An Overview. Int. J. Comput. Sci. Secur., 6, 168-187.
[11]  Hariri, M., Karimi, R. and Nosrati, M. (2011) An Introduction to Steganography Methods. World Appl. Program., 13, 191-195.
[12]  Cummins, J., Diskin, P., Lau, S. and Parlett, R. (2004) School of Computer Science, Univ. Birmingham, Steganography Digit. Watermarking.

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

微信:OALib Journal