Abstract
This paper introduces a novel murmuration-flight-based dispersive optimization algorithm (MDO) inspired by the natural phenomena of starlings’ murmuration, flight patterns of migrating birds, and dispersive migration. To the best of our knowledge, the proposed algorithm is the first of its kind to utilize Lévy flights to initialize the first population of solutions, thereby ensuring better exploration of the search space from the starting point of the optimization process. Additionally, the starling murmuration leads to better local and global search ability. Captain selection and dispersive migration give the proposed algorithm greater exploitation power. It has few tunable parameters and can be easily applied to various problem domains. Extensive tests and experiments show that the MDO delivers promising and competitive results over other algorithms, and its applicability is also checked statistically by performing a significance test. One of the most complex problems in health IoTs is how to preserve sensitive and personal patient data while addressing the main concerns of data integrity and security in modern health information and telemedicine systems. Hence, the MDO is applied to solve the optimum key-based image encryption problem to showcase its usefulness in real-world applications. Simplicity, efficiency, and better adaptability make the proposed method a strong contender for solving complex optimization problems.
Similar content being viewed by others
References
Adhie RP, Hutama Y, Ahmar AS, Setiawan M et al (2018) Implementation cryptography data encryption standard (des) and triple data encryption standard (3des) method in communication system based near field communication (nfc). J Phys 954:012009
Anand A, Singh AK (2022) Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare. IEEE Trans Comput Soc Syst. https://doi.org/10.1109/TCSS.2022.3140862
Bharti V, Biswas B, Shukla KK (2020) Recent trends in nature inspired computation with applications to deep learning. In: 2020 10th International Conference on Cloud Computing, Data Science and Engineering (Confluence), IEEE, pp 294–299
Bharti V, Biswas B, Shukla KK (2021a) Emocgan: a novel evolutionary multiobjective cyclic generative adversarial network and its application to unpaired image translation. Neural Comput Appl 34:21433
Bharti V, Biswas B, Shukla KK (2021b) A novel multiobjective gdwcn-pso algorithm and its application to medical data security. ACM Trans Internet Technol (TOIT) 21(2):1–28
Chen J, Chen L, Zhang LY, Zl Zhu (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96(1):301–322
Coppersmith D (1994) The data encryption standard (des) and its strength against attacks. IBM J Res Dev 38(3):243–250
Darwish A, Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K (2019) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humaniz Comput 10(10):4151–4166
Demner-Fushman D, Antani S, Simpson M, Thoma GR (2012) Design and development of a multimodal biomedical information retrieval system. J Comput Sci Eng 6(2):168–177
Dixon WJ (1950) Analysis of extreme values. Ann Math Stat 21(4):488–506
Eberhart R, Kennedy J (1995) A new optimizer using particle swarm theory. In: MHS’95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science, IEEE, pp 39–43
Elhoseny M, Abdelaziz A, Salama AS, Riad AM, Muhammad K, Sangaiah AK (2018) A hybrid model of internet of things and cloud computing to manage big data in health services applications. Futur Gener Comput Syst 86:1383–1394
Holland JH et al (1992) Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. MIT press, London
Jeon G (2017) Computational intelligence approach for medical images by suppressing noise. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0627-9
Kirkpatrick S, Gelatt CD, Vecchi MP (1983) Optimization by simulated annealing. Science 220(4598):671–680
Kumar A, Singh SK, Saxena S, Lakshmanan K, Sangaiah AK, Chauhan H, Shrivastava S, Singh RK (2020) Deep feature learning for histopathological image classification of canine mammary tumors and human breast cancer. Inf Sci 508:405–421
Kumar A, Purohit V, Bharti V, Singh R, Singh SK (2021a) Medisecfed: private and secure medical image classification in the presence of malicious clients. IEEE Trans Ind Inf 18(8):5648–5657
Kumar A, Singh SK, Lakshmanan K, Saxena S, Shrivastava S (2021b) A novel cloud-assisted secure deep feature classification framework for cancer histopathology images. ACM Trans Internet Technol (TOIT) 21(2):1–22
Li S, Zhao L, Yang N (2021) Medical image encryption based on 2d zigzag confusion and dynamic diffusion. Secur Commun Netw. 2021
Mirjalili S (2015) Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl-Based Syst 89:228–249
Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67
Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61
Mirjalili S, Mirjalili SM, Hatamlou A (2016) Multi-verse optimizer: a nature-inspired algorithm for global optimization. Neural Comput Appl 27(2):495–513
Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM (2017) Salp swarm algorithm: A bio-inspired optimizer for engineering design problems. Adv Eng Softw 114:163–191
Newton I (2010) Bird migration. Br Birds 103:413–416
Nf PUB (2001) Adv Encryption Stand (AES). Federal information processing standards publication 197:441–0311
Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) Gsa: a gravitational search algorithm. Inf Sci 179(13):2232–2248
Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu S, Yuan X (2020) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humaniz Comput 11(5):1821–1833
Song W, Fu C, Zheng Y, Cao L, Tie M (2022) A practical medical image cryptosystem with parallel acceleration. J Ambient Intell Humaniz Comput
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wolpert DH, Macready WG et al (1997) No free lunch theorems for optimization. IEEE Trans Evol Comput 1(1):67–82
Yang XS, Ting T, Karamanoglu M (2013) Random walks, lévy flights, markov chains and metaheuristic optimization. Future information communication technology and applications. Springer, Berlin, pp 1055–1064
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bharti, V., Biswas, B. & Shukla, K.K. MDO: a novel murmuration-flight based dispersive optimization algorithm and its application to image security. J Ambient Intell Human Comput 14, 4809–4826 (2023). https://doi.org/10.1007/s12652-023-04537-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-023-04537-5