Skip to main content
Log in

MDO: a novel murmuration-flight based dispersive optimization algorithm and its application to image security

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

This paper introduces a novel murmuration-flight-based dispersive optimization algorithm (MDO) inspired by the natural phenomena of starlings’ murmuration, flight patterns of migrating birds, and dispersive migration. To the best of our knowledge, the proposed algorithm is the first of its kind to utilize Lévy flights to initialize the first population of solutions, thereby ensuring better exploration of the search space from the starting point of the optimization process. Additionally, the starling murmuration leads to better local and global search ability. Captain selection and dispersive migration give the proposed algorithm greater exploitation power. It has few tunable parameters and can be easily applied to various problem domains. Extensive tests and experiments show that the MDO delivers promising and competitive results over other algorithms, and its applicability is also checked statistically by performing a significance test. One of the most complex problems in health IoTs is how to preserve sensitive and personal patient data while addressing the main concerns of data integrity and security in modern health information and telemedicine systems. Hence, the MDO is applied to solve the optimum key-based image encryption problem to showcase its usefulness in real-world applications. Simplicity, efficiency, and better adaptability make the proposed method a strong contender for solving complex optimization problems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  • Adhie RP, Hutama Y, Ahmar AS, Setiawan M et al (2018) Implementation cryptography data encryption standard (des) and triple data encryption standard (3des) method in communication system based near field communication (nfc). J Phys 954:012009

    Google Scholar 

  • Anand A, Singh AK (2022) Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare. IEEE Trans Comput Soc Syst. https://doi.org/10.1109/TCSS.2022.3140862

    Article  Google Scholar 

  • Bharti V, Biswas B, Shukla KK (2020) Recent trends in nature inspired computation with applications to deep learning. In: 2020 10th International Conference on Cloud Computing, Data Science and Engineering (Confluence), IEEE, pp 294–299

  • Bharti V, Biswas B, Shukla KK (2021a) Emocgan: a novel evolutionary multiobjective cyclic generative adversarial network and its application to unpaired image translation. Neural Comput Appl 34:21433

    Article  Google Scholar 

  • Bharti V, Biswas B, Shukla KK (2021b) A novel multiobjective gdwcn-pso algorithm and its application to medical data security. ACM Trans Internet Technol (TOIT) 21(2):1–28

    Article  Google Scholar 

  • Chen J, Chen L, Zhang LY, Zl Zhu (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96(1):301–322

    Article  Google Scholar 

  • Coppersmith D (1994) The data encryption standard (des) and its strength against attacks. IBM J Res Dev 38(3):243–250

    Article  MATH  Google Scholar 

  • Darwish A, Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K (2019) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humaniz Comput 10(10):4151–4166

    Article  Google Scholar 

  • Demner-Fushman D, Antani S, Simpson M, Thoma GR (2012) Design and development of a multimodal biomedical information retrieval system. J Comput Sci Eng 6(2):168–177

    Article  Google Scholar 

  • Dixon WJ (1950) Analysis of extreme values. Ann Math Stat 21(4):488–506

    Article  MathSciNet  MATH  Google Scholar 

  • Eberhart R, Kennedy J (1995) A new optimizer using particle swarm theory. In: MHS’95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science, IEEE, pp 39–43

  • Elhoseny M, Abdelaziz A, Salama AS, Riad AM, Muhammad K, Sangaiah AK (2018) A hybrid model of internet of things and cloud computing to manage big data in health services applications. Futur Gener Comput Syst 86:1383–1394

    Article  Google Scholar 

  • Holland JH et al (1992) Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. MIT press, London

    Book  Google Scholar 

  • Jeon G (2017) Computational intelligence approach for medical images by suppressing noise. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0627-9

    Article  Google Scholar 

  • Kirkpatrick S, Gelatt CD, Vecchi MP (1983) Optimization by simulated annealing. Science 220(4598):671–680

    Article  MathSciNet  MATH  Google Scholar 

  • Kumar A, Singh SK, Saxena S, Lakshmanan K, Sangaiah AK, Chauhan H, Shrivastava S, Singh RK (2020) Deep feature learning for histopathological image classification of canine mammary tumors and human breast cancer. Inf Sci 508:405–421

    Article  Google Scholar 

  • Kumar A, Purohit V, Bharti V, Singh R, Singh SK (2021a) Medisecfed: private and secure medical image classification in the presence of malicious clients. IEEE Trans Ind Inf 18(8):5648–5657

    Article  Google Scholar 

  • Kumar A, Singh SK, Lakshmanan K, Saxena S, Shrivastava S (2021b) A novel cloud-assisted secure deep feature classification framework for cancer histopathology images. ACM Trans Internet Technol (TOIT) 21(2):1–22

    Article  Google Scholar 

  • Li S, Zhao L, Yang N (2021) Medical image encryption based on 2d zigzag confusion and dynamic diffusion. Secur Commun Netw. 2021

  • Mirjalili S (2015) Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl-Based Syst 89:228–249

    Article  Google Scholar 

  • Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67

    Article  Google Scholar 

  • Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61

    Article  Google Scholar 

  • Mirjalili S, Mirjalili SM, Hatamlou A (2016) Multi-verse optimizer: a nature-inspired algorithm for global optimization. Neural Comput Appl 27(2):495–513

    Article  Google Scholar 

  • Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM (2017) Salp swarm algorithm: A bio-inspired optimizer for engineering design problems. Adv Eng Softw 114:163–191

    Article  Google Scholar 

  • Newton I (2010) Bird migration. Br Birds 103:413–416

    Google Scholar 

  • Nf PUB (2001) Adv Encryption Stand (AES). Federal information processing standards publication 197:441–0311

    Google Scholar 

  • Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) Gsa: a gravitational search algorithm. Inf Sci 179(13):2232–2248

    Article  MATH  Google Scholar 

  • Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu S, Yuan X (2020) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humaniz Comput 11(5):1821–1833

    Article  Google Scholar 

  • Song W, Fu C, Zheng Y, Cao L, Tie M (2022) A practical medical image cryptosystem with parallel acceleration. J Ambient Intell Humaniz Comput

  • Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  • Wolpert DH, Macready WG et al (1997) No free lunch theorems for optimization. IEEE Trans Evol Comput 1(1):67–82

    Article  Google Scholar 

  • Yang XS, Ting T, Karamanoglu M (2013) Random walks, lévy flights, markov chains and metaheuristic optimization. Future information communication technology and applications. Springer, Berlin, pp 1055–1064

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Vandana Bharti or Bhaskar Biswas.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bharti, V., Biswas, B. & Shukla, K.K. MDO: a novel murmuration-flight based dispersive optimization algorithm and its application to image security. J Ambient Intell Human Comput 14, 4809–4826 (2023). https://doi.org/10.1007/s12652-023-04537-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-023-04537-5

Keywords

Navigation