Abstract
We consider one applied global optimization problem where a set of feasible solutions is discrete and very large. The goal is to find optimal perfect gratings, which can guarantee high quality and security of the visual cryptography method. A priori estimation techniques, such as branch and bound type methods, cannot be applied to exclude an essential part of elements from the feasible set. Thus, a full search is required to solve this global optimization problem exactly, which is very computationally demanding. A library of C++ templates is developed that allows its user to implement parallel master–slave algorithms for his/her application without any knowledge of parallel programming API (application programming interface). Design of the templates allows users to build a parallel solver using MPI (message passing interface) API or distributed computing application using BOINC (Berkeley open infrastructure for network computing) API from the same C/C++ code with implementation of application-specific tasks. We build parallel and distributed computing solvers for the considered optimization problem and present results of computational experiments using a computer cluster and BOINC project for volunteer computing. Heuristic methods are also considered as an alternative to the full search algorithm. Due to complicated conditions defining feasible solutions (perfect gratings), genetic algorithms cannot be used to solve this problem efficiently. We propose two memetic heuristic algorithms, when a basic stochastic or simplified full search algorithm is combined with a local search algorithm. Parallel heuristic algorithms are also proposed and implemented. The efficiency and accuracy of heuristics are investigated and results of experiments are presented.
Similar content being viewed by others
References
Allen B et al (2013) The Einstein@Home search for radio pulsars and PSR J2007+2722 discovery. Astrophys J 773(2):91
Anderson DP (2004) Boinc: a system for public resource computing and storage. In: Proceedings of the 5th IEEE/ACM international workshop on grid computing, pp 1–7
Baravykaite M, Čiegis R (2007) An implementation of a parallel generalized branch and bound template. Math Model Anal 12(3):277–289
Beberg AL, Ensign DL, Jayachandran G, Khaliq S, Pande VS (2009) Folding@Home: lessons from eight years of volunteer distributed computing. Parallel and Distributed Processing Symposium, International, pp 1–8
Blesa MJ, Hernàndez L, Xhafa F (2002) Parallel processing and applied mathematics: 4th international conference, PPAM 2001, Poland, September 9–12, 2001 Revised Papers, chap Parallel skeletons for Tabu search method based on search strategies and neighborhood partition, pp 185–193
Čiegis R, Starikovičius V, Tumanova N, Ragulskis M, Palivonaite R (2015) Distributed parallel computing for visual cryptography algorithms. In: Proceedings of the second international workshop on sustainable ultrascale computing systems (NESUS 2015), pp 23–28
Davies DW, Price WL (1989) Security for computer networks, 2nd edn. Wiley, New York
Depolli M, Trobec R, Filipič B (2013) Asynchronous master-slave parallelization of differential evolution for multi-objective optimization. Evol Comput 21(2):261–291
Dorta I, Leon C, Rodriguez C, Rojas A (2003) Parallel skeletons for divide-and-conquer and branch-and-bound techniques. In: Proceedings of 11th Euromicro conference on parallel, distributed and network-based processing (Euro-PDP’03), IEEE, pp 292–298
Gerald CF, Wheatley PO (2004) Applied numerical analysis. Addison-Wesley, Boston
Glover F, Kochenberger GA (2003) Handbook of metaheuristics, international series in operations research and management science. Springer, Berlin
Goldberg D (2002) The design of innovation: lessons from and for competent genetic algorithms. Kluwer Academic Publishers, Dordrecht
Gonzalez-Velez H, Leyton M (2010) A survey of algorithmic skeleton frameworks: high-level structured parallel programming enablers. Softw Pract Exp 40(12):1135–1160
Hegde C, Manu S, Shenoy PD, Venugopal K, Patnaik L (2008) Secure authentication using image processing and visual cryptography for banking applications. In: ADCOM 2008. 16th international conference on advanced computing and communications, IEEE, pp 65–72
Horst R, Pardalos PM, Thoai NV (2000) Introduction to global optimization, 2nd edn. Kluwer Academic Publishers, Dordrecht
Korpela EJ (2012) SETI@Home, BOINC, and volunteer distributed computing. Annu Rev Earth Planet Sci 40(1):69–87
Kumar V, Grama A, Gupta A, Karypis G (1994) Introduction to parallel computing: design and analysis of algorithms. Benjamin/Cummings, San Francisco
Lewis A, Mostaghim S, Scriven I (2009) Asynchronous multi-objective optimisation in unreliable distributed environments. In: Lewis A, Mostaghim S, Randall M (eds) Biologically-inspired optimisation methods: parallel algorithms, systems and applications, studies in computational intelligence, vol 210. Springer, Heidelberg, pp 51–78
Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton
Message Passing Interface Forum (1995) MPI: a message passing interface standard. http://www.mpi-forum.org
Mostaghim S, Branke J, Lewis A, Schmeck H (2008) Parallel multi-objective optimization using master–slave model on heterogeneous resources. In: Evolutionary computation, 2008. CEC 2008. IEEE world congress on computational intelligence, pp 1981–1987
Naor M, Shamir A (1995) Visual cryptography. In: De Santis A (ed) Advances in cryptology—EUROCRYPT’94, lecture notes in computer science, vol 950. Springer, Berlin, pp 1–12
Palivonaite R, Fedaravicius A, Aleksa A, Ragulskis M (2013) Near-optimal moire grating for chaotic dynamic visual cryptography. In: Zaman H, Robinson P, Olivier P, Shih T, Velastin S (eds) Advances in visual informatics, lecture notes in computer science, vol 8237. Springer International Publishing, Switzerland, pp 48–58
Ragulskis M, Aleksa A (2009) Image hiding based on time-averaging moiré. Opt Commun 282(14):2752–2759
Ragulskis M, Aleksa A, Maskeliunas R (2009) Contrast enhancement of time averaged fringes based on moving average mapping functions. Opt Lasers Eng 47(7–8):768–773
Ross A, Othman A (2011) Visual cryptography for biometric privacy. IEEE Trans Inform Forensics Secur 6(1):70–81
Starikovičius V, Čiegis R, Iliev O (2011) A parallel solver for the design of oil filters. Math Model Anal 16(2):326–341
Talbi EG, Mostaghim S, Okabe T, Ishibuchi H, Rudolph G, Coello Coello CA (2008) Parallel approaches for multiobjective optimization. In: Branke J, Deb K, Miettinen K, Slowinski R (eds) Multiobjective optimization: interactive and evolutionary approaches, lecture notes in computer science, vol 5252. Springer, Heidelberg, pp 349–372
Acknowledgments
The work presented in this paper has been partially supported by EU under the COST programme Action IC1305, ‘Network for Sustainable Ultrascale Computing (NESUS)’. This research was also funded by a Grant NUMMOD (No. MIP-074/2015) from the Research Council of Lithuania. Computations were performed on resources at the High Performance Computing Center “HPC Sauletekis” in Vilnius University Faculty of Physics. The authors would like to thank the referees for their comments which are helpful and constructive.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Čiegis, R., Starikovičius, V., Tumanova, N. et al. Application of distributed parallel computing for dynamic visual cryptography. J Supercomput 72, 4204–4220 (2016). https://doi.org/10.1007/s11227-016-1733-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-016-1733-8