An Efficient Data Encryption Through Image via Prime Order Symmetric Key and Bit Shuffle Technique

  • R. V. S. S. Lalitha
  • P. Naga Srinivasu
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)


In this paper, we had proposed a technique that enriches the data privacy and integrity of the data to transfer over a unsecured channel. In this technique we had done encryption and then compression, Data is encrypted to generate the cypher text and then the resultant cypher text is been embedded in image and then compressed for effective utilization of the bandwidth. To encrypt the data, prime order symmetric key algorithm is used and then the encrypted data is embedded within the image using LSB (Least Significant Bit) technique. Then the image is been encrypted at the next stage to reinforce the security at multi-level by using bit shuffle technique. And in the final stage the resultant encrypted image is been compressed using arithmetic coding technique. By using this proposed technique there would be significant improvement in the security of the data.


Data encryption Image encryption Image compression Cryptography 


  1. 1.
    Parag Kadam, Akash Kandhare, Mangesh Nawale, Mukesh Patil “Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique,” IEEE Trans. Pattern Recognition, Informatics and Mobile Engineering (PRIME), Feb 2013.Google Scholar
  2. 2.
    X. Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 53–58, Marh 2011.Google Scholar
  3. 3.
    Huiyi Liu, Yuegong Zhang, “An improved one-time password authentication scheme,” IEEE Trans. Communication Technology (ICCT)., Nov 2013.Google Scholar
  4. 4.
    Xin Zhou, Xiaofei Tang, “Reasearch and implementation of RSA algorithm for encryption and decryption,” IEEE Trans. Strategic Technology (IFOST), vol. 2, Aug. 2011.Google Scholar
  5. 5.
    O P Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi, “Performance of data encryption algorithms,” IEEE Trans. Elwctronics Computer Technology (ICECT), vol. 5, Aug. 2011.Google Scholar
  6. 6.
    Jiantao Zhou, Xianming Liu, Oscar C. Au and Yuan Yan Tang, “Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation,” IEEE Trans. Signal Process., vol. 9, no. 1, Nov 2014.Google Scholar
  7. 7.
    J. Zhou, X. Liu, and O. C. Au, “On the design of an efficient encryption-then-compression system,” in Proc. ICASSP, 2013, pp. 2872–2876Google Scholar
  8. 8.
    Xinpeng Zhang, Yanli Ren, Liquan Shen, Zhenxing Qian, “Compressing Encrypted Images with Auxiliary Information,” IEEE Trans. Multimedia, vol. 16, issue: 15, April 2014Google Scholar
  9. 9.
    A Nadeem, M Y Javed, “A Performance comparision of Encryption Algorithms,” IEEE Trans. Information and communication Technology, vol. 2, Aug. 2011.Google Scholar
  10. 10.
    Xu Shu-Jiang, Wang Ying-Long, Wang Ji-Zhi, Tian Min “A novel image encryption scheme based on chaotic maps,” IEEE Trans. Signal processing, vol. 2, Dec 2008.Google Scholar
  11. 11.
    Ling Wang, Quen Ye, Yaoqiang Xiao, Yongxing Zou, Bo Zhang, “IEEE Trans. Image an signal processing,’’ vol. 3, May 2008.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Computer Science and Technology, Department of CSEANIL Neerukonda Institute of Technology and Sciences (ANITS)VisakhapatnamIndia

Personalised recommendations