Skip to main content

An Efficient Data Encryption Through Image via Prime Order Symmetric Key and Bit Shuffle Technique

  • Conference paper
  • First Online:
Computer Communication, Networking and Internet Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 5))

Abstract

In this paper, we had proposed a technique that enriches the data privacy and integrity of the data to transfer over a unsecured channel. In this technique we had done encryption and then compression, Data is encrypted to generate the cypher text and then the resultant cypher text is been embedded in image and then compressed for effective utilization of the bandwidth. To encrypt the data, prime order symmetric key algorithm is used and then the encrypted data is embedded within the image using LSB (Least Significant Bit) technique. Then the image is been encrypted at the next stage to reinforce the security at multi-level by using bit shuffle technique. And in the final stage the resultant encrypted image is been compressed using arithmetic coding technique. By using this proposed technique there would be significant improvement in the security of the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Parag Kadam, Akash Kandhare, Mangesh Nawale, Mukesh Patil “Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique,” IEEE Trans. Pattern Recognition, Informatics and Mobile Engineering (PRIME), Feb 2013.

    Google Scholar 

  2. X. Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 53–58, Marh 2011.

    Google Scholar 

  3. Huiyi Liu, Yuegong Zhang, “An improved one-time password authentication scheme,” IEEE Trans. Communication Technology (ICCT)., Nov 2013.

    Google Scholar 

  4. Xin Zhou, Xiaofei Tang, “Reasearch and implementation of RSA algorithm for encryption and decryption,” IEEE Trans. Strategic Technology (IFOST), vol. 2, Aug. 2011.

    Google Scholar 

  5. O P Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi, “Performance of data encryption algorithms,” IEEE Trans. Elwctronics Computer Technology (ICECT), vol. 5, Aug. 2011.

    Google Scholar 

  6. Jiantao Zhou, Xianming Liu, Oscar C. Au and Yuan Yan Tang, “Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation,” IEEE Trans. Signal Process., vol. 9, no. 1, Nov 2014.

    Google Scholar 

  7. J. Zhou, X. Liu, and O. C. Au, “On the design of an efficient encryption-then-compression system,” in Proc. ICASSP, 2013, pp. 2872–2876

    Google Scholar 

  8. Xinpeng Zhang, Yanli Ren, Liquan Shen, Zhenxing Qian, “Compressing Encrypted Images with Auxiliary Information,” IEEE Trans. Multimedia, vol. 16, issue: 15, April 2014

    Google Scholar 

  9. A Nadeem, M Y Javed, “A Performance comparision of Encryption Algorithms,” IEEE Trans. Information and communication Technology, vol. 2, Aug. 2011.

    Google Scholar 

  10. Xu Shu-Jiang, Wang Ying-Long, Wang Ji-Zhi, Tian Min “A novel image encryption scheme based on chaotic maps,” IEEE Trans. Signal processing, vol. 2, Dec 2008.

    Google Scholar 

  11. Ling Wang, Quen Ye, Yaoqiang Xiao, Yongxing Zou, Bo Zhang, “IEEE Trans. Image an signal processing,’’ vol. 3, May 2008.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. V. S. S. Lalitha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Lalitha, R.V.S.S., Srinivasu, P.N. (2017). An Efficient Data Encryption Through Image via Prime Order Symmetric Key and Bit Shuffle Technique. In: Satapathy, S., Bhateja, V., Raju, K., Janakiramaiah, B. (eds) Computer Communication, Networking and Internet Security. Lecture Notes in Networks and Systems, vol 5. Springer, Singapore. https://doi.org/10.1007/978-981-10-3226-4_26

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3226-4_26

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3225-7

  • Online ISBN: 978-981-10-3226-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics