Skip to main content

Efficient Approach for Encryption of Lossless Compressed Grayscale Images

  • Conference paper
  • First Online:
Congress on Intelligent Systems (CIS 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1334))

Included in the following conference series:

Abstract

To transmit images over a communication medium at lower bandwidth and robustness against differential attacks, compression and encryption processes are used. In this paper, Huffman lossless compression technique is used to compress the grayscale images. In this, different prefix codes of variable lengths are assigned to each pixel. The length of the prefix codes is inversely proportional to frequency of occurrence of characters. Compressed image is encrypted by RSA asymmetrical encryption algorithm. In RSA encryption algorithm, encryption key is kept public and different from decryption key which is kept secret. The efficiency of proposed algorithms is expressed by analyzing the compression parameters as well as the correlation coefficient analysis and entropy analysis. The results are verified on five grayscale test images of 512 × 512 sizes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tong, X.J., Chen, P., Zhang, M.: A joint image lossless compression and encryption method based on chaotic map. Multimed. Tools Appl. 76(12), 13995–14020 (2017)

    Google Scholar 

  2. Singh, R.K., Kumar, B., Shaw, D.K., Khan, D.A.: Level by level image compression-encryption algorithm based on quantum chaos map. J. King Saud Univ. Comput. Inf. Sci. (2018)

    Google Scholar 

  3. Daubechies, I., Barlaud, M., Mathieu, P.: Image Coding Using Wavelet Transform. IEEE Trans. Image Process. 1(2), 205–220 (1992)

    Google Scholar 

  4. Maniccama, S.S., Bourbakis, N.G.: Lossless image compression and encryption using SCAN. Pattern Recognit. 34(6), 1229–1245 (2001)

    Google Scholar 

  5. Zhang, X.: Lossy compression and iterative reconstruction for encrypted image. Inf. Forensics Secur. 53–58 (2011)

    Google Scholar 

  6. Al-Khasawneh, M.A., Shamsuddin, S.M., Hasan, S., Bakar, A.A.: An improved chaotic image encryption algorithm. In: 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018 (2018)

    Google Scholar 

  7. Carpentieri, B.: Efficient Compression and Encryption for Digital Data Transmission, vol. 2018 (2018)

    Google Scholar 

  8. Jamgekar, R.S., Joshi, G.S.: File encryption and decryption using secure RSA. Int. J. Emerg. Sci. Eng. (2013)

    Google Scholar 

  9. Setyaningsih, E., Wardoyo, R.: Review of image compression and encryption techniques. Int. J. Adv. Comput. Sci. Appl. 8(2) (2017)

    Google Scholar 

  10. Sharma, M., Gandhi, S.: Compression and Encryption : An Integrated Approach. Int. J. Eng. Res. Technol. 1(5), 1–7 (2012)

    Google Scholar 

  11. Yassein, M.B., Aljawarneh, S., Qawasmeh, E., Mardini, W., Khamayseh, Y.: Comprehensive study of symmetric key and asymmetric key encryption algorithms. In: Proceedings of 2017 International Conference on Engineering and Technology, ICET 2017 (2018)

    Google Scholar 

  12. Galla, L.K., Koganti, V.S., Nuthalapati, N.: Implementation of RSA. In: 2016 International Conference on Control Instrumentation Communication and Computational Technologies, ICCICCT 2016 (2017)

    Google Scholar 

  13. Jonsson, J., Kaliski, B.S.: On the security of RSA encryption in TLS. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) (2002)

    Google Scholar 

  14. Katz, J., Lindell, Y.: Introduction to Modern Cryptography (2014)

    Google Scholar 

  15. Han, S., Mao, H., Dally, W.J.: Deep compression: compressing deep neural networks with pruning, trained quantization and Huffman coding. In: 4th International Conference on Learning Representations, ICLR 2016—Conference Track Proceedings (2016)

    Google Scholar 

  16. Satir, E., Isik, H.: A huffman compression based text steganography method. Multimed. Tools Appl. (2014)

    Google Scholar 

  17. Patel, R.A., Zhang, Y., Mak, J.,Davidson, A., Owens, J.D.: Parallel lossless data compression on the GPU. In: 2012 Innovative Parallel Computing, InPar 2012 (2012)

    Google Scholar 

  18. Sharma, M.: Compression using huffman coding. IJCSNS Int. J. Comput. Sci. Netw. Secur. (2010)

    Google Scholar 

  19. Raja, S.P., Suruliandi, A.: Performance evaluation on EZW & WDR image compression techniques. In: 2010 IEEE International Conference on Communication Control and Computing Technologies, ICCCCT 2010, pp. 661–664 (2010)

    Google Scholar 

  20. Agarwal, C., Mishra, A., Sharma, A.: A novel gray-scale image watermarking using hybrid Fuzzy-BP N architecture. Egypt. Informatics J. 16(1), 83–102 (2015)

    Google Scholar 

  21. Praisline Jasmi, R., Perumal, B., Pallikonda Rajasekaran, M.: Comparison of image compression techniques using huffman coding, DWT and fractal algorithm. In: 2015 International Conference on Computer Communication and Informatics, ICCCI 2015, pp. 1–5 (2015)

    Google Scholar 

  22. Zhou, N., Pan, S., Cheng, S., Zhou, Z.: Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt. Laser Technol. 82, 121–133 (2016)

    Google Scholar 

  23. Dang, P.P., Chau, P.M.: Image encryption for secure Internet multimedia applications. IEEE Trans. Consum. Electron. (2000)

    Google Scholar 

  24. Hu, F., Pu, C., Gao, H., Tang, M., Li, L.: Image compression and encryption scheme based on deep learning. Nauk. Visnyk Natsionalnoho Hirnychoho Universytetu 6, 142–148 (2016)

    Google Scholar 

  25. Zhang, Y.: The unified image encryption algorithm based on chaos and cubic S-Box. Inf. Sci. (Ny) 450, 361–377 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, N., Vijay, R. (2021). Efficient Approach for Encryption of Lossless Compressed Grayscale Images. In: Sharma, H., Saraswat, M., Yadav, A., Kim, J.H., Bansal, J.C. (eds) Congress on Intelligent Systems. CIS 2020. Advances in Intelligent Systems and Computing, vol 1334. Springer, Singapore. https://doi.org/10.1007/978-981-33-6981-8_32

Download citation

Publish with us

Policies and ethics