Abstract
To transmit images over a communication medium at lower bandwidth and robustness against differential attacks, compression and encryption processes are used. In this paper, Huffman lossless compression technique is used to compress the grayscale images. In this, different prefix codes of variable lengths are assigned to each pixel. The length of the prefix codes is inversely proportional to frequency of occurrence of characters. Compressed image is encrypted by RSA asymmetrical encryption algorithm. In RSA encryption algorithm, encryption key is kept public and different from decryption key which is kept secret. The efficiency of proposed algorithms is expressed by analyzing the compression parameters as well as the correlation coefficient analysis and entropy analysis. The results are verified on five grayscale test images of 512 × 512 sizes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tong, X.J., Chen, P., Zhang, M.: A joint image lossless compression and encryption method based on chaotic map. Multimed. Tools Appl. 76(12), 13995–14020 (2017)
Singh, R.K., Kumar, B., Shaw, D.K., Khan, D.A.: Level by level image compression-encryption algorithm based on quantum chaos map. J. King Saud Univ. Comput. Inf. Sci. (2018)
Daubechies, I., Barlaud, M., Mathieu, P.: Image Coding Using Wavelet Transform. IEEE Trans. Image Process. 1(2), 205–220 (1992)
Maniccama, S.S., Bourbakis, N.G.: Lossless image compression and encryption using SCAN. Pattern Recognit. 34(6), 1229–1245 (2001)
Zhang, X.: Lossy compression and iterative reconstruction for encrypted image. Inf. Forensics Secur. 53–58 (2011)
Al-Khasawneh, M.A., Shamsuddin, S.M., Hasan, S., Bakar, A.A.: An improved chaotic image encryption algorithm. In: 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018 (2018)
Carpentieri, B.: Efficient Compression and Encryption for Digital Data Transmission, vol. 2018 (2018)
Jamgekar, R.S., Joshi, G.S.: File encryption and decryption using secure RSA. Int. J. Emerg. Sci. Eng. (2013)
Setyaningsih, E., Wardoyo, R.: Review of image compression and encryption techniques. Int. J. Adv. Comput. Sci. Appl. 8(2) (2017)
Sharma, M., Gandhi, S.: Compression and Encryption : An Integrated Approach. Int. J. Eng. Res. Technol. 1(5), 1–7 (2012)
Yassein, M.B., Aljawarneh, S., Qawasmeh, E., Mardini, W., Khamayseh, Y.: Comprehensive study of symmetric key and asymmetric key encryption algorithms. In: Proceedings of 2017 International Conference on Engineering and Technology, ICET 2017 (2018)
Galla, L.K., Koganti, V.S., Nuthalapati, N.: Implementation of RSA. In: 2016 International Conference on Control Instrumentation Communication and Computational Technologies, ICCICCT 2016 (2017)
Jonsson, J., Kaliski, B.S.: On the security of RSA encryption in TLS. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) (2002)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography (2014)
Han, S., Mao, H., Dally, W.J.: Deep compression: compressing deep neural networks with pruning, trained quantization and Huffman coding. In: 4th International Conference on Learning Representations, ICLR 2016—Conference Track Proceedings (2016)
Satir, E., Isik, H.: A huffman compression based text steganography method. Multimed. Tools Appl. (2014)
Patel, R.A., Zhang, Y., Mak, J.,Davidson, A., Owens, J.D.: Parallel lossless data compression on the GPU. In: 2012 Innovative Parallel Computing, InPar 2012 (2012)
Sharma, M.: Compression using huffman coding. IJCSNS Int. J. Comput. Sci. Netw. Secur. (2010)
Raja, S.P., Suruliandi, A.: Performance evaluation on EZW & WDR image compression techniques. In: 2010 IEEE International Conference on Communication Control and Computing Technologies, ICCCCT 2010, pp. 661–664 (2010)
Agarwal, C., Mishra, A., Sharma, A.: A novel gray-scale image watermarking using hybrid Fuzzy-BP N architecture. Egypt. Informatics J. 16(1), 83–102 (2015)
Praisline Jasmi, R., Perumal, B., Pallikonda Rajasekaran, M.: Comparison of image compression techniques using huffman coding, DWT and fractal algorithm. In: 2015 International Conference on Computer Communication and Informatics, ICCCI 2015, pp. 1–5 (2015)
Zhou, N., Pan, S., Cheng, S., Zhou, Z.: Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt. Laser Technol. 82, 121–133 (2016)
Dang, P.P., Chau, P.M.: Image encryption for secure Internet multimedia applications. IEEE Trans. Consum. Electron. (2000)
Hu, F., Pu, C., Gao, H., Tang, M., Li, L.: Image compression and encryption scheme based on deep learning. Nauk. Visnyk Natsionalnoho Hirnychoho Universytetu 6, 142–148 (2016)
Zhang, Y.: The unified image encryption algorithm based on chaos and cubic S-Box. Inf. Sci. (Ny) 450, 361–377 (2018)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gupta, N., Vijay, R. (2021). Efficient Approach for Encryption of Lossless Compressed Grayscale Images. In: Sharma, H., Saraswat, M., Yadav, A., Kim, J.H., Bansal, J.C. (eds) Congress on Intelligent Systems. CIS 2020. Advances in Intelligent Systems and Computing, vol 1334. Springer, Singapore. https://doi.org/10.1007/978-981-33-6981-8_32
Download citation
DOI: https://doi.org/10.1007/978-981-33-6981-8_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6980-1
Online ISBN: 978-981-33-6981-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)