ACCENTS Transactions on Information Security (TIS) ISSN (P): 12222 ISSN (O): 2455-7196 Vol - 6, Issue - 24, October 2021
  1. 0
    Google Scholar
  2. 0
    Citation
  3. 0
    Impact Factor
An efficient hybrid encryption approach with bit shuffling for image data security

Akrati Shrivastava and Animesh Kumar Dubey

Abstract

In the current scenario there is the need of data security to make the communication more secure and reliable. In this paper image data security has been discussed. The major problem is to provide security in less time with minimum loss of data. In this paper a combination of RSA, RC4 and blowfish (R2B) algorithms have been used for the data encryption and decryption purpose. For experimentation different images have been considered from different databases. The experimentation has been considered based on mean squared error (MSE), encryption time and overall processing time. The results have been considered based on different iterations to reduce any computational biasness. The results clearly show the improvement in error rates, encryption time and overall processing time as comparison to the traditional approaches.

Keyword

Bit shuffling, RSA, RC4, R2B algorithm, MSE.

Cite this article

Shrivastava A, Dubey AK

Refference

[1][1]Alwan ZA, Farhan HM, Mahdi SQ. Color image steganography in YCbCr space. International Journal of Electrical & Computer Engineering (2088-8708). 2020; 10(1):202-9.

[2][2]Abdullah HN, Zeboon HT, Mansor AJ. Digital image encryption by random pixel selecting using chaotic sequences. Journal of Al-Mamoon College. 2015(26):228-36.

[3][3]Gupta P, Singh S, Mangal I. Image encryption based on Arnold cat map and S-box. International Journal of Advanced Research in Computer Science and Software Engineering. 2014; 4(8):807-12.

[4][4]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In international conference on advances in computing and communication engineering (ICACCE) 2020 (pp. 1-5). IEEE.

[5][5]Qiu J, Wang P. An image encryption and authentication scheme. In seventh international conference on computational intelligence and security 2011 (pp. 784-7). IEEE.

[6][6]Jolfaei A, Mirghadri A. A new approach to measure quality of image encryption. International Journal of Computer and Network Security. 2010; 2(8):38-44.

[7][7]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering (ICACCE) 2020 (pp. 1-5). IEEE.

[8][8]Nazmudeen NH, Farsana FJ. Satellite image security improvement by combining DWT-DCT watermarking and AES encryption. International Journal of Advanced Computer Research. 2014; 4(2):645

[9][9]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In CSI sixth international conference on software engineering (CONSEG) 2012 (pp. 1-8). IEEE.

[10][10]Zhang X. Lossy compression and iterative reconstruction for encrypted image. IEEE transactions on information forensics and security. 2010; 6(1):53-8.

[11][11]Kovalchuk A, Izonin I, Strauss C, Podavalkina M, Lotoshynska N, Kustra N. Image encryption and decryption schemes using linear and quadratic fractal algorithms and their systems. In DCSMart 2019 (pp. 139-50).

[12][12]Huang M, Yang C, Zhang Y. Selective encryption of H. 264/AVC based on block weight model. In 18th international conference on communication technology (ICCT) 2018 (pp. 1368-73). IEEE.

[13][13]Pepe A, Fu HY, Liu X, Khan FN. Multimedia data encryption and compression via hybrid chaotic compressive sensing and latent vector transmission. In international conference on advanced infocomm technology (ICAIT) 2020 (pp. 107-10). IEEE.

[14][14]Madhu D, Vasuhi S. Image steganography: 2-Bit XOR algorithm used in YCbCr color model with crypto-algorithm. In 4th international conference on computer, communication and signal processing (ICCCSP) 2020 (pp. 1-5). IEEE.

[15][15]Mansoor AJ, Abdullah HN, Al-Gailani MF, Ziboon HT. Chaotic encryption system based on pixel value and position transformation for color images. In international multi-conference on systems, signals & devices (SSD) 2021 (pp. 433-9). IEEE.

[16][16]Shanthakumari R, Varadhaganapathy S, Vinothkumar S, Bharaneeshwar B. Data hiding in image steganography using range technique for secure communication. In international conference on advances in electrical, computing, communication and sustainable technologies (ICAECT) 2021 (pp. 1-7). IEEE.

[17][17]Gupta N, Vijay R. Effect on reconstruction of images by applying fractal based lossy compression followed by symmetrical encryption techniques. In 11th international conference on computing, communication and networking technologies (ICCCNT) 2020 (pp. 1-7). IEEE.

[18][18]Preethi P and Asokan R. Neural network oriented RONI prediction for embedding process with hex code encryption in DICOM Images. International Conference on advances in computing, communication control and networking 2020 (pp. 739-43). IEEE.

[19][19]Pramanik S, Bandyopadhyay SK, Ghosh R. Signature image hiding in color image using steganography and cryptography based on digital signature concepts. In 2nd international conference on innovative mechanisms for industry applications (ICIMIA) 2020 (pp. 665-9). IEEE.

[20][20]Agra S, Nisa AK. Analyzing the effectiveness of metamorphosing images using color maps. In third international conference on smart systems and inventive technology (ICSSIT) 2020 (pp. 1279-85). IEEE.

[21][21]Zhao Y, Yang C, Tang B. Construction of perceptual security dataset for video selective encryption based on double-blind subjective experiment. In international conference on information communication and software engineering (ICICSE) 2021 (pp. 30-5). IEEE.

[22][22]Wang JZ, Li J, Wiederhold G. SIMPLIcity: semantics-sensitive integrated matching for picture libraries. IEEE Transactions on pattern analysis and machine intelligence. 2001; 23(9):947-63.