(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Information Security (TIS)

ISSN (Print):XXXX    ISSN (Online):2455-7196
Volume-6 Issue-24 October-2021
Full-Text PDF
Paper Title : An efficient hybrid encryption approach with bit shuffling for image data security
Author Name : Akrati Shrivastava and Animesh Kumar Dubey
Abstract :

In the current scenario there is the need of data security to make the communication more secure and reliable. In this paper image data security has been discussed. The major problem is to provide security in less time with minimum loss of data. In this paper a combination of RSA, RC4 and blowfish (R2B) algorithms have been used for the data encryption and decryption purpose. For experimentation different images have been considered from different databases. The experimentation has been considered based on mean squared error (MSE), encryption time and overall processing time. The results have been considered based on different iterations to reduce any computational biasness. The results clearly show the improvement in error rates, encryption time and overall processing time as comparison to the traditional approaches.

Keywords : Bit shuffling, RSA, RC4, R2B algorithm, MSE.
Cite this article : Shrivastava A, Dubey AK. An efficient hybrid encryption approach with bit shuffling for image data security. ACCENTS Transactions on Information Security. 2021; 6(24):20-25. DOI:10.19101/TIS.2021.621007.
References :
[1]Alwan ZA, Farhan HM, Mahdi SQ. Color image steganography in YCbCr space. International Journal of Electrical & Computer Engineering (2088-8708). 2020; 10(1):202-9.
[Google Scholar]
[2]Abdullah HN, Zeboon HT, Mansor AJ. Digital image encryption by random pixel selecting using chaotic sequences. Journal of Al-Mamoon College. 2015(26):228-36.
[Google Scholar]
[3]Gupta P, Singh S, Mangal I. Image encryption based on Arnold cat map and S-box. International Journal of Advanced Research in Computer Science and Software Engineering. 2014; 4(8):807-12.
[Google Scholar]
[4]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In international conference on advances in computing and communication engineering (ICACCE) 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[5]Qiu J, Wang P. An image encryption and authentication scheme. In seventh international conference on computational intelligence and security 2011 (pp. 784-7). IEEE.
[Crossref] [Google Scholar]
[6]Jolfaei A, Mirghadri A. A new approach to measure quality of image encryption. International Journal of Computer and Network Security. 2010; 2(8):38-44.
[Google Scholar]
[7]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering (ICACCE) 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[8]Nazmudeen NH, Farsana FJ. Satellite image security improvement by combining DWT-DCT watermarking and AES encryption. International Journal of Advanced Computer Research. 2014; 4(2):645
[Google Scholar]
[9]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In CSI sixth international conference on software engineering (CONSEG) 2012 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[10]Zhang X. Lossy compression and iterative reconstruction for encrypted image. IEEE transactions on information forensics and security. 2010; 6(1):53-8.
[Crossref] [Google Scholar]
[11]Kovalchuk A, Izonin I, Strauss C, Podavalkina M, Lotoshynska N, Kustra N. Image encryption and decryption schemes using linear and quadratic fractal algorithms and their systems. In DCSMart 2019 (pp. 139-50).
[Google Scholar]
[12]Huang M, Yang C, Zhang Y. Selective encryption of H. 264/AVC based on block weight model. In 18th international conference on communication technology (ICCT) 2018 (pp. 1368-73). IEEE.
[Crossref] [Google Scholar]
[13]Pepe A, Fu HY, Liu X, Khan FN. Multimedia data encryption and compression via hybrid chaotic compressive sensing and latent vector transmission. In international conference on advanced infocomm technology (ICAIT) 2020 (pp. 107-10). IEEE.
[Crossref] [Google Scholar]
[14]Madhu D, Vasuhi S. Image steganography: 2-Bit XOR algorithm used in YCbCr color model with crypto-algorithm. In 4th international conference on computer, communication and signal processing (ICCCSP) 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[15]Mansoor AJ, Abdullah HN, Al-Gailani MF, Ziboon HT. Chaotic encryption system based on pixel value and position transformation for color images. In international multi-conference on systems, signals & devices (SSD) 2021 (pp. 433-9). IEEE.
[Crossref] [Google Scholar]
[16]Shanthakumari R, Varadhaganapathy S, Vinothkumar S, Bharaneeshwar B. Data hiding in image steganography using range technique for secure communication. In international conference on advances in electrical, computing, communication and sustainable technologies (ICAECT) 2021 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[17]Gupta N, Vijay R. Effect on reconstruction of images by applying fractal based lossy compression followed by symmetrical encryption techniques. In 11th international conference on computing, communication and networking technologies (ICCCNT) 2020 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[18]Preethi P and Asokan R. Neural network oriented RONI prediction for embedding process with hex code encryption in DICOM Images. International Conference on advances in computing, communication control and networking 2020 (pp. 739-43). IEEE.
[19]Pramanik S, Bandyopadhyay SK, Ghosh R. Signature image hiding in color image using steganography and cryptography based on digital signature concepts. In 2nd international conference on innovative mechanisms for industry applications (ICIMIA) 2020 (pp. 665-9). IEEE.
[Crossref] [Google Scholar]
[20]Agra S, Nisa AK. Analyzing the effectiveness of metamorphosing images using color maps. In third international conference on smart systems and inventive technology (ICSSIT) 2020 (pp. 1279-85). IEEE.
[Crossref] [Google Scholar]
[21]Zhao Y, Yang C, Tang B. Construction of perceptual security dataset for video selective encryption based on double-blind subjective experiment. In international conference on information communication and software engineering (ICICSE) 2021 (pp. 30-5). IEEE.
[Crossref] [Google Scholar]
[22]Wang JZ, Li J, Wiederhold G. SIMPLIcity: semantics-sensitive integrated matching for picture libraries. IEEE Transactions on pattern analysis and machine intelligence. 2001; 23(9):947-63.
[Crossref] [Google Scholar]