SlideShare una empresa de Scribd logo
1 de 9
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.59-67
ISSN: 2278-2397
59
Performance Evaluation of Hybrid Method
for Securing and Compressing Images
C.Yoga Anitha1
, P.Prabhu2
1
M.Phil Scholar, Department of Computer Applications, Alagappa University, Karaikudi
2
Assistant Professor – DDE, Department of Computer Applications, Alagappa University, Karaikudi
Email: yogaa177@gmail.com, pprabhu70@gmail.com
Abstract—Security is a most important field of research work for sending and receiving of data in secret way
over the network. Cryptographyis a method for securing transformation like image, audio, video, text without
any hacking problem. Encryption and Decryption are two methods used to secure the data. Image compression
technique used to reducing the size of an image for effective data communication. There are variety of
algorithms has been proposed in the literature for securing images using encryption/decryption techniques and
reduce the size of images using image compression techniques. These techniques still need improvement to
overcome issues, challenges and its limitations. Hence in this research work a hybrid method which combines
securing image using RSA, hill cipher and 2bit rotation and compressing of images using lossless compression
algorithm has been proposed. This method compared to execution time of existing method. This method secures
the image and reduces the size of the image for data communication over the internet. This method is suitable
for various applications uses images like remote sensing, medical and Spatio-temporal.
Keywords—Cryptograph; Image Compression;RSA;Hill Cipher; 2-bit Rotation;
I. INTRODUCTION
Cryptography comes from the Greek word ‘kryptos’. It means hiding information. Information security uses
cryptography on several levels. The information cannot be read without a key to decrypt it. The information
maintains its integrity during transit and while being stored.his method has two types. They are given below:
Public Key Cryptography (Asymmetric)
Private Key Cryptography (Symmetric)
The Public Key Cryptography has two different keys. They are public key for encrypt and private key for
decrypt. It is used to transmit image data over a network.
Encrypt-Key-Decrypt
Encryption (Ke)
Decryption (Kd)
The Private Key Cryptography otherwise called Secret Key Cryptography. This method using only one key for
encrypts and decrypt. Sender and receiver know the same secret key. Sender is encrypt the message using secret
key and receiver decrypt the message using same secret key.
Cryptography method has five purposes. They are given below:
 Confidentiality
 Authentication
 Integrity
 Non-Reputation
 Access control
Confidentiality: Its means access only the authorized user not anyone else
Authentication: The transmission of data from one computer to another computer has to be accessed only the
authorized user. Unauthorized user cannot access the data or information.
Integrity: Modify the transmitted information or data by only the authorized user. Unauthorized use cannot
modify.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.59-67
ISSN: 2278-2397
60
Non-Reputation: Ensure the messages that sender or receiver.
Access Control: The authorized persons only can able to access the information during the transfer.
A) Technique
Here we are using three techniques for encrypt and one method for compression.
1. Encrypted Techniques:
 RSA
 2Bit Rotation
 Hill cipher
1.1 RSA:
The RSA is a cryptographic algorithm for encrypt and decrypt the data. This algorithm invented 1977 by Ron
Rivest, Adi Shamir, and Leonard Adleman. This describes Public Key Cryptosystem. This technique suitable for
various applications like e-mail, Banking, e-commerce on the internet
1.2 2Bit Rotation:
In 2Bit rotation, we rotate the pixel values of the image with 2bit. In first step, we select the size of the image.
Then generate the key. After that convert key value to binary format. And then apply 2bit rotation.
1.3 Hill cipher:
Hill cipher is a polyalphabetic cipher. It is a generalized version of the affine cipher and the vigenere cipher
combined. Invented in 1929 by Lester S.Hill. It’s explained by matrix. Numbers are assigned in below format
a=0, b=1, c=2, d=3, e=4, f=5,……………………, z=15.
2. Compression Technique:
Image compression is a type of data compression for images. It’s used to reduce the image size. Here we use the
technique given below:
LOCO (Low Complexity LOssless COmpression)
2.1 LOCO:
The lossless compression method means reduce the size of image without any loss.
LOCO (Low Complexity Lossless Compression) has two components.
o Modelling
o Coding
II. RELATED WORKS
Research in any field requires literature review is a written document that presents a logically argued case
founded on comprehensive understanding of the current state of knowledge about a topic of study. This case
establishes a convincing thesis to answer a study question. It will also give readers the necessary background to
understand the research work.
Monika Suhag [1] proposed approach said an Image encryption and Decryption using RSA algorithm and 2-bit
rotation method makes more securable transaction. In RSA, this asymmetry is based on the practical difficulty
of factoring the product of two large prime numbers, the factoring problem. First RSA encrypt the image with 1-
bit rotation and then second, they are applying 2-bit rotation to make it more secured image conversion. In
Decryption time they have apply reverse method.
Devashish Vaghela [2] implemented public private key pair in the modified key based image encryption using
RSA algorithm for encrypt and decrypt the image which increase the security and also used alphanumeric
password secret key pair which is derived from RSA First, they applied Hill Cipher algorithm for image
encryption, after that they applied Bit rotation and Bit reversal method for more secured image encryption and
decryption.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.59-67
ISSN: 2278-2397
61
Samson chepuri [3] explained image encryption using RSA algorithm for RGB image encryption. First read the
input of RGB colour image. After applied RSA algorithm for encrypt and decrypt. The time taken for both
encrypt and decrypt together is 12.36 seconds which is less compared to existing methods. Here the image
encryption and decryption approaches are highly securable and with less computational time. Sneha ghoradkar
[4] proposed AES encrypt and decrypt method. Encrypt have substitute bytes, shift rows, mix columns, add
round key. And decrypt have add round key, inverse shift row, inverse substitute bytes, and inverse mix
columns. AES process with the data block of 128 bit and cipher key length of 256 bit. The image of 256 bit
cipher key to achieve the high security. Because 256 bit cipher key is difficult to break
Monika Suhag [5] analyzed approach said an Image encryption and Decryption using RSA algorithm and 2 bit
rotation method makes more securable transaction. In RSA, this asymmetry is based on the practical difficulty
of factoring the product of two large prime numbers, the factoring problem. Swati Kumari [6] proposed
approach used Image encryption and decryption using Sylvester equation and Hankel matrix and another line
mapping algorithm used for encryption.
Kirti Sapra [7] explained approach said an Image encryption and decryption using RSA method used to protect
the confidential image data from unauthorized access. They have implemented RSA with bit rotations and
Extended hill cipher techniques. S.Anandkumar [8] explained approach said an Image cryptography using RSA
method used to protect the confidential image data from unauthorized access. They have explained purpose of
cryptography and merits/demerits of cryptography and applications of cryptography.
Zhiqiang Li, et.al [9] proposed approach they are used A Chaotic encryption used digital image compression
and encoding technology based on discrete cosine transform and discrete wavelet transform. This compression
encryption algorithm is feasible and it decrease the redundant information of the image, it reduces the storage
space and improves the efficiency of data transmission. Sunita [10] proposed approach said an Image encryption
and decryption using RSA method. They have implemented RSA with bit rotations and hill cipher techniques.
In this chapter, various image security algorithms like RSA, AES, 2bit, Hill cipher and its variants proposed by
various authors has been studied and analysed for their performance and their limitations. To overcome these
limitationsHMSCI method has been proposed.
III. PROPOSED METHOD
In this work, a Hybrid Method for securing and compressing images (HMSCI) has been proposed. In this
method three different encryption techniques namely 2bit, RSA and hill cipher algorithms are used to secure the
image and an image compression technique is used to reduce the size of an image.
A) SYSTEM DESIGN:
The system design of this proposed encryption method is shown in figure 1 and decryption method is shown in
figure 2.
1. Encryption Process:
1.1 SENDER:
Figure 1 HMSCI Encryption with compression design
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.59-67
ISSN: 2278-2397
62
1.2 Encryption Process:
Step 1: Begin
Step 2: Select the image from file.
Step 3: Apply RSA/ algorithm for encrypt and compress the image
Step 4: Then apply 2bit rotation technique for second encryption and compress image
Step 5: Finally use hill cipher technique using involuntary matrix and compress the image.
Step 6: Send the image to receiver.
Step 7: End.
2. Decryption Process:
2.1 RECEIVER:
Figure 2 HMSCI Decryption with decompression design
2.2 Decryption Process:
Step 1: Begin
Step 2: Select the compressed image.
Step 3: First decompress the compressed image and then image decrypted by RSA algorithm.
Step 4: Decompress the compress image then decrypted by 2 bit rotation.
Step 5: Decompress the compress image then decrypted by hill cipher.
Step 7: Receive image successfully.
Step 8: End.
The original image is selected and preprocessed for applying image encryption/decryption. The preprocessed
image is encrypted using RSA, 2Bit Rotation and Hill cipher algorithm.
B) RSA Algorithm:
1. Choose two prime p and q and find public modulus
N=pq
2. Choose public exponent
e=(p-1) (q-1) 1<e< (p-1) (q-1);
3. The pair (n,e) is a public key.
4. PrivateKey is an umique integer
1<d< (p-1) (q-1);
Such ed=1 mod (p-1) (q-1)
Encryption:
Split a message into m1, m2, mt.
0≤mi≤n
C=E (M)
=>Me
(mod n);
Decryption:
D(C) =Cd
(mod n);
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.59-67
ISSN: 2278-2397
63
M=Message
C=Cipher text
E=Encrypt
D=Decrypt.
So encryption pair of integer (e;n), decryption pair of integer(d;n).
C) 2Bit Rotation:
In bit rotation technique we will first converted images into grayscale images. Each pixel of images will have 8
bits as having intensity from 0 to 255 so each pixel represents 8 bits.
Shift=code mod 7.
Procedure:
Step 1: Select the size of the image.
Step 2: Generate the key by using pixel value of image.
Step 3: Convert key value into binary format.
Step 4: Then apply 2bit rotation.
We apply this method our image will be more secure.
D) Hill Cipher:
Encryption mathematical statement is
Y=AX
Decryption mathematical statement is
X=A-1
Y
E) LOCO Technique:
Low Complexity Lossless Compression is used to reduce the size of image without any loss and low
complexity. It has two components: modeling and coding.
IV . RESULT AND DISCUSSION
This HMSCI Method has been implemented and evaluated for efficient using various images. Time complexity
is tested for the performance of this method.
A) Experimental setup:
This method has been implemented in AMD Processor with speed 2.0 GHz,RAM 4GB and coded using C# in
Visual Studio 2010.
4.1 SENDER:
The home page of our work has two buttons like sender and receiver. Sender is going to encryption and
compression. Receiver is going to decryption and decompression. The figure 3. Shows the encryption of lena
image using RSA algorithm.
Fig 3: Encryption by RSA algorithm
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.59-67
ISSN: 2278-2397
64
The figure 4. Shows the encryption of lena image using 2bit rotation algorithm.
Fig 4: Encrypted by 2 bit rotation
The figure 5. Shows the encryption of lena image using Hill cipher algorithm
Fig 5: Encrypted by hill cipher algorithm
The image is encrypted successfully using three encryption techniques like RSA, 2 bit, hill cipher. Thefigure 6
shows the encrypted lena image using proposed algorithm.
Fig 6: Encrypted image
The figure 7 shows the image compressed using LOCO method.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.59-67
ISSN: 2278-2397
65
Fig 7: Compressed Image
4.2 RECEIVER:
The encrypted image has been decrypted using HMSCI method. Then the decrypted image is compressed using
LOCO method. The figure 8 shows the decompressed image using LOCO method.
Fig 8: Decompressed image
The figure 9 shows the decrypted image obtained using HMSCI method.
Fig 9 : Decrypted image
B) Performance Evaluation:
This algorithm has been evaluated using time and size metrics.The table 1 shows the comparison time
complexity of the conventional method with proposed model. The table show the proposed method outperform
with conventional method in terms of security and time complexity.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.59-67
ISSN: 2278-2397
66
Table 1 shows the comparison of time complexity of the conventional model with proposed model.
Encryption
(time /s)
Decryption
(time /s)
Conventional Method
RSA
[2]
2 BIT
[6]
HILL
CIPHER
[6]
RSA
[2]
2 BIT
[6]
HILL
CIPHER
[6]
2 2.1 2.0 2.2 2.0 1.5
HMSCI Model
1.2 1.0 1.0 1.3 1.0 1.0
Figure 10 shows comparison of encryption execution time conventional vs proposed method
Figure 11 shows comparison of decryption execution time of conventional vs proposed method
Table 2 shows the comparison of image size of the conventional model with proposed model.
Lena Image Baboon
Original image 01 MB 6.61 KB
Wavelet Transform 36 KB 3.0 KB
LOCO 2.32 KB 1.5 KB
Fig 10 shows the comparison of encryption execution time of conventional and proposed method. Fig 11 shows
the comparison of decryption execution time of conventional and proposed method. The table 2 shows the
comparison image size of the conventional method with proposed model. The table show the proposed method
outperform with conventional method in terms of reduce the image size. From the table 1 and table 2, it is
observed that the HMSCI model outperform in terms of time and size complexity.
0
0.5
1
1.5
2
2.5
RSA 2 BIT HILL
CIPHER
Previous Work
HMSCI Model
0
0.5
1
1.5
2
2.5
RSA 2 BIT HILL
CIPHER
Previous Work
HMSCI Model
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.59-67
ISSN: 2278-2397
67
V . CONCLUSION
In this Paper “Performance analysis of Hybrid Method for Securing and Compressing Images” has been
analyzed. This system is mainly developed to improve the Secure and efficiency of image transmission and
decrease the image transmission time. This method use design developed, and tested for efficiency. This method
HMSCI out performed in terms of security and reducing the size of image when compared with traditional
methods. Optimization techniques may also be used for further improvement.
References
[1] Monika Suhag,” Improvement Protection In Rsa Algorithm Using 2 Bit Rotations” June-2016 Volume 3,
Issue-6.
[2] Devashish Vaghela,” Modified Key Based Image Encryption Using Rsa Algorithm” May 2016 | IJIRT |
Volume 2 Issue 12 | ISSN: 2349-6002.
[3] Samson chepuri,”An RGB image encryption using RSA algorithm” e-ISSN 2455–1392 Volume 3 Issue 3,
March 2017 pp. 1 – 7.
[4] Sneha ghoradkar ,”image encryption and decryption using AES algorithm” NCETACT-2015.
[5] Monika Suhag ,” Review On Protection Of Data In Rsa Technique” June-2016 Volume 3, Issue-6.
[6] Swati Kumari,” Encryption and Decryption Techniques: A Review” Volume: 03 Issue: 09 | Sep-2016 .
[7] Kirti Sapra,” Modified Image Encryption Technique” volume1 issue6 august 2014.
[8] Anandakumar,”Image Cryptography using RSA algorithm in network security” Vol.5 Issue. 5, May- 2017,
pg. 1-14.
[9] Zhiqiang Li, Xiaoxin Sun, and Qun Ding,” Design and Implementation in Image Compression Encryption
of Digital Chaos Based on MATLAB” Volume 2,DOI: 10.1007/978-3-319-07773-4_50, c Springer
International Publishing Switzerland 2014.
[10] Sunita,” Image Encryption/Decryption Using RSA Algorithm” Vol.5 Issue. 5, May- 2017.

Más contenido relacionado

Similar a Performance Evaluation of Hybrid Method for Securing and Compressing Images

Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab viewIJARIIT
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...iosrjce
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domainsipij
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography IRJET Journal
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based onacijjournal
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingIRJET Journal
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
Multi-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMulti-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMangaiK4
 

Similar a Performance Evaluation of Hybrid Method for Securing and Compressing Images (20)

Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
 
B017640811
B017640811B017640811
B017640811
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
F42022628
F42022628F42022628
F42022628
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
F1803063236
F1803063236F1803063236
F1803063236
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Multi-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMulti-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic System
 

Más de MangaiK4

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmMangaiK4
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicMangaiK4
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingMangaiK4
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMangaiK4
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyMangaiK4
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmMangaiK4
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graphMangaiK4
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...MangaiK4
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...MangaiK4
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMangaiK4
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAMangaiK4
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...MangaiK4
 
Detection of Nutrient Deficiencies in Plant Leaves using Image Processing
Detection of Nutrient Deficiencies in Plant Leaves using Image ProcessingDetection of Nutrient Deficiencies in Plant Leaves using Image Processing
Detection of Nutrient Deficiencies in Plant Leaves using Image ProcessingMangaiK4
 
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
 

Más de MangaiK4 (20)

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for Education
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data Technology
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graph
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob Analysis
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGA
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
 
Detection of Nutrient Deficiencies in Plant Leaves using Image Processing
Detection of Nutrient Deficiencies in Plant Leaves using Image ProcessingDetection of Nutrient Deficiencies in Plant Leaves using Image Processing
Detection of Nutrient Deficiencies in Plant Leaves using Image Processing
 
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
 

Último

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Performance Evaluation of Hybrid Method for Securing and Compressing Images

  • 1. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 07, Issue: 01, June 2018, Page No.59-67 ISSN: 2278-2397 59 Performance Evaluation of Hybrid Method for Securing and Compressing Images C.Yoga Anitha1 , P.Prabhu2 1 M.Phil Scholar, Department of Computer Applications, Alagappa University, Karaikudi 2 Assistant Professor – DDE, Department of Computer Applications, Alagappa University, Karaikudi Email: yogaa177@gmail.com, pprabhu70@gmail.com Abstract—Security is a most important field of research work for sending and receiving of data in secret way over the network. Cryptographyis a method for securing transformation like image, audio, video, text without any hacking problem. Encryption and Decryption are two methods used to secure the data. Image compression technique used to reducing the size of an image for effective data communication. There are variety of algorithms has been proposed in the literature for securing images using encryption/decryption techniques and reduce the size of images using image compression techniques. These techniques still need improvement to overcome issues, challenges and its limitations. Hence in this research work a hybrid method which combines securing image using RSA, hill cipher and 2bit rotation and compressing of images using lossless compression algorithm has been proposed. This method compared to execution time of existing method. This method secures the image and reduces the size of the image for data communication over the internet. This method is suitable for various applications uses images like remote sensing, medical and Spatio-temporal. Keywords—Cryptograph; Image Compression;RSA;Hill Cipher; 2-bit Rotation; I. INTRODUCTION Cryptography comes from the Greek word ‘kryptos’. It means hiding information. Information security uses cryptography on several levels. The information cannot be read without a key to decrypt it. The information maintains its integrity during transit and while being stored.his method has two types. They are given below: Public Key Cryptography (Asymmetric) Private Key Cryptography (Symmetric) The Public Key Cryptography has two different keys. They are public key for encrypt and private key for decrypt. It is used to transmit image data over a network. Encrypt-Key-Decrypt Encryption (Ke) Decryption (Kd) The Private Key Cryptography otherwise called Secret Key Cryptography. This method using only one key for encrypts and decrypt. Sender and receiver know the same secret key. Sender is encrypt the message using secret key and receiver decrypt the message using same secret key. Cryptography method has five purposes. They are given below:  Confidentiality  Authentication  Integrity  Non-Reputation  Access control Confidentiality: Its means access only the authorized user not anyone else Authentication: The transmission of data from one computer to another computer has to be accessed only the authorized user. Unauthorized user cannot access the data or information. Integrity: Modify the transmitted information or data by only the authorized user. Unauthorized use cannot modify.
  • 2. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 07, Issue: 01, June 2018, Page No.59-67 ISSN: 2278-2397 60 Non-Reputation: Ensure the messages that sender or receiver. Access Control: The authorized persons only can able to access the information during the transfer. A) Technique Here we are using three techniques for encrypt and one method for compression. 1. Encrypted Techniques:  RSA  2Bit Rotation  Hill cipher 1.1 RSA: The RSA is a cryptographic algorithm for encrypt and decrypt the data. This algorithm invented 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. This describes Public Key Cryptosystem. This technique suitable for various applications like e-mail, Banking, e-commerce on the internet 1.2 2Bit Rotation: In 2Bit rotation, we rotate the pixel values of the image with 2bit. In first step, we select the size of the image. Then generate the key. After that convert key value to binary format. And then apply 2bit rotation. 1.3 Hill cipher: Hill cipher is a polyalphabetic cipher. It is a generalized version of the affine cipher and the vigenere cipher combined. Invented in 1929 by Lester S.Hill. It’s explained by matrix. Numbers are assigned in below format a=0, b=1, c=2, d=3, e=4, f=5,……………………, z=15. 2. Compression Technique: Image compression is a type of data compression for images. It’s used to reduce the image size. Here we use the technique given below: LOCO (Low Complexity LOssless COmpression) 2.1 LOCO: The lossless compression method means reduce the size of image without any loss. LOCO (Low Complexity Lossless Compression) has two components. o Modelling o Coding II. RELATED WORKS Research in any field requires literature review is a written document that presents a logically argued case founded on comprehensive understanding of the current state of knowledge about a topic of study. This case establishes a convincing thesis to answer a study question. It will also give readers the necessary background to understand the research work. Monika Suhag [1] proposed approach said an Image encryption and Decryption using RSA algorithm and 2-bit rotation method makes more securable transaction. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. First RSA encrypt the image with 1- bit rotation and then second, they are applying 2-bit rotation to make it more secured image conversion. In Decryption time they have apply reverse method. Devashish Vaghela [2] implemented public private key pair in the modified key based image encryption using RSA algorithm for encrypt and decrypt the image which increase the security and also used alphanumeric password secret key pair which is derived from RSA First, they applied Hill Cipher algorithm for image encryption, after that they applied Bit rotation and Bit reversal method for more secured image encryption and decryption.
  • 3. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 07, Issue: 01, June 2018, Page No.59-67 ISSN: 2278-2397 61 Samson chepuri [3] explained image encryption using RSA algorithm for RGB image encryption. First read the input of RGB colour image. After applied RSA algorithm for encrypt and decrypt. The time taken for both encrypt and decrypt together is 12.36 seconds which is less compared to existing methods. Here the image encryption and decryption approaches are highly securable and with less computational time. Sneha ghoradkar [4] proposed AES encrypt and decrypt method. Encrypt have substitute bytes, shift rows, mix columns, add round key. And decrypt have add round key, inverse shift row, inverse substitute bytes, and inverse mix columns. AES process with the data block of 128 bit and cipher key length of 256 bit. The image of 256 bit cipher key to achieve the high security. Because 256 bit cipher key is difficult to break Monika Suhag [5] analyzed approach said an Image encryption and Decryption using RSA algorithm and 2 bit rotation method makes more securable transaction. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. Swati Kumari [6] proposed approach used Image encryption and decryption using Sylvester equation and Hankel matrix and another line mapping algorithm used for encryption. Kirti Sapra [7] explained approach said an Image encryption and decryption using RSA method used to protect the confidential image data from unauthorized access. They have implemented RSA with bit rotations and Extended hill cipher techniques. S.Anandkumar [8] explained approach said an Image cryptography using RSA method used to protect the confidential image data from unauthorized access. They have explained purpose of cryptography and merits/demerits of cryptography and applications of cryptography. Zhiqiang Li, et.al [9] proposed approach they are used A Chaotic encryption used digital image compression and encoding technology based on discrete cosine transform and discrete wavelet transform. This compression encryption algorithm is feasible and it decrease the redundant information of the image, it reduces the storage space and improves the efficiency of data transmission. Sunita [10] proposed approach said an Image encryption and decryption using RSA method. They have implemented RSA with bit rotations and hill cipher techniques. In this chapter, various image security algorithms like RSA, AES, 2bit, Hill cipher and its variants proposed by various authors has been studied and analysed for their performance and their limitations. To overcome these limitationsHMSCI method has been proposed. III. PROPOSED METHOD In this work, a Hybrid Method for securing and compressing images (HMSCI) has been proposed. In this method three different encryption techniques namely 2bit, RSA and hill cipher algorithms are used to secure the image and an image compression technique is used to reduce the size of an image. A) SYSTEM DESIGN: The system design of this proposed encryption method is shown in figure 1 and decryption method is shown in figure 2. 1. Encryption Process: 1.1 SENDER: Figure 1 HMSCI Encryption with compression design
  • 4. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 07, Issue: 01, June 2018, Page No.59-67 ISSN: 2278-2397 62 1.2 Encryption Process: Step 1: Begin Step 2: Select the image from file. Step 3: Apply RSA/ algorithm for encrypt and compress the image Step 4: Then apply 2bit rotation technique for second encryption and compress image Step 5: Finally use hill cipher technique using involuntary matrix and compress the image. Step 6: Send the image to receiver. Step 7: End. 2. Decryption Process: 2.1 RECEIVER: Figure 2 HMSCI Decryption with decompression design 2.2 Decryption Process: Step 1: Begin Step 2: Select the compressed image. Step 3: First decompress the compressed image and then image decrypted by RSA algorithm. Step 4: Decompress the compress image then decrypted by 2 bit rotation. Step 5: Decompress the compress image then decrypted by hill cipher. Step 7: Receive image successfully. Step 8: End. The original image is selected and preprocessed for applying image encryption/decryption. The preprocessed image is encrypted using RSA, 2Bit Rotation and Hill cipher algorithm. B) RSA Algorithm: 1. Choose two prime p and q and find public modulus N=pq 2. Choose public exponent e=(p-1) (q-1) 1<e< (p-1) (q-1); 3. The pair (n,e) is a public key. 4. PrivateKey is an umique integer 1<d< (p-1) (q-1); Such ed=1 mod (p-1) (q-1) Encryption: Split a message into m1, m2, mt. 0≤mi≤n C=E (M) =>Me (mod n); Decryption: D(C) =Cd (mod n);
  • 5. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 07, Issue: 01, June 2018, Page No.59-67 ISSN: 2278-2397 63 M=Message C=Cipher text E=Encrypt D=Decrypt. So encryption pair of integer (e;n), decryption pair of integer(d;n). C) 2Bit Rotation: In bit rotation technique we will first converted images into grayscale images. Each pixel of images will have 8 bits as having intensity from 0 to 255 so each pixel represents 8 bits. Shift=code mod 7. Procedure: Step 1: Select the size of the image. Step 2: Generate the key by using pixel value of image. Step 3: Convert key value into binary format. Step 4: Then apply 2bit rotation. We apply this method our image will be more secure. D) Hill Cipher: Encryption mathematical statement is Y=AX Decryption mathematical statement is X=A-1 Y E) LOCO Technique: Low Complexity Lossless Compression is used to reduce the size of image without any loss and low complexity. It has two components: modeling and coding. IV . RESULT AND DISCUSSION This HMSCI Method has been implemented and evaluated for efficient using various images. Time complexity is tested for the performance of this method. A) Experimental setup: This method has been implemented in AMD Processor with speed 2.0 GHz,RAM 4GB and coded using C# in Visual Studio 2010. 4.1 SENDER: The home page of our work has two buttons like sender and receiver. Sender is going to encryption and compression. Receiver is going to decryption and decompression. The figure 3. Shows the encryption of lena image using RSA algorithm. Fig 3: Encryption by RSA algorithm
  • 6. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 07, Issue: 01, June 2018, Page No.59-67 ISSN: 2278-2397 64 The figure 4. Shows the encryption of lena image using 2bit rotation algorithm. Fig 4: Encrypted by 2 bit rotation The figure 5. Shows the encryption of lena image using Hill cipher algorithm Fig 5: Encrypted by hill cipher algorithm The image is encrypted successfully using three encryption techniques like RSA, 2 bit, hill cipher. Thefigure 6 shows the encrypted lena image using proposed algorithm. Fig 6: Encrypted image The figure 7 shows the image compressed using LOCO method.
  • 7. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 07, Issue: 01, June 2018, Page No.59-67 ISSN: 2278-2397 65 Fig 7: Compressed Image 4.2 RECEIVER: The encrypted image has been decrypted using HMSCI method. Then the decrypted image is compressed using LOCO method. The figure 8 shows the decompressed image using LOCO method. Fig 8: Decompressed image The figure 9 shows the decrypted image obtained using HMSCI method. Fig 9 : Decrypted image B) Performance Evaluation: This algorithm has been evaluated using time and size metrics.The table 1 shows the comparison time complexity of the conventional method with proposed model. The table show the proposed method outperform with conventional method in terms of security and time complexity.
  • 8. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 07, Issue: 01, June 2018, Page No.59-67 ISSN: 2278-2397 66 Table 1 shows the comparison of time complexity of the conventional model with proposed model. Encryption (time /s) Decryption (time /s) Conventional Method RSA [2] 2 BIT [6] HILL CIPHER [6] RSA [2] 2 BIT [6] HILL CIPHER [6] 2 2.1 2.0 2.2 2.0 1.5 HMSCI Model 1.2 1.0 1.0 1.3 1.0 1.0 Figure 10 shows comparison of encryption execution time conventional vs proposed method Figure 11 shows comparison of decryption execution time of conventional vs proposed method Table 2 shows the comparison of image size of the conventional model with proposed model. Lena Image Baboon Original image 01 MB 6.61 KB Wavelet Transform 36 KB 3.0 KB LOCO 2.32 KB 1.5 KB Fig 10 shows the comparison of encryption execution time of conventional and proposed method. Fig 11 shows the comparison of decryption execution time of conventional and proposed method. The table 2 shows the comparison image size of the conventional method with proposed model. The table show the proposed method outperform with conventional method in terms of reduce the image size. From the table 1 and table 2, it is observed that the HMSCI model outperform in terms of time and size complexity. 0 0.5 1 1.5 2 2.5 RSA 2 BIT HILL CIPHER Previous Work HMSCI Model 0 0.5 1 1.5 2 2.5 RSA 2 BIT HILL CIPHER Previous Work HMSCI Model
  • 9. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 07, Issue: 01, June 2018, Page No.59-67 ISSN: 2278-2397 67 V . CONCLUSION In this Paper “Performance analysis of Hybrid Method for Securing and Compressing Images” has been analyzed. This system is mainly developed to improve the Secure and efficiency of image transmission and decrease the image transmission time. This method use design developed, and tested for efficiency. This method HMSCI out performed in terms of security and reducing the size of image when compared with traditional methods. Optimization techniques may also be used for further improvement. References [1] Monika Suhag,” Improvement Protection In Rsa Algorithm Using 2 Bit Rotations” June-2016 Volume 3, Issue-6. [2] Devashish Vaghela,” Modified Key Based Image Encryption Using Rsa Algorithm” May 2016 | IJIRT | Volume 2 Issue 12 | ISSN: 2349-6002. [3] Samson chepuri,”An RGB image encryption using RSA algorithm” e-ISSN 2455–1392 Volume 3 Issue 3, March 2017 pp. 1 – 7. [4] Sneha ghoradkar ,”image encryption and decryption using AES algorithm” NCETACT-2015. [5] Monika Suhag ,” Review On Protection Of Data In Rsa Technique” June-2016 Volume 3, Issue-6. [6] Swati Kumari,” Encryption and Decryption Techniques: A Review” Volume: 03 Issue: 09 | Sep-2016 . [7] Kirti Sapra,” Modified Image Encryption Technique” volume1 issue6 august 2014. [8] Anandakumar,”Image Cryptography using RSA algorithm in network security” Vol.5 Issue. 5, May- 2017, pg. 1-14. [9] Zhiqiang Li, Xiaoxin Sun, and Qun Ding,” Design and Implementation in Image Compression Encryption of Digital Chaos Based on MATLAB” Volume 2,DOI: 10.1007/978-3-319-07773-4_50, c Springer International Publishing Switzerland 2014. [10] Sunita,” Image Encryption/Decryption Using RSA Algorithm” Vol.5 Issue. 5, May- 2017.