ACCENTS Transactions on Information Security, Vol 3(11) ISSN (Online): 2455-7196 http://dx.doi.org/10.19101/TIS.2018.311003 29 An efficient key-scheduling and bit shuffling algorithm for image data encryption Ravi Shankar Yadav 1* , Kailash Patidar 2 , Rishi Kushwah 3 and Gaurav Kumar Saxena 3 M.Tech Scholar, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Madhya Pradesh, India 1 Professor and HOD, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Madhya Pradesh, India 2 Assistant Professor, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Madhya Pradesh, India 3 ©2018 ACCENTS 1.Introduction In the age of communication there is the need of high level data security for the prospective of data communication. In this regard there is the need of image data security also. Data security is crucial now a day [1−5]. Data cryptography plays an important role in the data security [6-8]. Encryption helps hiding information to make it impenetrable without special knowledge [9]. Transposition and substitution are the two ways for achieving this [10, 11]. So in the subsequent segment we examine data Encryption technique for picture encryption [12]. We additionally talk about the noteworthy edges which are utilized as a bit of picture encryption with their motivations of interest and hindrances [13]. At long last considering the discussions we likewise propose some future comment which may be helpful in this bearing. *Author for correspondence There are various basic strategies which are unavoidable cryptography, for instance, private key cryptography, and hash [1420]. In private key cryptography, a solitary key is staying for both encryption and unraveling. This obliges meander if all else fails part pass on offering an emulate of the key and the key be struck by be passed swear off a protected channel to the accompanying person [21−24]. Private-key estimations are level indestructible and suitably acknowledged in apparatus. In this way they are on and well really for mass estimations encryption. The enormous please of the all-around adjusted encryption rely upon plaintext, encryption estimation, key and unscrambling calculation. The plaintext is the size ahead requiring the encryption check. It is joining of the commitments to the encryption tally. The encryption check is the estimation used to continue on deals with the information stranger plaintext to figure quiet. The mystery key is a for all intents and purposes indistinguishable to rebuff of the encryption figuring and of the plaintext and it is accomplice of the encryption's wellsprings of information tally [25, 26]. Research Article Abstract In this paper an efficient security framework has been proposed which is efficient in image data security as well as the image loss is minimum. In our approach we have used the combination of encryption algorithms. XOR operations are also applied for the bit randomization so that the proper bit shuffling is possible. Then histogram comparison has been provided for the image data for the different phases. Then the information loss is calculated based on the entropy values. Then for comparative analysis peak signal to noise ratio (PSNR) and mean square error (MSE) have been calculated. It provides the comparative and analytical comparison based on the different images. Our results show that it is efficient in terms of information loss, MSE and PSNR values. Keywords Encryption, Decryption, PSNR, MSE.