EAI Endorsed Transactions
on Scalable Information Systems Research Article
1
Performance Evaluation of Symmetrical Encryption
Algorithms with Wavelet Based Compression Technique
Neetu Gupta
1,2
, Ritu Vijay
2
and Hemant Kumar Gupta
3
1
Research Scholar, Computer Science & Engineering Department, Banasthali University, Banasthali, India.
2
3
Dean & Professor, Department of Electronics, Banasthali University, Banasthali, India.
Professor, Department of Electronics & Communication Engg. Vaagdevi College of Engineering., Warangal,
India.
Abstract
To overcome the different issues connected with security and limited bandwidth during transmission of images,
compression and encryption play an important role. To measure the effect on the performance of compression technique
followed by encryption techniques is a challenging task. In this paper, biorthogonal discrete wavelet transform (DWT)
technique is proposed for compression which is followed by advanced encryption standard (AES) and data encryption
standard (DES) technologies to achieve secure transmission of data. The performances of DWT-AES and DWT-DES
Compression-encryption (CE) algorithms are analyzed based on statistical and differential parameters. We illustrate the
authentication of results by applying the proposed CE algorithms over five standard test images and also by comparing
with different state of the art methods. The results show that combination of DWT-DES CE methodology provides high
quality of reconstructed image with robustness against different attacks.
Keywords: Compression-encryption (CE), DWT-AES, DWT-DES, Security, attacks
Received on 04 March 2020, accepted on 19 May 2020, published on 28 May 2020
Copyright © 2020 Neetu Gupta et al., licensed to EAI. This is an open access article distributed under the terms of the
Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use,
distribution and reproduction in any medium so long as the original work is properly cited.
doi: 10.4108/eai.13-7-2018.164825
*
Corresponding author. Email: ermcet1981@gmail.com
1. Introduction
As the use of internet to transmit the information from
sender to receiver is increasing in our daily lives. Security
and bandwidth are the two important parameters during
transmission of information. The large size information
needs compression of data so that it can be transmit with
limited bandwidth and minimal transmission time [1].
Every sender also wants to secure the information from
various unethical attacks during transmission. To provide
the security to transmitting data during transmission,
encryption is performed [2]. So, compression and
encryption are the two important methods during
transmission of data where compression reduces the need of
higher transmission bandwidth by minimizing the
redundancy of data and encryption provides security to
information against different attacks [3][4]. Compression
and encryption, both processes are having key importance
for secure transmission of images over minimal bandwidth.
Compression and encryption processes can be used in either
order i.e. compression prior to encryption or compression
after the encryption. The advantages of using compression
algorithm before applying encryption algorithms are as
follows [5]:
A. It reduces the possibility of decoding of encrypted
image by hackers.
B. It reduces the encryption/decryption algorithms
execution time.
C. It reduces the misuse of cryptanalysis.
On the basis of redundancy removal methodology, the
compression techniques are classified in two categories as
Lossless and Lossy compression. Lossless compression
EAI Endorsed Transactions on
Scalable Information Systems
10 2020 - 12 2020 | Volume 7 | Issue 28 | e8