EAI Endorsed Transactions on Scalable Information Systems Research Article 1 Performance Evaluation of Symmetrical Encryption Algorithms with Wavelet Based Compression Technique Neetu Gupta 1,2 , Ritu Vijay 2 and Hemant Kumar Gupta 3 1 Research Scholar, Computer Science & Engineering Department, Banasthali University, Banasthali, India. 2 3 Dean & Professor, Department of Electronics, Banasthali University, Banasthali, India. Professor, Department of Electronics & Communication Engg. Vaagdevi College of Engineering., Warangal, India. Abstract To overcome the different issues connected with security and limited bandwidth during transmission of images, compression and encryption play an important role. To measure the effect on the performance of compression technique followed by encryption techniques is a challenging task. In this paper, biorthogonal discrete wavelet transform (DWT) technique is proposed for compression which is followed by advanced encryption standard (AES) and data encryption standard (DES) technologies to achieve secure transmission of data. The performances of DWT-AES and DWT-DES Compression-encryption (CE) algorithms are analyzed based on statistical and differential parameters. We illustrate the authentication of results by applying the proposed CE algorithms over five standard test images and also by comparing with different state of the art methods. The results show that combination of DWT-DES CE methodology provides high quality of reconstructed image with robustness against different attacks. Keywords: Compression-encryption (CE), DWT-AES, DWT-DES, Security, attacks Received on 04 March 2020, accepted on 19 May 2020, published on 28 May 2020 Copyright © 2020 Neetu Gupta et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited. doi: 10.4108/eai.13-7-2018.164825 * Corresponding author. Email: ermcet1981@gmail.com 1. Introduction As the use of internet to transmit the information from sender to receiver is increasing in our daily lives. Security and bandwidth are the two important parameters during transmission of information. The large size information needs compression of data so that it can be transmit with limited bandwidth and minimal transmission time [1]. Every sender also wants to secure the information from various unethical attacks during transmission. To provide the security to transmitting data during transmission, encryption is performed [2]. So, compression and encryption are the two important methods during transmission of data where compression reduces the need of higher transmission bandwidth by minimizing the redundancy of data and encryption provides security to information against different attacks [3][4]. Compression and encryption, both processes are having key importance for secure transmission of images over minimal bandwidth. Compression and encryption processes can be used in either order i.e. compression prior to encryption or compression after the encryption. The advantages of using compression algorithm before applying encryption algorithms are as follows [5]: A. It reduces the possibility of decoding of encrypted image by hackers. B. It reduces the encryption/decryption algorithms execution time. C. It reduces the misuse of cryptanalysis. On the basis of redundancy removal methodology, the compression techniques are classified in two categories as Lossless and Lossy compression. Lossless compression EAI Endorsed Transactions on Scalable Information Systems 10 2020 - 12 2020 | Volume 7 | Issue 28 | e8