sis 18: e8

Research Article

Performance Evaluation of Symmetrical Encryption Algorithms with Wavelet Based Compression Technique

Download108 downloads
  • @ARTICLE{10.4108/eai.13-7-2018.164825,
        author={Neetu Gupta and Ritu Vijay and Hemant Kumar Gupta},
        title={Performance Evaluation of Symmetrical Encryption Algorithms with Wavelet Based Compression Technique},
        journal={EAI Endorsed Transactions on Scalable Information Systems: Online First},
        volume={},
        number={},
        publisher={EAI},
        journal_a={SIS},
        year={2020},
        month={5},
        keywords={Compression-encryption (CE), DWT-AES, DWT-DES, Security, attacks},
        doi={10.4108/eai.13-7-2018.164825}
    }
    
  • Neetu Gupta
    Ritu Vijay
    Hemant Kumar Gupta
    Year: 2020
    Performance Evaluation of Symmetrical Encryption Algorithms with Wavelet Based Compression Technique
    SIS
    EAI
    DOI: 10.4108/eai.13-7-2018.164825
Neetu Gupta1,2,*, Ritu Vijay2, Hemant Kumar Gupta3
  • 1: Research Scholar, Computer Science & Engineering Department, Banasthali University, Banasthali, India
  • 2: Department of Electronics, Banasthali University, Banasthali, India
  • 3: Professor, Department of Electronics & Communication Engg. Vaagdevi College of Engineering., Warangal, India
*Contact email: ermcet1981@gmail.com

Abstract

To overcome the different issues connected with security and limited bandwidth during transmission of images, compression and encryption play an important role. To measure the effect on the performance of compression technique followed by encryption techniques is a challenging task. In this paper, biorthogonal discrete wavelet transform (DWT) technique is proposed for compression which is followed by advanced encryption standard (AES) and data encryption standard (DES) technologies to achieve secure transmission of data. The performances of DWT-AES and DWT-DES Compression-encryption (CE) algorithms are analyzed based on statistical and differential parameters. We illustrate the authentication of results by applying the proposed CE algorithms over five standard test images and also by comparing with different state of the art methods. The results show that combination of DWT-DES CE methodology provides high quality of reconstructed image with robustness against different attacks.