A Multi-level Secured Approach Using LBP and Spiral Scan Path

  • N. SubramanyanEmail author
  • S. Kiran
  • R. Pradeep Kumar Reddy
  • P. Manju Yadav
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 77)


The world is becoming more interconnected with the advent of Internet and new networking technologies. Security is becoming an important factor and a vital component while transmitting data in the communication channel. As the data is highly confidential, the most popular approach is cryptography which deals with the techniques of secret writing. The goal is to allow the intended recipients of a message to receive the message securely while preventing eavesdroppers from understanding the message. The techniques of cryptography and network security are fully growing, and these lead to the process of development of practical and readily available robust and dynamic techniques. The proposed method encrypts the data in three levels—using dynamically generated key, local binary pattern, gray code, and spiral scan path. Local binary pattern is a nonparametric descriptor which efficiently summarizes the local bits of data. Gray code along with spiral scan path provides high security.


Cryptography Eavesdropper Gray code Internet Local binary pattern Security Spiral scan path 


  1. 1.
    Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn, pp. 30–39. Prentice Hall, Upper Saddle River (2006)Google Scholar
  2. 2.
    Mohammed, B.B.: Automatic key generation of Caesar Cipher. Int. J. Eng. Trends Technol. 6(6), 2231–5381 (2013)Google Scholar
  3. 3.
    Huang, D., Shan, C., Ardabilian, M.: Local binary patterns and its application to facial image analysis: a survey. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 41(6), 765–781 (2011)CrossRefGoogle Scholar
  4. 4.
    Pradeep Kumar Reddy, R., Nagaraju, C.: Text encryption through level based privacy using DNA steganography. Int. J. Eng. Trends Technol. Comput. Sci. 3(3), 2278–6856 (2014)Google Scholar
  5. 5.
    Wakerly, J.F.: Digital Design: Principles and Practices, 4th edn, pp. 48–50. Pearson Education India, New Delhi (2009)Google Scholar
  6. 6.
    Singh, A., Goswami, L., Ur Rahman Khan, A.: A novel image encryption algorithm for enhanced security. Int. J. Eng. Res. Technol. (IJERT) 2(9)‚ 2942–2949 (2013)Google Scholar
  7. 7.
    Paul, M., Kumar Mandal, J.: A novel symmetric key cryptographic technique at bit level based on spiral matrix concept. In: International Conference on Information Technology, Electronics and Communications (ICITEC—2013), Bangalore, India, 30–31 March 2013, pp. 6–11 (2013)Google Scholar
  8. 8.
    Ramanujam, S., Karuppiah, M.: Designing an algorithm with high avalanche effect. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 11(1), 106–111 (2011)Google Scholar
  9. 9.
    Singh, S., Maakar, S.K., Kumar, S.: Performance analysis of DES and RSA cryptography. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 2(3), 418–422 (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • N. Subramanyan
    • 1
    Email author
  • S. Kiran
    • 1
  • R. Pradeep Kumar Reddy
    • 1
  • P. Manju Yadav
    • 2
  1. 1.Department of Computer Science and EngineeringY.S.R. Engineering College of Y.V.UProddaturIndia
  2. 2.Accenture Technologies Pvt. LtdHyderabadIndia

Personalised recommendations