An Efficient Image Data Encryption Technique Based on RC4 and Blowfish Algorithm with Random Data Shuffling

  • Dharna SinghaiEmail author
  • Chetan Gupta
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 100)


In this work, an able safety structure has been proposed which is efficient in image data security as well as the image loss is minimum. In our approach, we have used the combination of RC4 and Blowfish algorithms. Blowfish is suitable for image data for which the key does not vary for a single cycle. It is not suitable where more compact ciphers are needed. Due to the advantages of RC4 substitution in different rounds and Blowfish algorithm for the image data, we have used the combination for image data security. Bit shuffling has been performed for the bit randomization and XOR operations, so that the proper bit shuffling is possible. Then, for comparative analysis, peak signal-to-noise ratio (PSNR) and mean square error (MSE) cover have been designed. It provides the comparative and analytical comparison based on the different images. Our results show that it is efficient in terms of information loss, MSE, and PSNR values.


Encryption Decryption PSNR MSE XOR RC4 


  1. 1.
    Wen W, Zhang Y, Fang Y, Fang Z (2016) A novel selective image encryption method based on saliency detection. In: Visual communications and image processing (VCIP), IEEE, 27–30 Nov 2016Google Scholar
  2. 2.
    Chatterjee A, Dhanotia J, Bhatia V, Rana S, Prakash S (2017) Optical image encryption using fringe projection profilometry fourier fringe analysis and RSA algorithm. In: 14th india council international conference (INDICON), IEEE, 2017Google Scholar
  3. 3.
    Dragoi IC, Coltuc D (2018) Reversible data hiding in encrypted color images based on vacating room after encryption and pixel prediction ioan. In: 25th IEEE (ICIP), 2018Google Scholar
  4. 4.
    Zhang Y, Li X, Hou W (2017) A fast image encryption scheme based on AES. In: 2nd international conference on image vision and computing (ICIVC), IEEE, 2017Google Scholar
  5. 5.
    Bhowmick A, Sinha N, Arjunan RV, Kishore B (2017) Permutation-substitution architecture based image encryption algorithm using middle square and RC4 PRNG. In: International conference on inventive systems and control (ICISC), IEEE, 2017Google Scholar
  6. 6.
    Gayathri SP, Sajeer M (2017) Chaotic system based image encryption of biometric characteristics for enhanced security. In: International conference on circuit, power and computing technologies (ICCPCT), IEEE, 2017Google Scholar
  7. 7.
    Nayak P, Nayak SK, Das S (2018) A secure and efficient color image encryption scheme based on two chaotic systems and advanced encryption standard. In: International conference on advances in computing, communications and informatics (ICACCI), IEEE, 2018Google Scholar
  8. 8.
    Guo L, Li J, Xue Q (2017) Joint image compression and encryption algorithm based on SPIHT and crossover operator. In: 14th international computer conference on wavelet active media technology and information processing (ICCWAMTIP), IEEE, 2017Google Scholar
  9. 9.
    Karthick S, Sankar SP, Prathab TR (2018) An approach for image encryption decryption based on quaternion fourier transform. In: International conference on emerging trends and innovations in engineering and technological research (ICETIETR), IEEE, 2018Google Scholar
  10. 10.
    Zhang Y, Zhang Q, Liao H, Wu W, Li X, Niu H (2017) A fast image encryption scheme based on public image and chaos. In: International conference on computing intelligence and information system (CIIS), IEEE, 2017Google Scholar
  11. 11.
    Joshy A, Baby KXA, Padma S, Fasila KA (2017) Text to image encryption technique using RGB substitution and AES. In: International conference on inventive computing and informatics (ICICI), IEEE, 2017Google Scholar
  12. 12.
    Takkar P, Girdhar A, Singh VP (2017) Image encryption algorithm using chaotic sequences and flipping. In: International conference on computing, communication and automation (ICCCA), IEEE, 2017Google Scholar
  13. 13.
    Chen D, Chen W, Chen J, Zheng P, Huang J (2018) Edge detection and image segmentation on encrypted image with homomorphic encryption and garbled circuit. In: International conference on multimedia and expo (ICME), IEEE, 2018Google Scholar
  14. 14.
    Lin J, Luo Y, Liu J, Bi J, Qiu S, Cen M, Liao Z (2018) An image compression-encryption algorithm based on cellular neural network and compressive sensing. In: 3rd international conference on image, vision and computing (ICIVC), IEEE, 2018Google Scholar
  15. 15.
    Zou Z (2018) A novel image encryption method based on modular matrix transformation and coordinate sampling. In: International conference on applied system invention (ICASI), IEEE, 2018Google Scholar
  16. 16.
    Chuman T, Sirichotedumrong W, Kiya H (2018) Encryption-then-compression systems using grayscale based image encryption for JPEG images. Trans Inf Forensics Secur, IEEE 2018Google Scholar
  17. 17.
    Kovalchuk A, Lotoshynska N (2018) Elements of RSA algorithm and extra noising in a binary linear-quadratic transformations during encryption and decryption of images. In: Second international conference on data stream mining & processing (DSMP), IEEE, 2018Google Scholar
  18. 18.
    Guo Y, Cao X, Wang R, Jin C (2018) A new data embedding method with a new data embedding domain for JPEG images. In: 2018 IEEE fourth international conference on multimedia big data (BigMM), IEEE, pp 1–5, 13 Sep 2018Google Scholar
  19. 19.
    Singh M, Ozarde P, Abhiram K (2018) Image processing based detection of counterfeit indian bank notes. In: 9th international conference on computing, communication and networking technologies (ICCCNT), IEEE, pp 1–5, 10 Jul 2018Google Scholar
  20. 20.
    Shrestha R, Pradhan SM, Karn R, Shrestha S (2018) Attendance and security assurance using image processing. In: Second international conference on computing methodologies and communication (ICCMC), IEEE, pp 544–548, 15 Feb 2018Google Scholar
  21. 21.
    Dhanva K, Harikrishnan M, Babu PU (2018) Cheque image security enhancement in online banking. In: Second international conference on inventive communication and computational technologies (ICICCT), IEEE, pp 1256–1260, 20 Apr 2018Google Scholar
  22. 22.
    Chen D, Chen W, Chen J, Zheng P, Huang J (2018) Edge detection and image segmentation on encrypted image with homomorphic encryption and garbled circuit. In: IEEE international conference on multimedia and expo (ICME), IEEE, pp 1–6, 23 Jul 2018Google Scholar
  23. 23.
    Yang D, Doh I, Chae K (2018) Secure medical image-sharing mechanism based on visual cryptography in EHR system. In: 20th international conference on advanced communication technology (ICACT), IEEE, pp 463–467, 11 Feb 2018Google Scholar
  24. 24.
    Chumuang N, Ketcham M, Yingthawornsuk T CCTV based surveillance system for railway station security. In: International conference on digital arts, media and technology (ICDAMT), IEEE, pp 7–12, 25 Feb 2018Google Scholar
  25. 25.
    Li H, Luo W, Qiu X, Huang J (2018) Identification of various image operations using residual-based features. IEEE Trans Circuits Syst Video Technol 28(1):31–45CrossRefGoogle Scholar
  26. 26.
    Usman MA, Usman MR (2018) Using image steganography for providing enhanced medical data security. In: 15th IEEE annual 2018 consumer communications & networking conference (CCNC), IEEE, pp 1–4, 12 Jan 2018Google Scholar
  27. 27.
    Abood MH (2017) An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms. In: annual conference on new trends in information & communications technology applications (NTICT), IEEE, pp 86–90, 7 Mar 2017Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringSIRTSBhopalIndia

Personalised recommendations