A Secure Image Encryption Algorithm Based on Rubik's Cube Principle

Journal of Electrical and Computer Engineering 01/2012; DOI: 10.1155/2012/173931


In the past few years, several encryption algorithms based on chaotic systems have been proposed
as means to protect digital images against cryptographic attacks. These encryption algorithms typically
uses relatively small key spaces and thus offers limited security, especially if they are one dimensional.
In this paper, we proposed a novel image encryption algorithm based on Rubik’s cube principle. The
original image is scrambled using the principle of Rubik’s cube. Then, XOR operator is applied to rows
and columns of the scrambled image using two secret keys. Finally, the experimental results and security
analysis show that the proposed image encryption scheme not only can achieve good encryption and
perfect hiding ability and resist to exhaustive attack, statistical attack and differential attack.

262 Reads
  • Source
    • "Where xi and yi are gray level value of two adjacent pixels, N is the number of pairs (xi, yi) and E(x) is the mean of xi and E(y) is the mean of yi [5] [6]. "
    [Show abstract] [Hide abstract]
    ABSTRACT: Images are widely used in many areas for various purposes. Some images may have confidential information, so security of secrete images is a major issue. Various image encryption algorithms provide security to images. However, traditional encryption techniques encode one image at a time, which leads to weak security in the encrypted image due to small size of the image. In this paper, an image encryption technique is imparted that concatenate four images of the same dimension into one and then produce single encrypted image. In result, encrypted image is more secure due to the large size. This encrypted image has high entropy and low correlation coefficient, so this encrypted image is more difficult to understand compared to four separated images. General Terms Image security and image processing
    International Journal of Computer Applications 07/2014; DOI:10.5120/17253-7595
  • Source
    • "Furthermore, UACI computes the variation in intensity of the corresponding pixel of the plainimage and the encrypted image [18]. If C1 and C2 are the two cipher image after and prior to 1 bit change in the original image, then NPCR and UACI can be calculated by following formula (7) and (8) respectively [24] "
    [Show abstract] [Hide abstract]
    ABSTRACT: Images excessively contribute to communication in this era of multimedia. When a user transfers images over an unsecured communication network, then the absolute protection is a challenging issue to conserve the confidentiality of images. Encryption is a method of retaining the secrecy of images. This paper provides the succinct introduction to the cryptography, moreover, includes a concise description of various elemental securities' criteria of the image encryption algorithms. This work presents the survey of diverse image encryption techniques and comparison of discrete image encoding approaches, at last discloses a conclusion and suggests future works. General Terms Image security, image encryption, image processing.
    International Journal of Computer Applications 07/2014; 13. DOI:10.5120/16854-6720
  • Source
    • "Cellular automata is also being used largely in image cryptography [8] [9], visual cryptography [10] [11] [12] and in image processing [13] [14]. Image cryptography is being done by other methods also[15] [16] [17]. In [17], a chaos based image encryption method has been proposed. "
    International Journal of Computer Applications 10/2013; 80(7):45-50. DOI:10.5120/13877-1760
Show more