Article

# A Secure Image Encryption Algorithm Based on the Rubik’s Cube Principle

Journal of Electrical and Computer Engineering 01/2012; DOI: 10.1155/2012/173931

- [Show abstract] [Hide abstract]

**ABSTRACT:**The significance of cipher communication has been strongly felt by the cyber law makers against hackers. In this direction a yet another double edged knife cipher methodology employing image encryption (first edge) and multilayered cryptic key (second edge) has been proposed. In this paper, a rapid key encryption procedure employing symmetric key adopting matrix array was practiced. A complex and multilayered key generation scheme employing pseudorandom sequence, DCT, quantization and scrambling was adapted. The operations like diffusion and substitutions were inherently inducted in the proposed scheme to provide faster convergence of cipher image. The effectiveness of the proposed scheme was verified by performing security analysis and also metrics evaluation. Further the presents results were compared with the available results and the merits of the same has been highlighted.AEU - International Journal of Electronics and Communications 11/2014; · 0.70 Impact Factor - [Show abstract] [Hide abstract]

**ABSTRACT:**With the advancement of technology and networking techniques, it is possible to transmit images at a lower bit rate and at the same time with high security. In order to fulfil the security needs of image transmission, several encryption, decryption and image encoding techniques have been put forward. The encryption discussed in this study is the PN (Pseudo Random Number) sequence based encryption using Joint Photographic Experts Group (JPEG) algorithm. In the proposed method, initially the image is portioned into blocks. Run length encoding is done for the level shifted image. Then Discrete Cosine Transform (DCT) and quantization was done and Difference of Quantized DC (DQDC) was calculated. Then the quantized blocks are shuffled based on the PN sequence and then the scrambled images are arranged in zigzag order. Then finally run length and Huffman lossless compression are done to eliminate the additional bits generated using PN codes. Metrics like correlation coefficient, Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR) were computed to prove the sternness of the proposed method.Journal of Artificial Intelligence 09/2014; 7(3):136-144. - [Show abstract] [Hide abstract]

**ABSTRACT:**Images excessively contribute to communication in this era of multimedia. When a user transfers images over an unsecured communication network, then the absolute protection is a challenging issue to conserve the confidentiality of images. Encryption is a method of retaining the secrecy of images. This paper provides the succinct introduction to the cryptography, moreover, includes a concise description of various elemental securities' criteria of the image encryption algorithms. This work presents the survey of diverse image encryption techniques and comparison of discrete image encoding approaches, at last discloses a conclusion and suggests future works. General Terms Image security, image encryption, image processing.International Journal of Computer Applications 07/2014; 13. · 0.82 Impact Factor

Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.