A Secure Image Encryption Algorithm Based on the Rubik’s Cube Principle

Journal of Electrical and Computer Engineering 01/2012; DOI: 10.1155/2012/173931

ABSTRACT In the past few years, several encryption algorithms based on chaotic systems have been proposed
as means to protect digital images against cryptographic attacks. These encryption algorithms typically
uses relatively small key spaces and thus offers limited security, especially if they are one dimensional.
In this paper, we proposed a novel image encryption algorithm based on Rubik’s cube principle. The
original image is scrambled using the principle of Rubik’s cube. Then, XOR operator is applied to rows
and columns of the scrambled image using two secret keys. Finally, the experimental results and security
analysis show that the proposed image encryption scheme not only can achieve good encryption and
perfect hiding ability and resist to exhaustive attack, statistical attack and differential attack.

1 Bookmark
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The significance of cipher communication has been strongly felt by the cyber law makers against hackers. In this direction a yet another double edged knife cipher methodology employing image encryption (first edge) and multilayered cryptic key (second edge) has been proposed. In this paper, a rapid key encryption procedure employing symmetric key adopting matrix array was practiced. A complex and multilayered key generation scheme employing pseudorandom sequence, DCT, quantization and scrambling was adapted. The operations like diffusion and substitutions were inherently inducted in the proposed scheme to provide faster convergence of cipher image. The effectiveness of the proposed scheme was verified by performing security analysis and also metrics evaluation. Further the presents results were compared with the available results and the merits of the same has been highlighted.
    AEU - International Journal of Electronics and Communications 11/2014; · 0.70 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: With the advancement of technology and networking techniques, it is possible to transmit images at a lower bit rate and at the same time with high security. In order to fulfil the security needs of image transmission, several encryption, decryption and image encoding techniques have been put forward. The encryption discussed in this study is the PN (Pseudo Random Number) sequence based encryption using Joint Photographic Experts Group (JPEG) algorithm. In the proposed method, initially the image is portioned into blocks. Run length encoding is done for the level shifted image. Then Discrete Cosine Transform (DCT) and quantization was done and Difference of Quantized DC (DQDC) was calculated. Then the quantized blocks are shuffled based on the PN sequence and then the scrambled images are arranged in zigzag order. Then finally run length and Huffman lossless compression are done to eliminate the additional bits generated using PN codes. Metrics like correlation coefficient, Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR) were computed to prove the sternness of the proposed method.
    Journal of Artificial Intelligence 09/2014; 7(3):136-144.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Images excessively contribute to communication in this era of multimedia. When a user transfers images over an unsecured communication network, then the absolute protection is a challenging issue to conserve the confidentiality of images. Encryption is a method of retaining the secrecy of images. This paper provides the succinct introduction to the cryptography, moreover, includes a concise description of various elemental securities' criteria of the image encryption algorithms. This work presents the survey of diverse image encryption techniques and comparison of discrete image encoding approaches, at last discloses a conclusion and suggests future works. General Terms Image security, image encryption, image processing.
    International Journal of Computer Applications 07/2014; 13. · 0.82 Impact Factor


1 Download