A Secure Image Encryption Algorithm Based on the Rubik’s Cube Principle

Journal of Electrical and Computer Engineering 01/2012; DOI: 10.1155/2012/173931

ABSTRACT In the past few years, several encryption algorithms based on chaotic systems have been proposed
as means to protect digital images against cryptographic attacks. These encryption algorithms typically
uses relatively small key spaces and thus offers limited security, especially if they are one dimensional.
In this paper, we proposed a novel image encryption algorithm based on Rubik’s cube principle. The
original image is scrambled using the principle of Rubik’s cube. Then, XOR operator is applied to rows
and columns of the scrambled image using two secret keys. Finally, the experimental results and security
analysis show that the proposed image encryption scheme not only can achieve good encryption and
perfect hiding ability and resist to exhaustive attack, statistical attack and differential attack.

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Images are widely used in many areas for various purposes. Some images may have confidential information, so security of secrete images is a major issue. Various image encryption algorithms provide security to images. However, traditional encryption techniques encode one image at a time, which leads to weak security in the encrypted image due to small size of the image. In this paper, an image encryption technique is imparted that concatenate four images of the same dimension into one and then produce single encrypted image. In result, encrypted image is more secure due to the large size. This encrypted image has high entropy and low correlation coefficient, so this encrypted image is more difficult to understand compared to four separated images. General Terms Image security and image processing
    International Journal of Computer Applications 07/2014; DOI:10.5120/17253-7595 · 0.82 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Images excessively contribute to communication in this era of multimedia. When a user transfers images over an unsecured communication network, then the absolute protection is a challenging issue to conserve the confidentiality of images. Encryption is a method of retaining the secrecy of images. This paper provides the succinct introduction to the cryptography, moreover, includes a concise description of various elemental securities' criteria of the image encryption algorithms. This work presents the survey of diverse image encryption techniques and comparison of discrete image encoding approaches, at last discloses a conclusion and suggests future works. General Terms Image security, image encryption, image processing.
    International Journal of Computer Applications 07/2014; 13. DOI:10.5120/16854-6720 · 0.82 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper proposes an efficient image cryptosystem based on permutation and diffusion operations in order to enhance the protection of iris-based systems against replay attacks. These attacks have been identified and located in different points by Ratha et al. [1]. First, the original image is partitioned into blocks, which are then permuted using a permutation key. After that, the Rubik's cube principle is applied to each block in order to obtain a scrambled image. Finally, the pixels values of rows and columns of the scrambled image are changed using XOR operator to generate the encrypted image. Experimental tests and security analysis have been carried out on iris images, chosen from CASIA database [2]. The obtained results clearly show the robustness of the proposed image cryptosystem against common attacks, namely exhaustive, differential and statistical attacks and also reveal the high security level achieved by the proposed algorithm.
    8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA) 2013, Algiers; 05/2013