Abstract

In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one‐dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik′s cube principle. The original image is scrambled using the principle of Rubik′s cube. Then, XOR operator is applied to rows and columns of the scrambled image using two secret keys. Finally, the experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.

Highlights

  • A Secure Image Encryption Algorithm Based on Rubik’s Cube PrincipleIn the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks

  • The end of the 20th century was marked by an extraordinary technical revolution from analog to numerical as documents and equipments became increasingly used in various domains

  • The first measure is the number of pixels change rate (NPCR), which indicate the percentage of different pixels between two images

Read more

Summary

A Secure Image Encryption Algorithm Based on Rubik’s Cube Principle

In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and offer limited security, especially if they are one-dimensional. We proposed a novel image encryption algorithm based on Rubik’s cube principle. The original image is scrambled using the principle of Rubik’s cube. The experimental results and security analysis show that the proposed image encryption scheme can achieve good encryption and perfect hiding ability and can resist exhaustive attack, statistical attack, and differential attack

Introduction
Rubik’s Cube Image Encryption
Experimental Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.