Abstract
In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one‐dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik′s cube principle. The original image is scrambled using the principle of Rubik′s cube. Then, XOR operator is applied to rows and columns of the scrambled image using two secret keys. Finally, the experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.
Highlights
A Secure Image Encryption Algorithm Based on Rubik’s Cube PrincipleIn the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks
The end of the 20th century was marked by an extraordinary technical revolution from analog to numerical as documents and equipments became increasingly used in various domains
The first measure is the number of pixels change rate (NPCR), which indicate the percentage of different pixels between two images
Summary
In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and offer limited security, especially if they are one-dimensional. We proposed a novel image encryption algorithm based on Rubik’s cube principle. The original image is scrambled using the principle of Rubik’s cube. The experimental results and security analysis show that the proposed image encryption scheme can achieve good encryption and perfect hiding ability and can resist exhaustive attack, statistical attack, and differential attack
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.