Abstract

Technology is evolving today more quickly than could have been anticipated. The benefits of these quick adjustments haven't lessened worries about data security. The Rubik's cube approach is used in the article to build security measures for images. Here, the image is encrypted using XOR operations and pixel shuffles, and it is decrypted in a similar manner. Using a key, the XOR operator is used to odd rows and columns of a photograph in order to muddle the relationship between genuine and encrypted images. The same key is reversed and used to align even picture rows and columns. And we discovered that it is a lot safer approach for encryption of images. This technology makes it possible to follow a good process for guaranteeing the security of the image files, which are transmitted practically every second. The algorithm has been tested on a variety of photo types, and the results are shown.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call