A secure image encryption algorithm based on Rubik's cube principle
Reads0
Chats0
TLDR
Experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.Abstract:
In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. The original image is scrambled using the principle of Rubik's cube. Then, XOR operator is applied to rows and columns of the scrambled image using two secret keys. Finally, the experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.read more
Citations
More filters
Journal ArticleDOI
Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane
TL;DR: The use of a structured phase mask enhances the key space for encryption and also overcomes the problem of axis alignment associated with an optical set-up and is likely to provide enhanced security in view of the increased number of encryption parameters.
Journal ArticleDOI
Fully phase image encryption using double random-structured phase masks in gyrator domain
TL;DR: The computed values of mean squared error between the retrieved and the original image show the efficacy of the proposed scheme, and the scheme's sensitivity to the encryption parameters, and robustness against occlusion and multiplicative Gaussian noise attacks are investigated.
Journal ArticleDOI
Generating logistic chaotic sequence using geometric pattern to decompose and recombine the pixel values
R. Logeshwari,L. Rama Parvathy +1 more
TL;DR: A secure ( n, n )- Multi-Secret-Sharing (MSS) scheme using image scrambling algorithm which is based on the logistic chaotic sequence generated using the secret key which is retrieved from the geometric pattern named as spirograph which drawn by the users with their private values is proposed.
Journal ArticleDOI
An Improved Secure Image Encryption Algorithm Based on Rubik's Cube Principle and Digital Chaotic Cipher
TL;DR: This paper aims to study a newly designed image cryptosystem that uses the Rubik's cube principle in conjunction with a digital chaotic cipher to achieve good encryption and perfect hiding ability and can resist any cryptanalytic attacks.
Journal ArticleDOI
RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique
K. Shankar,P. Eswaran +1 more
TL;DR: The optimal PSNR value is attained using the cuckoo search (CS) algorithm when compared with the existing works and the public key is generated by utilizing the optimization technique.
References
More filters
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book
Chaos in dynamical systems
TL;DR: In the new edition of this classic textbook, the most important change is the addition of a completely new chapter on control and synchronization of chaos as mentioned in this paper, which will be of interest to advanced undergraduates and graduate students in science, engineering and mathematics taking courses in chaotic dynamics, as well as to researchers in the subject.
Chaos in dynamical systems
TL;DR: In the new edition of this classic textbook, the most important change is the addition of a completely new chapter on control and synchronization of chaos as discussed by the authors, which will be of interest to advanced undergraduates and graduate students in science, engineering and mathematics taking courses in chaotic dynamics, as well as to researchers in the subject.
Journal ArticleDOI
A symmetric image encryption scheme based on 3D chaotic cat maps
TL;DR: The two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme that uses the 3D cat map to shuffle the positions of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks.
Journal ArticleDOI
Cryptography with chaos
TL;DR: It is possible to encrypt a message using the ergodic property of the simple low-dimensional and chaotic logistic equation, in order to transfer the trajectory from an initial condition towards an ϵ-interval inside the logistic chaotic attractor.