scispace - formally typeset
Open AccessJournal ArticleDOI

A secure image encryption algorithm based on Rubik's cube principle

Reads0
Chats0
TLDR
Experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.
Abstract
In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. The original image is scrambled using the principle of Rubik's cube. Then, XOR operator is applied to rows and columns of the scrambled image using two secret keys. Finally, the experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane

TL;DR: The use of a structured phase mask enhances the key space for encryption and also overcomes the problem of axis alignment associated with an optical set-up and is likely to provide enhanced security in view of the increased number of encryption parameters.
Journal ArticleDOI

Fully phase image encryption using double random-structured phase masks in gyrator domain

TL;DR: The computed values of mean squared error between the retrieved and the original image show the efficacy of the proposed scheme, and the scheme's sensitivity to the encryption parameters, and robustness against occlusion and multiplicative Gaussian noise attacks are investigated.
Journal ArticleDOI

Generating logistic chaotic sequence using geometric pattern to decompose and recombine the pixel values

TL;DR: A secure ( n, n )- Multi-Secret-Sharing (MSS) scheme using image scrambling algorithm which is based on the logistic chaotic sequence generated using the secret key which is retrieved from the geometric pattern named as spirograph which drawn by the users with their private values is proposed.
Journal ArticleDOI

An Improved Secure Image Encryption Algorithm Based on Rubik's Cube Principle and Digital Chaotic Cipher

TL;DR: This paper aims to study a newly designed image cryptosystem that uses the Rubik's cube principle in conjunction with a digital chaotic cipher to achieve good encryption and perfect hiding ability and can resist any cryptanalytic attacks.
Journal ArticleDOI

RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique

TL;DR: The optimal PSNR value is attained using the cuckoo search (CS) algorithm when compared with the existing works and the public key is generated by utilizing the optimization technique.
References
More filters
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book

Chaos in dynamical systems

TL;DR: In the new edition of this classic textbook, the most important change is the addition of a completely new chapter on control and synchronization of chaos as mentioned in this paper, which will be of interest to advanced undergraduates and graduate students in science, engineering and mathematics taking courses in chaotic dynamics, as well as to researchers in the subject.

Chaos in dynamical systems

TL;DR: In the new edition of this classic textbook, the most important change is the addition of a completely new chapter on control and synchronization of chaos as discussed by the authors, which will be of interest to advanced undergraduates and graduate students in science, engineering and mathematics taking courses in chaotic dynamics, as well as to researchers in the subject.
Journal ArticleDOI

A symmetric image encryption scheme based on 3D chaotic cat maps

TL;DR: The two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme that uses the 3D cat map to shuffle the positions of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks.
Journal ArticleDOI

Cryptography with chaos

TL;DR: It is possible to encrypt a message using the ergodic property of the simple low-dimensional and chaotic logistic equation, in order to transfer the trajectory from an initial condition towards an ϵ-interval inside the logistic chaotic attractor.
Related Papers (5)