Image Encryption Using Modified Rubik’s Cube Algorithm

Author(s):  
Rupesh Kumar Sinha ◽  
Iti Agrawal ◽  
Kritika Jain ◽  
Anushka Gupta ◽  
S. S. Sahu
2012 ◽  
Vol 2012 ◽  
pp. 1-13 ◽  
Author(s):  
Khaled Loukhaoukha ◽  
Jean-Yves Chouinard ◽  
Abdellah Berdai

In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. The original image is scrambled using the principle of Rubik's cube. Then, XOR operator is applied to rows and columns of the scrambled image using two secret keys. Finally, the experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.


2014 ◽  
Vol 6 (3) ◽  
pp. 207-215 ◽  
Author(s):  
Padmapriya Praveenkum ◽  
G. Ashwin ◽  
S.P. Kartavya Agarwal ◽  
S. Naveen Bharathi ◽  
V. Suraj Venkatacha ◽  
...  

3D Research ◽  
2017 ◽  
Vol 8 (4) ◽  
Author(s):  
Mai Helmy ◽  
El-Sayed M. El-Rabaie ◽  
Ibrahim M. Eldokany ◽  
Fathi E. Abd El-Samie

2013 ◽  
Vol 2013 ◽  
pp. 1-10 ◽  
Author(s):  
Adrian-Viorel Diaconu ◽  
Khaled Loukhaoukha

A recently proposed secure image encryption scheme has drawn attention to the limited security offered by chaos-based image encryption schemes (mainly due to their relatively small key space) proposing a highly robust approach, based on Rubik's cube principle. This paper aims to study a newly designed image cryptosystem that uses the Rubik's cube principle in conjunction with a digital chaotic cipher. Thus, the original image is shuffled on Rubik's cube principle (due to its proven confusion properties), and then XOR operator is applied to rows and columns of the scrambled image using a chaos-based cipher (due to its proven diffusion properties). Finally, the experimental results and security analysis show that the newly proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist any cryptanalytic attacks (e.g., exhaustive attack, differential attack, statistical attack, etc.).


Sign in / Sign up

Export Citation Format

Share Document