A Secure Image Encryption Algorithm Based on Rubik's Cube Principle
In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensi...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2012-01-01
|
Series: | Journal of Electrical and Computer Engineering |
Online Access: | http://dx.doi.org/10.1155/2012/173931 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841524755023265792 |
---|---|
author | Khaled Loukhaoukha Jean-Yves Chouinard Abdellah Berdai |
author_facet | Khaled Loukhaoukha Jean-Yves Chouinard Abdellah Berdai |
author_sort | Khaled Loukhaoukha |
collection | DOAJ |
description | In the past few years, several encryption algorithms based on chaotic systems have been proposed
as means to protect digital images against cryptographic attacks. These encryption algorithms typically
use relatively small key spaces and thus offer limited security, especially if they are one-dimensional.
In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. The
original image is scrambled using the principle of Rubik's cube. Then, XOR operator is applied to rows
and columns of the scrambled image using two secret keys. Finally, the experimental results and security
analysis show that the proposed image encryption scheme not only can achieve good encryption and
perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack. |
format | Article |
id | doaj-art-fc5a8134c13a4f049c8d39eba32a11b8 |
institution | Kabale University |
issn | 2090-0147 2090-0155 |
language | English |
publishDate | 2012-01-01 |
publisher | Wiley |
record_format | Article |
series | Journal of Electrical and Computer Engineering |
spelling | doaj-art-fc5a8134c13a4f049c8d39eba32a11b82025-02-03T05:47:28ZengWileyJournal of Electrical and Computer Engineering2090-01472090-01552012-01-01201210.1155/2012/173931173931A Secure Image Encryption Algorithm Based on Rubik's Cube PrincipleKhaled Loukhaoukha0Jean-Yves Chouinard1Abdellah Berdai2Department of Electrical and Computer Engineering, Laval University, QC, G1K 7P4, CanadaDepartment of Electrical and Computer Engineering, Laval University, QC, G1K 7P4, CanadaDepartment of Electrical and Computer Engineering, Laval University, QC, G1K 7P4, CanadaIn the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. The original image is scrambled using the principle of Rubik's cube. Then, XOR operator is applied to rows and columns of the scrambled image using two secret keys. Finally, the experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.http://dx.doi.org/10.1155/2012/173931 |
spellingShingle | Khaled Loukhaoukha Jean-Yves Chouinard Abdellah Berdai A Secure Image Encryption Algorithm Based on Rubik's Cube Principle Journal of Electrical and Computer Engineering |
title | A Secure Image Encryption Algorithm Based on Rubik's Cube Principle |
title_full | A Secure Image Encryption Algorithm Based on Rubik's Cube Principle |
title_fullStr | A Secure Image Encryption Algorithm Based on Rubik's Cube Principle |
title_full_unstemmed | A Secure Image Encryption Algorithm Based on Rubik's Cube Principle |
title_short | A Secure Image Encryption Algorithm Based on Rubik's Cube Principle |
title_sort | secure image encryption algorithm based on rubik s cube principle |
url | http://dx.doi.org/10.1155/2012/173931 |
work_keys_str_mv | AT khaledloukhaoukha asecureimageencryptionalgorithmbasedonrubikscubeprinciple AT jeanyveschouinard asecureimageencryptionalgorithmbasedonrubikscubeprinciple AT abdellahberdai asecureimageencryptionalgorithmbasedonrubikscubeprinciple AT khaledloukhaoukha secureimageencryptionalgorithmbasedonrubikscubeprinciple AT jeanyveschouinard secureimageencryptionalgorithmbasedonrubikscubeprinciple AT abdellahberdai secureimageencryptionalgorithmbasedonrubikscubeprinciple |