×

A secure image encryption algorithm based on Rubik’s cube principle. (English) Zbl 1237.68080

Summary: In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik’s cube principle. The original image is scrambled using the principle of Rubik’s cube. Then, XOR operator is applied to rows and columns of the scrambled image using two secret keys. Finally, the experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.

MSC:

68P25 Data encryption (aspects in computer science)
68U10 Computing methodologies for image processing
PDF BibTeX XML Cite
Full Text: DOI

References:

[1] Z. Liu, L. Xu, C. Lin, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Optics and Lasers in Engineering, vol. 49, no. 4, pp. 542-546, 2011.
[2] Q. Guo, Z. Liu, and S. Liu, “Color image encryption by using Arnold and discrete fractional random transforms in IHS space,” Optics and Lasers in Engineering, vol. 48, no. 12, pp. 1174-1181, 2010.
[3] Z. Liu, H. Chen, T. Liu, et al., “Image encryption by using gyrator transform and Arnold transform,” Journal of Electronic Imaging, vol. 2, no. 4, pp. 345-351, 1993.
[4] R. Tao, X. Y. Meng, and Y. Wang, “Image encryption with multiorders of fractional fourier transforms,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 734-738, 2010.
[5] R. Zunino, “Fractal circuit layout for spatial decorrelation of images,” Electronics Letters, vol. 34, no. 20, pp. 1929-1930, 1998.
[6] G. Zhang and Q. Liu, “A novel image encryption method based on total shuffling scheme,” Optics Communications, vol. 284, no. 12, pp. 2775-2780, 2011.
[7] X.-Y. Zhao and G. Chen, “Ergodic matrix in image encryption,” in Proceedings of the 2nd International Conference on Image and Graphics, vol. 4875, pp. 394-401, August 2002.
[8] Z.-L. Zhu, W. Zhang, K.-W. Wong, and H. Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation,” Information Sciences, vol. 181, no. 6, pp. 1171-1186, 2011. · Zbl 05870615
[9] C. K. Huang and H. H. Nien, “Multi chaotic systems based pixel shuffle for image encryption,” Optics Communications, vol. 282, no. 11, pp. 2123-2127, 2009.
[10] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749-761, 2004. · Zbl 1049.94009
[11] X. Y. Wang, L. Yang, R. Liu, and A. Kadir, “A chaotic image encryption algorithm based on perceptron model,” Nonlinear Dynamics, vol. 62, no. 3, pp. 615-621, 2010. · Zbl 1209.94015
[12] Y. Wang, K. W. Wong, X. Liao, and G. Chen, “A new chaos-based fast image encryption algorithm,” Applied Soft Computing Journal, vol. 11, no. 1, pp. 514-522, 2011.
[13] S. Li, C. Li, G. Chen, N. G. Bourbakis, and K. T. Lo, “A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,” Signal Processing: Image Communication, vol. 23, no. 3, pp. 212-223, 2008.
[14] C. K. Huang, H. H. Nien, S. K. Changchien, and H. W. Shieh, “Image encryption with chaotic random codes by grey relational grade and Taguchi method,” Optics Communications, vol. 280, no. 2, pp. 300-310, 2007.
[15] S. Mazloom and A. M. Eftekhari-Moghadam, “Color image encryption based on Coupled Nonlinear Chaotic Map,” Chaos, Solitons and Fractals, vol. 42, no. 3, pp. 1745-1754, 2009. · Zbl 1198.94032
[16] Y. Tang, Z. Wang, and J. A. Fang, “Image encryption using chaotic coupled map lattices with time-varying delays,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2456-2468, 2010. · Zbl 1222.94012
[17] C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949. · Zbl 1200.94005
[18] O. Edward, Chaos in Dynamical Systems, Cambridge University Press, Cambridge, UK, 2nd edition, 2003.
[19] M. S. Baptista, “Cryptography with chaos,” Physics Letters, Section A, vol. 240, no. 1-2, pp. 50-54, 1998. · Zbl 0936.94013
[20] K. W. Wong, S. W. Ho, and C. K. Yung, “A chaotic cryptography scheme for generating short ciphertext,” Physics Letters, Section A, vol. 310, no. 1, pp. 67-73, 2003. · Zbl 1011.94013
[21] T. Xiang, X. Liao, G. Tang, Y. Chen, and K. W. Wong, “A novel block cryptosystem based on iterating a chaotic map,” Physics Letters, Section A, vol. 349, no. 1-4, pp. 109-115, 2006. · Zbl 1195.81041
[22] Z. Lin and H. Wang, “Efficient image encryption using a chaos-based PWL memristor,” IETE Technical Review, vol. 27, no. 4, pp. 318-325, 2010.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.