3-D Image Encryption Based on Rubik’s Cube and RC6 Algorithm

被引:13
作者
Helmy M. [1 ]
El-Rabaie E.-S.M. [1 ]
Eldokany I.M. [1 ]
El-Samie F.E.A. [1 ]
机构
[1] Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf
关键词
2-D elemental image array; 3-D image encryption; Orthogonal frequency division multiplexing (OFDM); RC6; Rubik’s cube;
D O I
10.1007/s13319-017-0145-8
中图分类号
学科分类号
摘要
A novel encryption algorithm based on the 3-D Rubik’s cube is proposed in this paper to achieve 3D encryption of a group of images. This proposed encryption algorithm begins with RC6 as a first step for encrypting multiple images, separately. After that, the obtained encrypted images are further encrypted with the 3-D Rubik’s cube. The RC6 encrypted images are used as the faces of the Rubik’s cube. From the concepts of image encryption, the RC6 algorithm adds a degree of diffusion, while the Rubik’s cube algorithm adds a degree of permutation. The simulation results demonstrate that the proposed encryption algorithm is efficient, and it exhibits strong robustness and security. The encrypted images are further transmitted over wireless Orthogonal Frequency Division Multiplexing (OFDM) system and decrypted at the receiver side. Evaluation of the quality of the decrypted images at the receiver side reveals good results. © 2017, 3D Research Center, Kwangwoon University and Springer-Verlag GmbH Germany.
引用
收藏
相关论文
共 17 条
[1]  
Verma H.K., Singh R.K., Performance analysis of RC6, Twofish and Rijndael Block Cipher Algorithms, International Journal of Computer Applications (0975–8887), 42, 16, pp. 1-7, (2012)
[2]  
Ebrahim M., Khan S., Khalid U.B., Symmetric algorithm survey: A comparative analysis, International Journal of Computer Applications (0975–8887), 61, 20, pp. 12-19, (2013)
[3]  
Sirisha M., Lakshmi S.V.V.S., Pixel transformation based on Rubik’s Cube Principle, International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3, 5, pp. 273-277, (2014)
[4]  
Hashim A.T., Mahdi J.A., Abdullah S.H., A proposed 512 bits RC6 encryption algorithm, IJCCCE, 10, 1, pp. 11-25, (2010)
[5]  
Yang M., Bourbakis N., Li S., Data-image-video encryption, IEEE Potentials, 23, 3, pp. 28-34, (2004)
[6]  
Praveenkumar P., Ashwin G., Agarwal S.P.K., Bharathi S.N., Venkatachalam V.S., Thenmozhi K., Amirtharajan R., Rubik’s cube blend with logistic map on RGB: A way for image encryption, Research Journal of Information Technology, 6, 3, pp. 207-215, (2014)
[7]  
Eldokany I., El-Rabaie E.-S.M., Elhalafawy S.M., Zein Eldin M.A., Shahieen M.H., Soliman N.F., El-Bendary M.A.M., El-Naby M.A., Al-kamali F.S., Elashry I.F., El-Samie F.E.A., Efficient transmission of encrypted images with OFDM in the presence of carrier frequency offset, Wireless Personal Communications, (2015)
[8]  
Yao W., Ye P., Li X., An effective privacy-preserving algorithm based on logistic map and Rubik’s cube transformation. Hindawi Publishing Corporation Discrete Dynamics in Nature and Society, Article ID 178585, (2014)
[9]  
Enugu S.R., FPGA implementation of RC6 algorithm for IPSec protocol, (2006)
[10]  
Ramia F., Qadir H., GMU. RC6 implementation including key scheduling using FPGA. ECE 646 Project, (2006)