Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm

被引:9
作者
Deshpande, Kanaad [1 ]
Girkar, Junaid [1 ]
Mangrulkar, Ramchandra [1 ]
机构
[1] Dwarkadas Jivanlal Sanghvi Coll Engn, Dept Comp Engn, Mumbai, India
关键词
Encryption; block Cipher; Sudoku; symmetric key Cipher; modified thresholding; MAP;
D O I
10.1080/24751839.2023.2183802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a novel approach for encrypting images using a Sudoku as its encryption key. This algorithm uses both symmetric and asymmetric key cryptography. It works with any type of data, Sudoku size, and keyspace. The image undergoes the process of modified thresholding, using a pseudo-random number generated from a Sudoku as the threshold. This image is then padded with zeros or the average pixel values to ensure the dimensions are multiples of the Sudoku's size and the image rows are shuffled randomly. For each iteration, the image rows are shuffled, followed by the columns, and finally, the image is rotated clockwise by 90 degrees. The resultant image is highly encrypted and resilient to brute-forcing methods. The algorithm requires roughly 25 milliseconds per iteration for a colored square image of dimensions $512 \times 512$512x512 and has an NPCR value of 99.60% and a UACI value of 35.65%. The gargantuan keyspace offered by the Sudoku keys ensures obedience of Kirchoff's principle and Shannon's maxim.
引用
收藏
页码:270 / 303
页数:34
相关论文
共 48 条
[1]  
Abduljaleel I., 2021, International Journal of Electrical and Computer Engineering, V11, P5049
[2]  
Applebaum B., 2017, 8 INN THEOR COMP SCI
[3]   A new algorithm for the colored image encryption via the modified Chua's circuit [J].
Arpaci, Batuhan ;
Kurt, Erol ;
Celik, Kayhan .
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2020, 23 (03) :595-604
[4]   Design of high-speed blockchain-based sidechaining peer to peer communication protocol over 5G networks [J].
Balani, Nisha ;
Chavan, Pallavi ;
Ghonghe, Mangesh .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (25) :36699-36713
[5]  
Budiman F, 2020, Int J Intell Eng Syst, V13
[6]   Image Encryption with Variable Length Key [J].
Cao Guanghui ;
Zhang Xing ;
Liu Yanjun .
IETE TECHNICAL REVIEW, 2016, 33 (03) :297-309
[7]   Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-D chaotic cat map [J].
Choi, Un Sook ;
Cho, Sung Jin ;
Kim, Jin Gyoung ;
Kang, Sung Won ;
Kim, Han Doo .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) :22825-22842
[8]   A proposed mode for triple-DES encryption [J].
Coppersmith, D ;
Johnson, DB ;
Matyas, SM .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1996, 40 (02) :253-262
[9]   Sharing secured data on peer-to-peer applications using attribute-based encryption [J].
Dang, Nhan Tam ;
Tran, Ha Manh ;
Nguyen, Sinh Van ;
Maleszka, Marcin ;
Le, Hai-Duong .
JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2021, 5 (04) :440-459
[10]   Plain Text Encryption Using Sudoku Cipher [J].
Dey, Kashi Nath ;
Golui, Souvik ;
Dutta, Neha ;
Maji, Arnab Kumar ;
Pal, Rajat Kumar .
INTELLIGENT COMPUTING AND COMMUNICATION, ICICC 2019, 2020, 1034 :23-31