A secure image encryption algorithm based on Rubik's cube principle (Q415819): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: A symmetric image encryption scheme based on 3D chaotic cat maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: A chaotic image encryption algorithm based on perceptron model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Color image encryption based on coupled nonlinear chaotic map / rank
 
Normal rank
Property / cites work
 
Property / cites work: Image encryption using chaotic coupled map lattices with time-varying delays / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Theory of Secrecy Systems* / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography with chaos / rank
 
Normal rank
Property / cites work
 
Property / cites work: A chaotic cryptography scheme for generating short ciphertext / rank
 
Normal rank
Property / cites work
 
Property / cites work: A novel block cryptosystem based on iterating a chaotic map / rank
 
Normal rank

Latest revision as of 04:46, 5 July 2024

scientific article
Language Label Description Also known as
English
A secure image encryption algorithm based on Rubik's cube principle
scientific article

    Statements

    A secure image encryption algorithm based on Rubik's cube principle (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    9 May 2012
    0 references
    Summary: In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. The original image is scrambled using the principle of Rubik's cube. Then, XOR operator is applied to rows and columns of the scrambled image using two secret keys. Finally, the experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.
    0 references
    0 references
    image encryption
    0 references
    Rubik's cube principle
    0 references
    0 references
    0 references