2012
DOI: 10.1155/2012/173931
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Image Encryption Algorithm Based on Rubik′s Cube Principle

Abstract: In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. The original image is scrambled using the principle of Rubik's cube. Then, XOR operator is applied to rows and col… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

6
88
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 124 publications
(98 citation statements)
references
References 25 publications
6
88
0
1
Order By: Relevance
“…Other notable approaches include that due to Loukhoukha, Chouinard and Berdai [11] which is based on the principle of Rubiks Cube. The method was shown to have appreciable resistance to brute force attack.…”
Section: Related Workmentioning
confidence: 99%
“…Other notable approaches include that due to Loukhoukha, Chouinard and Berdai [11] which is based on the principle of Rubiks Cube. The method was shown to have appreciable resistance to brute force attack.…”
Section: Related Workmentioning
confidence: 99%
“…Four different techniques affine transformation and XOR operation [3] one-dimensional random scrambling [4] XOR operation and rotation [5] Three distinct onedimensional chaotic map [7] …”
Section: Size Of Image ( Kb)mentioning
confidence: 99%
“…So, different criteria are used to measure the capability of an image encryption algorithm and security level of encrypted image. One significant criterion is the correlation coefficient that is used for statistical analysis of encrypted image [4].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations