Back to Search Start Over

Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm.

Authors :
Deshpande, Kanaad
Girkar, Junaid
Mangrulkar, Ramchandra
Source :
Journal of Information & Telecommunication; Sep2023, Vol. 7 Issue 3, p270-303, 34p
Publication Year :
2023

Abstract

This paper presents a novel approach for encrypting images using a Sudoku as its encryption key. This algorithm uses both symmetric and asymmetric key cryptography. It works with any type of data, Sudoku size, and keyspace. The image undergoes the process of modified thresholding, using a pseudo-random number generated from a Sudoku as the threshold. This image is then padded with zeros or the average pixel values to ensure the dimensions are multiples of the Sudoku's size and the image rows are shuffled randomly. For each iteration, the image rows are shuffled, followed by the columns, and finally, the image is rotated clockwise by 90 degrees. The resultant image is highly encrypted and resilient to brute-forcing methods. The algorithm requires roughly 25 milliseconds per iteration for a colored square image of dimensions 512 × 512 and has an NPCR value of 99.60% and a UACI value of 35.65%. The gargantuan keyspace offered by the Sudoku keys ensures obedience of Kirchoff's principle and Shannon's maxim. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
24751839
Volume :
7
Issue :
3
Database :
Complementary Index
Journal :
Journal of Information & Telecommunication
Publication Type :
Academic Journal
Accession number :
168582603
Full Text :
https://doi.org/10.1080/24751839.2023.2183802