Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm
ABSTRACTThis paper presents a novel approach for encrypting images using a Sudoku as its encryption key. This algorithm uses both symmetric and asymmetric key cryptography. It works with any type of data, Sudoku size, and keyspace. The image undergoes the process of modified thresholding, using a ps...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Taylor & Francis Group
2023-07-01
|
Series: | Journal of Information and Telecommunication |
Subjects: | |
Online Access: | https://www.tandfonline.com/doi/10.1080/24751839.2023.2183802 |
_version_ | 1797771220885700608 |
---|---|
author | Kanaad Deshpande Junaid Girkar Ramchandra Mangrulkar |
author_facet | Kanaad Deshpande Junaid Girkar Ramchandra Mangrulkar |
author_sort | Kanaad Deshpande |
collection | DOAJ |
description | ABSTRACTThis paper presents a novel approach for encrypting images using a Sudoku as its encryption key. This algorithm uses both symmetric and asymmetric key cryptography. It works with any type of data, Sudoku size, and keyspace. The image undergoes the process of modified thresholding, using a pseudo-random number generated from a Sudoku as the threshold. This image is then padded with zeros or the average pixel values to ensure the dimensions are multiples of the Sudoku's size and the image rows are shuffled randomly. For each iteration, the image rows are shuffled, followed by the columns, and finally, the image is rotated clockwise by 90 degrees. The resultant image is highly encrypted and resilient to brute-forcing methods. The algorithm requires roughly 25 milliseconds per iteration for a colored square image of dimensions [Formula: see text] and has an NPCR value of 99.60% and a UACI value of 35.65%. The gargantuan keyspace offered by the Sudoku keys ensures obedience of Kirchoff's principle and Shannon's maxim. |
first_indexed | 2024-03-12T21:34:21Z |
format | Article |
id | doaj.art-46753c7588f64b0b947f5a1c38316e88 |
institution | Directory Open Access Journal |
issn | 2475-1839 2475-1847 |
language | English |
last_indexed | 2024-03-12T21:34:21Z |
publishDate | 2023-07-01 |
publisher | Taylor & Francis Group |
record_format | Article |
series | Journal of Information and Telecommunication |
spelling | doaj.art-46753c7588f64b0b947f5a1c38316e882023-07-27T11:47:07ZengTaylor & Francis GroupJournal of Information and Telecommunication2475-18392475-18472023-07-017327030310.1080/24751839.2023.2183802Security enhancement and analysis of images using a novel Sudoku-based encryption algorithmKanaad Deshpande0Junaid Girkar1Ramchandra Mangrulkar2Department of Computer Engineering, Dwarkadas Jivanlal Sanghvi College of Engineering, Mumbai, IndiaDepartment of Computer Engineering, Dwarkadas Jivanlal Sanghvi College of Engineering, Mumbai, IndiaDepartment of Computer Engineering, Dwarkadas Jivanlal Sanghvi College of Engineering, Mumbai, IndiaABSTRACTThis paper presents a novel approach for encrypting images using a Sudoku as its encryption key. This algorithm uses both symmetric and asymmetric key cryptography. It works with any type of data, Sudoku size, and keyspace. The image undergoes the process of modified thresholding, using a pseudo-random number generated from a Sudoku as the threshold. This image is then padded with zeros or the average pixel values to ensure the dimensions are multiples of the Sudoku's size and the image rows are shuffled randomly. For each iteration, the image rows are shuffled, followed by the columns, and finally, the image is rotated clockwise by 90 degrees. The resultant image is highly encrypted and resilient to brute-forcing methods. The algorithm requires roughly 25 milliseconds per iteration for a colored square image of dimensions [Formula: see text] and has an NPCR value of 99.60% and a UACI value of 35.65%. The gargantuan keyspace offered by the Sudoku keys ensures obedience of Kirchoff's principle and Shannon's maxim.https://www.tandfonline.com/doi/10.1080/24751839.2023.2183802Encryptionblock CipherSudokusymmetric key Ciphermodified thresholding |
spellingShingle | Kanaad Deshpande Junaid Girkar Ramchandra Mangrulkar Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm Journal of Information and Telecommunication Encryption block Cipher Sudoku symmetric key Cipher modified thresholding |
title | Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm |
title_full | Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm |
title_fullStr | Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm |
title_full_unstemmed | Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm |
title_short | Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm |
title_sort | security enhancement and analysis of images using a novel sudoku based encryption algorithm |
topic | Encryption block Cipher Sudoku symmetric key Cipher modified thresholding |
url | https://www.tandfonline.com/doi/10.1080/24751839.2023.2183802 |
work_keys_str_mv | AT kanaaddeshpande securityenhancementandanalysisofimagesusinganovelsudokubasedencryptionalgorithm AT junaidgirkar securityenhancementandanalysisofimagesusinganovelsudokubasedencryptionalgorithm AT ramchandramangrulkar securityenhancementandanalysisofimagesusinganovelsudokubasedencryptionalgorithm |