Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm

ABSTRACTThis paper presents a novel approach for encrypting images using a Sudoku as its encryption key. This algorithm uses both symmetric and asymmetric key cryptography. It works with any type of data, Sudoku size, and keyspace. The image undergoes the process of modified thresholding, using a ps...

Full description

Bibliographic Details
Main Authors: Kanaad Deshpande, Junaid Girkar, Ramchandra Mangrulkar
Format: Article
Language:English
Published: Taylor & Francis Group 2023-07-01
Series:Journal of Information and Telecommunication
Subjects:
Online Access:https://www.tandfonline.com/doi/10.1080/24751839.2023.2183802
_version_ 1797771220885700608
author Kanaad Deshpande
Junaid Girkar
Ramchandra Mangrulkar
author_facet Kanaad Deshpande
Junaid Girkar
Ramchandra Mangrulkar
author_sort Kanaad Deshpande
collection DOAJ
description ABSTRACTThis paper presents a novel approach for encrypting images using a Sudoku as its encryption key. This algorithm uses both symmetric and asymmetric key cryptography. It works with any type of data, Sudoku size, and keyspace. The image undergoes the process of modified thresholding, using a pseudo-random number generated from a Sudoku as the threshold. This image is then padded with zeros or the average pixel values to ensure the dimensions are multiples of the Sudoku's size and the image rows are shuffled randomly. For each iteration, the image rows are shuffled, followed by the columns, and finally, the image is rotated clockwise by 90 degrees. The resultant image is highly encrypted and resilient to brute-forcing methods. The algorithm requires roughly 25 milliseconds per iteration for a colored square image of dimensions [Formula: see text] and has an NPCR value of 99.60% and a UACI value of 35.65%. The gargantuan keyspace offered by the Sudoku keys ensures obedience of Kirchoff's principle and Shannon's maxim.
first_indexed 2024-03-12T21:34:21Z
format Article
id doaj.art-46753c7588f64b0b947f5a1c38316e88
institution Directory Open Access Journal
issn 2475-1839
2475-1847
language English
last_indexed 2024-03-12T21:34:21Z
publishDate 2023-07-01
publisher Taylor & Francis Group
record_format Article
series Journal of Information and Telecommunication
spelling doaj.art-46753c7588f64b0b947f5a1c38316e882023-07-27T11:47:07ZengTaylor & Francis GroupJournal of Information and Telecommunication2475-18392475-18472023-07-017327030310.1080/24751839.2023.2183802Security enhancement and analysis of images using a novel Sudoku-based encryption algorithmKanaad Deshpande0Junaid Girkar1Ramchandra Mangrulkar2Department of Computer Engineering, Dwarkadas Jivanlal Sanghvi College of Engineering, Mumbai, IndiaDepartment of Computer Engineering, Dwarkadas Jivanlal Sanghvi College of Engineering, Mumbai, IndiaDepartment of Computer Engineering, Dwarkadas Jivanlal Sanghvi College of Engineering, Mumbai, IndiaABSTRACTThis paper presents a novel approach for encrypting images using a Sudoku as its encryption key. This algorithm uses both symmetric and asymmetric key cryptography. It works with any type of data, Sudoku size, and keyspace. The image undergoes the process of modified thresholding, using a pseudo-random number generated from a Sudoku as the threshold. This image is then padded with zeros or the average pixel values to ensure the dimensions are multiples of the Sudoku's size and the image rows are shuffled randomly. For each iteration, the image rows are shuffled, followed by the columns, and finally, the image is rotated clockwise by 90 degrees. The resultant image is highly encrypted and resilient to brute-forcing methods. The algorithm requires roughly 25 milliseconds per iteration for a colored square image of dimensions [Formula: see text] and has an NPCR value of 99.60% and a UACI value of 35.65%. The gargantuan keyspace offered by the Sudoku keys ensures obedience of Kirchoff's principle and Shannon's maxim.https://www.tandfonline.com/doi/10.1080/24751839.2023.2183802Encryptionblock CipherSudokusymmetric key Ciphermodified thresholding
spellingShingle Kanaad Deshpande
Junaid Girkar
Ramchandra Mangrulkar
Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm
Journal of Information and Telecommunication
Encryption
block Cipher
Sudoku
symmetric key Cipher
modified thresholding
title Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm
title_full Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm
title_fullStr Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm
title_full_unstemmed Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm
title_short Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm
title_sort security enhancement and analysis of images using a novel sudoku based encryption algorithm
topic Encryption
block Cipher
Sudoku
symmetric key Cipher
modified thresholding
url https://www.tandfonline.com/doi/10.1080/24751839.2023.2183802
work_keys_str_mv AT kanaaddeshpande securityenhancementandanalysisofimagesusinganovelsudokubasedencryptionalgorithm
AT junaidgirkar securityenhancementandanalysisofimagesusinganovelsudokubasedencryptionalgorithm
AT ramchandramangrulkar securityenhancementandanalysisofimagesusinganovelsudokubasedencryptionalgorithm