Advanced Image Encryption & Decryption Using: Rubik's Cube Technology
Advanced Image Encryption & Decryption Using: Rubik's Cube Technology
Abstract: The world changing at a fast pace and more than Also, chaotic system are well-defined on real numbers
ever there’s this need to secure data and preserve one’s Although, chaos-based algorithms are used more often in
privacy. Advanced algorithms and technologies that can be image encryption in general, they have a high
used for secure transmission of texts, images and videos
are being tried and tested. We have used the Rubik’s Cube computational cost. whereas the cryptosystems are well-
Technology for secure encryption and decryption of defined on a finite set of integers. We are going to consider
colored images. the Rubik’s cube principle for image encryption. We are
Keywords: Rubik’s Cube Algorithm, Encryption, going to implement this algorithm which has been specified
Decryption, Coloured Images, Secure, Advanced and extensively studied in the papers mentioned below.
Published By:
Retrieval Number: 100.1/ijeat.C33310211322 Blue Eyes Intelligence Engineering
DOI: 10.35940/ijeat.C3331.0211322 and Sciences Publication (BEIESP)
Journal Website: www.ijeat.org 24 © Copyright: All rights reserved.
Advanced Image Encryption & Decryption using Rubik’s Cube Technology
IV. WORK DONE AND IMPLEMENTATION 7. Using vector 𝐾𝑅, XOR operation is performed on each
column of image𝐼1 using:
Methodology adapted: Rubik’s cube algorithm
𝖨ENC(𝑖,2𝑗−1)=𝖨1(𝑖,2𝑗−1)⊕𝐾𝑅(𝑗)
Encryption Algorithm
𝖨ENC(𝑖,2𝑗)=𝖨1(𝑖,2𝑗)⊕rot180(𝐾𝑅(𝑗))
Let l0=pixels values matrix of a α-bit grayscale image where rot180(𝐾𝑅) is the left to right flip of vector 𝐾𝑅.
(M×N). Steps involved in encryption are:
1. Create two vectors 𝐾𝑅 and 𝐾𝐶 with random values of 8. If ITER=ITERmax, encrypted image 𝐼ENC is created and
length 𝑀 and 𝑁, where the values in the vectors should encryption process is done; otherwise, the algorithm
be >0 and <2𝛼-(𝐾𝑅 and 𝐾𝐶 should not have constant branches to step 3.
values )
2. Set the iteration value, ITERmax, and initialize the 𝐾𝑅, 𝐾𝐶 & ITERmax are the secret keys.
counter ITER at 0.
3. Increment the counter by one: ITER=ITER+1. Decryption Algorithm:
4. For each row 𝑖 of image 𝐼𝑜,
a. calculate sum of all elements in the row, this sum Decrypted image, 𝐼𝑜, is obtained from the encrypted image,
is 𝐼ENC, and the secret keys, 𝐾𝑅, 𝐾𝐶, and ITERmax as
denoted by 𝛼(𝑖)=𝑁𝑗=1𝖨𝑜(𝑖,𝑗),𝑖=1,2,…,𝑀 follows in the following.
c. row is left or right, circular- shifted by K R(i) 2. Increment the counter by one: ITER=ITER+1.
positions to right or left direction and first pixel
3. Bitwise XOR operation is performed on 𝐾𝑅 vector and
each
column of the encrypted image IENC as follows:
If Mα(i)=0→right circular shift 4. Then, using the 𝐾𝐶 vector, the bitwise XOR operator is
else→left circular shift. applied to each row of image 𝐼1:
Published By:
Retrieval Number: 100.1/ijeat.C33310211322 Blue Eyes Intelligence Engineering
DOI: 10.35940/ijeat.C3331.0211322 and Sciences Publication (BEIESP)
Journal Website: www.ijeat.org 25 © Copyright: All rights reserved.
International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249-8958 (Online), Volume-11 Issue-3, February 2022
VIII. CONCLUSION
A unique picture encryption technique is proposed in this
research. This approach is based on the Rubik's cube to
develop image pixels. The proposed approach is stabilly
illustrated with precise quantitative analysis against various
forms of assaults such as analytical and parametric attacks.
Fig. 2 Encrypted Image The experiments also show that the proposed encryption
technique is suits for real-time Internet protection and
assessments as it is highly secured.
REFERENCES
1. Loukhaoukha, K., Chouinard, J. Y., & Berdai, A. (2012). A secure
image encryption algorithm based on Rubik's cube principle. Journal of
Electrical and Computer Engineering, 2012, 7.
2. Ionescu, V. M., & Diaconu, A. V. (2015, June). Rubik's cube principle
based image encryption algorithm implementation on mobile devices.
In 2015 the 7th International Conference on Electronics, Computers
and Artificial Intelligence (ECAI) (pp. P -31). IEEE.
3. Loukhaoukha, K., Nabti, M., & Zebbiche, K. (2013, May). An efficient
image encryption algorithm based on blocks permutation and Rubik's
cube principle for iris images. In 2013 8th International Workshop on
Systems, Signal Processing and their Applications (WoSSPA) (pp. 267-
272). IEEE.
4. Gomathi, T., & Shivakumar, B. L. (2015). Multistage Image
Encryption using Rubik's Cube for Secured Image Transmission.
International Journal of Advanced Research in Computer Science,
6(6).
5. Helmy, M., El-Rabaie, E. S. M., Eldokany, I. M., & El-Samie, F. E. A.
(2017). 3-D Image Encryption Based on Rubik’s Cube and RC6
Algorithm. 3D Research, 8(4), 38.
6. Abitha, K. A., & Bharathan, P. K. (2016). Secure Communication
Based on Rubik's Cube Algorithm and Chaotic Baker Map.
ProcediaTechnology,24,782,7
7. R.Vindhya & M.Brindha (2020). A chaos based image encryption
algorithm using Rubik’s cube and prime factorization process
(CIERPF). Journal of King Saud University - Computer and
Information Sciences
8. Joffin Joy & Litty Koshy(2019). RubiCrypt: Image Scrambling
Encryption System Based on Rubik’s Cube Configuration.IEEE
9. M. J. Aqel, Z. AlQadi, A. A. Abdullah(2018).RGB Color Image
EncryptionDecryption Using Image Segmentation and Matrix
Multiplication.International Journal of Engineering and Technology,
Vol. 7, No. 3.13, pp. 104-107, 2018
10. Majed O. Al-Dwairi, Amjad Y. Hendi & Ziad A. AlQadi(2019). An
Efficient and Highly Secure Technique to Encrypt and Decrypt Color
Images. Engineering, Technology & Applied Science Research Vol. 9,
No. 3, 2019, 4165-4168
AUTHORS PROFILE
Mudduluri RenuSree Varma, pursued his Bachelor
of Technology in electronics and communication
engineering from Vellore Institute of Technology,
Vellore. She is currently working as Incident
Response Analyst at Eli Lilly.
Published By:
Retrieval Number: 100.1/ijeat.C33310211322 Blue Eyes Intelligence Engineering
DOI: 10.35940/ijeat.C3331.0211322 and Sciences Publication (BEIESP)
Journal Website: www.ijeat.org 27 © Copyright: All rights reserved.