An Encryption Algorithm by Scrambling Image with Sudoku Grids Matrix

Article Preview

Abstract:

An image encryption algorithm by scrambling both the pixel location and the pixel value with sudoku grids matrix is proposed in this paper. As there is a certain mapping mode Between the Natural order and the numeric order in the row, line and block in sudoku grids, the proposed algorithm adopts the sudoku grids as secret key and scrambles the image according to the certain mapping mode. The algorithm is suitable for image with any size. The simulation experiments show that it has good encryption efficiency and perfect encryption effects. Also the transferring attack can be distributed equally by the algorithm which has high robustness, and good restoration result is produced.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

4645-4650

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Ahmet M. Eskicioglu, John Town and Edward J. Delp, Security of digital entertainment content from creation to consumption[J]. Signal Processing: Image Communication, 2003, 18(4): 237-262.

DOI: 10.1016/s0923-5965(02)00143-1

Google Scholar

[2] Changgang Li, Zhengzhi Han, Haoran Zhang. Image Encryption Techniques: A Survey[J]. Journal of Computer Research and Develepment, 2002, 39(10): 1317-1322.

Google Scholar

[3] Zhi-Hong Guan, Fangjun Huang and Wenjie Guan. Image encryption algorithm[J]. Physics Letters A, 2005, 346: 153-157.

DOI: 10.1016/j.physleta.2005.08.006

Google Scholar

[4] http: /www. afjarvis. staff. shef. ac. uk/sudoku.

Google Scholar

[5] Shyong Jian Shyu, Image encryption by random grids[J]. Pattern Recognition, 2007, 40(3): 1014-1031.

DOI: 10.1016/j.patcog.2006.02.025

Google Scholar

[6] Chengmao Wu, Xiao-ping Tian, Tie-niu Tan, Scrambling quality evaluation method based on image distance measure[J], Computer Engineering and Design, 2009, 30(21): 4891-4894.

Google Scholar

[7] J. k. Su, J. J. Eggers and B. Girod. Optimum Attack on Digital watermarks and Its Defense[C]. Thirty-Fourth Asilomar Conference on Singals, Systems and Computers, Oct 29~Nov 1, 2000: 1836-1840.

DOI: 10.1109/acssc.2000.911305

Google Scholar