Sudoku Associated Two Dimensional Bijections for Image Scrambling
نویسندگان
چکیده
Sudoku puzzles are now popular among people in many countries across the world with simple constraints that no repeated digits in each row, each column, or each block. In this paper, we demonstrate that the Sudoku configuration provides us a new alternative way of matrix element representation by using block-grid pair besides the conventional row-column pair. Moreover, we discover six more matrix element representations by using row-digit pair, digit-row pair, column-digit pair, digit-column pair, block-digit pair, and digit-block pair associated with a Sudoku matrix. These parametric Sudoku associated matrix element representations not only allow us to denote matrix elements in secret ways, but also provide us new parametric two-dimensional bijective mappings. We study these two-dimensional bijections in the problem of image scrambling and propose a simple but effective Sudoku Associated Image Scrambler only using Sudoku associated two dimensional bijections for image scrambling without bandwidth expansion. Our simulation results over a wide collection of image types and contents demonstrate the effectiveness and robustness of the proposed method. Scrambler performance analysis with comparisons to peer algorithms under various investigation methods, including human visual inspections, gray degree of scrambling, autocorrelation coefficient of adjacent pixels, and key space and key sensitivities, suggest that the proposed method outperforms or at least reaches state-of-the-art. Similar scrambling ideas are also applicable to other digital data forms such as audio and video.
منابع مشابه
Two Fibonacci P-code based image scrambling algorithms
Image scrambling is used to make images visually unrecognizable such that unauthorized users have difficulty decoding the scrambled image to access the original image. This article presents two new image scrambling algorithms based on Fibonacci p-code, a parametric sequence. The first algorithm works in spatial domain and the second in frequency domain (including JPEG domain). A parameter, p, i...
متن کاملA Novel Digital Image Encryption Scheme Based on Spatial-chaos
In order to improve the security of digital image transmission process, and accelerate the rate of information transfer, a novel spatial-chaos-based self-adapting image encryption scheme is proposed in this paper. Firstly, to obtain corresponding scrambling image, the spatial location of pixels of a revised digital image is shuffled by using extended 2D cat map. Then, two-dimensional pseudo-ran...
متن کاملA Study of Binary Image Encryption Using Partial Image Encryption Technique
Chung and Chang proposed an encryption scheme for binary images based on two-dimensional run-encoding (2DRE) and scan patterns. In this paper, we indicate that their scheme is still not secure and efficient enough. Hence, an improvement scheme is proposed. There are two contributions in the proposed improvement scheme using partial image encryption techniques. O n e i s t o scrambling the pixel...
متن کاملComparison of Two Kinds of Image Scrambling Methods Based on LSB Steganalysis
According to the research of LSB steganalysis, LSB steganography could destroy the distribution of 0 and 1 in the lowest bit planes, and this situation will cause the abnormality of histogram and asymmetry statistical, thereby left an opportunity that could be exploited to the steganalysis. From the view of steganalysis, this paper compared the two typical kinds of image scrambling methods whic...
متن کاملCipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1207.5856 شماره
صفحات -
تاریخ انتشار 2012