Open Access iconOpen Access

ARTICLE

crossmark

Efficient Technique for Image Cryptography Using Sudoku Keys

by M. A. P. Manimekalai1, M. Karthikeyan1, I. Thusnavis Bella Mary1, K. Martin Sagayam1, Ahmed A Elngar2, Unai Fernandez-Gamiz3, Hatıra Günerhan4,*

1 Department of ECE, Karunya Institute of Technology and Sciences, Coimbatore, 641114, India
2 Faculty of Computer and Artificial Intelligence, Beni-Suef University, Beni-Suef, 62511, Egypt
3 Nuclear Engineering and Fluid Mechanics Department, University of the Basque Country, Bilbao, 48940, Spain
4 Department of Mathematics, Faculty of Education, Kafkas University, Kars, 36100, Turkey

* Corresponding Author: Hatıra Günerhan. Email: email

(This article belongs to the Special Issue: Artificial Intelligence-based Smart Sensors for Industrial IoT Applications)

Computers, Materials & Continua 2023, 77(1), 1325-1353. https://doi.org/10.32604/cmc.2023.035856

Abstract

This paper proposes a cryptographic technique on images based on the Sudoku solution. Sudoku is a number puzzle, which needs applying defined protocols and filling the empty boxes with numbers. Given a small size of numbers as input, solving the sudoku puzzle yields an expanded big size of numbers, which can be used as a key for the Encryption/Decryption of images. In this way, the given small size of numbers can be stored as the prime key, which means the key is compact. A prime key clue in the sudoku puzzle always leads to only one solution, which means the key is always stable. This feature is the background for the paper, where the Sudoku puzzle output can be innovatively introduced in image cryptography. Sudoku solution is expanded to any size image using a sequence of expansion techniques that involve filling of the number matrix, Linear X-Y rotational shifting, and reverse shifting based on a standard zig-zag pattern. The crypto key for an image dictates the details of positions, where the image pixels have to be shuffled. Shuffling is made at two levels, namely pixel and sub-pixel (RGB) levels for an image, with the latter having more effective Encryption. The brought-out technique falls under the Image scrambling method with partial diffusion. Performance metrics are impressive and are given by a Histogram deviation of 0.997, a Correlation coefficient of 10−2 and an NPCR of 99.98%. Hence, it is evident that the image cryptography with the sudoku kept in place is more efficient against Plaintext and Differential attacks.

Keywords


Cite This Article

APA Style
Manimekalai, M.A.P., Karthikeyan, M., Mary, I.T.B., Martin Sagayam, K., Elngar, A.A. et al. (2023). Efficient technique for image cryptography using sudoku keys. Computers, Materials & Continua, 77(1), 1325-1353. https://doi.org/10.32604/cmc.2023.035856
Vancouver Style
Manimekalai MAP, Karthikeyan M, Mary ITB, Martin Sagayam K, Elngar AA, Fernandez-Gamiz U, et al. Efficient technique for image cryptography using sudoku keys. Comput Mater Contin. 2023;77(1):1325-1353 https://doi.org/10.32604/cmc.2023.035856
IEEE Style
M. A. P. Manimekalai et al., “Efficient Technique for Image Cryptography Using Sudoku Keys,” Comput. Mater. Contin., vol. 77, no. 1, pp. 1325-1353, 2023. https://doi.org/10.32604/cmc.2023.035856



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1124

    View

  • 359

    Download

  • 0

    Like

Share Link