Open Access
ARTICLE
Efficient Technique for Image Cryptography Using Sudoku Keys
1 Department of ECE, Karunya Institute of Technology and Sciences, Coimbatore, 641114, India
2 Faculty of Computer and Artificial Intelligence, Beni-Suef University, Beni-Suef, 62511, Egypt
3 Nuclear Engineering and Fluid Mechanics Department, University of the Basque Country, Bilbao, 48940, Spain
4 Department of Mathematics, Faculty of Education, Kafkas University, Kars, 36100, Turkey
* Corresponding Author: Hatıra Günerhan. Email:
(This article belongs to the Special Issue: Artificial Intelligence-based Smart Sensors for Industrial IoT Applications)
Computers, Materials & Continua 2023, 77(1), 1325-1353. https://doi.org/10.32604/cmc.2023.035856
Received 07 September 2022; Accepted 27 February 2023; Issue published 31 October 2023
Abstract
This paper proposes a cryptographic technique on images based on the Sudoku solution. Sudoku is a number puzzle, which needs applying defined protocols and filling the empty boxes with numbers. Given a small size of numbers as input, solving the sudoku puzzle yields an expanded big size of numbers, which can be used as a key for the Encryption/Decryption of images. In this way, the given small size of numbers can be stored as the prime key, which means the key is compact. A prime key clue in the sudoku puzzle always leads to only one solution, which means the key is always stable. This feature is the background for the paper, where the Sudoku puzzle output can be innovatively introduced in image cryptography. Sudoku solution is expanded to any size image using a sequence of expansion techniques that involve filling of the number matrix, Linear X-Y rotational shifting, and reverse shifting based on a standard zig-zag pattern. The crypto key for an image dictates the details of positions, where the image pixels have to be shuffled. Shuffling is made at two levels, namely pixel and sub-pixel (RGB) levels for an image, with the latter having more effective Encryption. The brought-out technique falls under the Image scrambling method with partial diffusion. Performance metrics are impressive and are given by a Histogram deviation of 0.997, a Correlation coefficient of 10−2 and an NPCR of 99.98%. Hence, it is evident that the image cryptography with the sudoku kept in place is more efficient against Plaintext and Differential attacks.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.