Image encryption using the Sudoku matrix

This paper introduces a new effective and lossless image encryption algorithm using a Sudoku Matrix to scramble and encrypt the image. The new algorithm encrypts an image through a three stage process. In the first stage, a reference Sudoku matrix is generated as the foundation for the encryption and scrambling processes. The image pixels' intensities are then changed by using the reference Sudoku matrix values, and then the pixels' positions are shuffled using the Sudoku matrix as a mapping process. The advantages of this method is useful for efficiently encrypting a variety of digital images, such as binary images, gray images, and RGB images without any quality loss. The security keys of the presented algorithm are the combination of the parameters in a 1D chaotic logistic map, a parameter to control the size of Sudoku Matrix and the number of iteration times desired for scrambling. The possible security key space is extremely large. The principles of the presented scheme could be applied to provide security for a variety of systems including image, audio and video systems.

[1]  Raphael C.-W. Phan,et al.  Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES) , 2004, Inf. Process. Lett..

[2]  Zhang Dinghui,et al.  Discrete Chaotic Encryption and Decryption of Digital Images , 2008, 2008 International Conference on Computer Science and Software Engineering.

[3]  Todd K. Moon,et al.  Sinkhorn Solves Sudoku , 2009, IEEE Transactions on Information Theory.

[4]  Rabab Kreidieh Ward,et al.  A new digital image scrambling method based on Fibonacci numbers , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[5]  D. Berthier The Hidden Logic of Sudoku , 2007 .

[6]  Tung-Shou Chen,et al.  A Minimal Euclidean Distance Searching Technique for Sudoku Steganography , 2008, 2008 International Symposium on Information Science and Engineering.

[7]  Chin-Chen Chang,et al.  An Information Hiding Scheme Using Sudoku , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[8]  Tung-Shou Chen,et al.  Steganography Using Sudoku Revisited , 2008, 2008 Second International Symposium on Intelligent Information Technology Application.

[9]  L. Aaronson,et al.  Sudoku Science , 2006, IEEE Spectrum.

[10]  Paul M. Chau,et al.  Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).

[11]  Yue Wu,et al.  A New Algorithm for Generating Unique-Solution Sudoku , 2008, 2008 Fourth International Conference on Natural Computation.

[12]  Timo Mantere,et al.  Solving, rating and generating Sudoku puzzles with GA , 2007, 2007 IEEE Congress on Evolutionary Computation.

[13]  Lei Tang,et al.  Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.

[14]  J. Fridrich Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[15]  Bertram Felgenhauer,et al.  Enumerating possible Sudoku grids , 2005 .