Series-1 (Jul. – Aug. 2022)Jul. – Aug. 2022 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Digital Image Encryption using Rubik's Cube Algorithm |
| Country | : | India |
| Authors | : | Gandhi Srushti || Ravi Gor |
| : | 10.9790/5728-1804011625 ![]() |
Abstract: An amazing digital multimedia revolution was marked at the end of the 20th century. In this revolution, images are extremely important to communicate in the present era of multimedia. In this world of hasty evolution of exchanging digital data as well as images, data protection is essential to protect data from the unauthorized parities. With the broad use of digital images of various fields, it is important to preserve the confidentiality of image's data from any party without authorization access. In this paper, encryption and decryption process is based on key which is generated randomly which is applied on Rubik's Cube Algorithm.
Key Words: Rubik cub,Scrambled image,image encryption-decryption, key generation
[1]. Chen, L., Yin, H., Yuan, L., Machado, J. T., Wu, R., &Alam, Z. (2021). Double color image encryption based on fractional order discrete improved Henon map and Rubik's cube transform. Signal Processing: Image Communication, 97, 116363.
[2]. Chepuri, S. (2017). An RGB image encryption using RSA algorithm. International Journal of Current Trends in Engineering & Research (IJCTER), 3(3), 1-7.
[3]. Devi. S. R, Rajarajeswari.V, Thenmozhi. K, RengarajanAmirtharajan and PraveenkumarP.(2018). Henon and LFSR assisted key based encryption. International Journal of Pure and Applied Mathematics, 119(16), 455-460.
[4]. Mousavi, M., &Sadeghiyan, B. (2021). A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box. Multimedia Tools and Applications, 80(9), 13157-13177.
[5]. Zhao, J., Zhang, T., Jiang, J., Fang, T., & Ma, H. (2022). Color Image Encryption Scheme Based On Alternate Quantum Walk and Controlled Rubik's Cube.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Inverse Trigonometric Functions |
| Country | : | India |
| Authors | : | Anvita Aggarwal |
| : | 10.9790/5728-1804012631 ![]() |
Abstract: To Find the Principal Value of an Inverse Trigonometric Functions using a Unit Circle, and analysing the domain and range of Inverse Trigonometric Functions.
[1]. https://courses.lumenlearning.com/boundless-algebra/chapter/trigonometric-functions-and-the-unit-circle/
[2]. https://www.khanacademy.org/math/precalculus/x9e81a4f98389efdf:trig/x9e81a4f98389efdf:inverse-trig/v/inverse-trig-functions-arcsin
[3]. https://www.ck12.org/na/inverse-trigonometric-functions-and-principal-value-branch-1/lesson/Inverse-Trigonometric-Functions-xii-maths/.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In recent years, security concerns have grown tremendously, necessitating extremely secure picture transmission. Image encryption based on chaos is gaining popularity as a more safe and stable method of securing images than previous encryption methods.. As a result, new chaotic dynamical systems with more advanced characteristics and models are being developed for this purpose. To investigate and analyze their complexity, they are subjected to various chaos detection techniques. This study looks at the frequency and effectiveness of chaos experiments performed on 18 discrete chaotic systems. As a result, three key facts must be understood. The emerging system must first be carefully analyzed using a suitable chaos detection method. Second, a system's chaotic and quasi regions must be represented in their complete. Third, the chaos's strength must be considered. These studies are essential for developing a highly secure nonlinear key for an attack-resistant encryption scheme.
Keywords –-; chaotic Maps; Chaos detection Algorithms; image encryption based on chaos.
[1]. Dhall S, Pal SK, Sharma K (2017) Cryptanalysis of image encryption based on a new 1D chaotic Signal processing, PII S0165–1684(17)30434–6, https://doi.org/10.1016/j.sigpro.2017.12.021
[2]. Liu Y, Zhang LY, Wang J, Zhang Y, Wong K-w (2016) Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure. Nonlinear Dynamics 84(4):2241–2250
[3]. Zhang Y, Xiao D, Wen W, Nan H (2014) Cryptanalysis of image scrambling based on chaotic sequences and vigen'ere cipher. Nonlinear Dynamics 78(1):235–240
[4]. Zhu Z-l, Zhang W,Wong K-w et al (2011) A chaos-based symmetric image encryption scheme using a bitlevel permutation. Inf Sci 181(6):1171–1186
[5]. Fu C, Meng W-h, Zhan Y-f et al (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010
