Open Access
ARTICLE
Efficient Technique for Image Cryptography Using Sudoku Keys
M. A. P. Manimekalai1, M. Karthikeyan1, I. Thusnavis Bella Mary1, K. Martin Sagayam1, Ahmed A Elngar2, Unai Fernandez-Gamiz3, Hatıra Günerhan4,*
1 Department of ECE, Karunya Institute of Technology and Sciences, Coimbatore, 641114, India
2 Faculty of Computer and Artificial Intelligence, Beni-Suef University, Beni-Suef, 62511, Egypt
3 Nuclear Engineering and Fluid Mechanics Department, University of the Basque Country, Bilbao, 48940, Spain
4 Department of Mathematics, Faculty of Education, Kafkas University, Kars, 36100, Turkey
* Corresponding Author: Hatıra Günerhan. Email:
(This article belongs to the Special Issue: Artificial Intelligence-based Smart Sensors for Industrial IoT Applications)
Computers, Materials & Continua 2023, 77(1), 1325-1353. https://doi.org/10.32604/cmc.2023.035856
Received 07 September 2022; Accepted 27 February 2023; Issue published 31 October 2023
Abstract
This paper proposes a cryptographic technique on images based
on the Sudoku solution. Sudoku is a number puzzle, which needs applying
defined protocols and filling the empty boxes with numbers. Given a small size
of numbers as input, solving the sudoku puzzle yields an expanded big size of
numbers, which can be used as a key for the Encryption/Decryption of images.
In this way, the given small size of numbers can be stored as the prime key,
which means the key is compact. A prime key clue in the sudoku puzzle always
leads to only one solution, which means the key is always stable. This feature
is the background for the paper, where the Sudoku puzzle output can be
innovatively introduced in image cryptography. Sudoku solution is expanded
to any size image using a sequence of expansion techniques that involve filling
of the number matrix, Linear X-Y rotational shifting, and reverse shifting
based on a standard zig-zag pattern. The crypto key for an image dictates
the details of positions, where the image pixels have to be shuffled. Shuffling
is made at two levels, namely pixel and sub-pixel (RGB) levels for an image,
with the latter having more effective Encryption. The brought-out technique
falls under the Image scrambling method with partial diffusion. Performance
metrics are impressive and are given by a Histogram deviation of 0.997, a
Correlation coefficient of 10
−2 and an NPCR of 99.98%. Hence, it is evident
that the image cryptography with the sudoku kept in place is more efficient
against Plaintext and Differential attacks.
Keywords
Cite This Article
APA Style
Manimekalai, M.A.P., Karthikeyan, M., Mary, I.T.B., Sagayam, K.M., Elngar, A.A. et al. (2023). Efficient technique for image cryptography using sudoku keys. Computers, Materials & Continua, 77(1), 1325-1353. https://doi.org/10.32604/cmc.2023.035856
Vancouver Style
Manimekalai MAP, Karthikeyan M, Mary ITB, Sagayam KM, Elngar AA, Fernandez-Gamiz U, et al. Efficient technique for image cryptography using sudoku keys. Computers Materials Continua . 2023;77(1):1325-1353 https://doi.org/10.32604/cmc.2023.035856
IEEE Style
M.A.P. Manimekalai et al., "Efficient Technique for Image Cryptography Using Sudoku Keys," Computers Materials Continua , vol. 77, no. 1, pp. 1325-1353. 2023. https://doi.org/10.32604/cmc.2023.035856