1,620
Views
2
CrossRef citations to date
0
Altmetric
Articles

Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm

ORCID Icon, ORCID Icon & ORCID Icon
Pages 270-303 | Received 02 Jan 2023, Accepted 14 Feb 2023, Published online: 22 Mar 2023

Figures & data

Algorithm 1 Read Image, Store Keys

Algorithm 2 Generate Pseudo Random & Perform Thresholding

Algorithm 3 Image Padding

Algorithm 4 Sudoku Based Encryption

Algorithm 5 Sudoku Based Decryption of Encrypted Image

Algorithm 6 Remove Image Padding

Algorithm 7 Restore original image by reversing thresholding

Figure 1. Flow diagram of the encryption process.

Figure 1. Flow diagram of the encryption process.

Figure 2. Flow diagram of the decryption process.

Figure 2. Flow diagram of the decryption process.

Figure 3. Image 1 before encryption.

Figure 3. Image 1 before encryption.

Figure 4. Image 1 after modified thresholding.

Figure 4. Image 1 after modified thresholding.

Figure 5. Image 1 after 50 iterations.

Figure 5. Image 1 after 50 iterations.

Figure 6. Image 1 after 75 iterations.

Figure 6. Image 1 after 75 iterations.

Figure 7. Image 1 after 100 iterations.

Figure 7. Image 1 after 100 iterations.

Figure 8. Image 1 after decryption.

Figure 8. Image 1 after decryption.

Figure 9. Color Histogram before Encryption.

Figure 9. Color Histogram before Encryption.

Figure 10. Color Histogram after Encryption.

Figure 10. Color Histogram after Encryption.

Figure 11. Image 2 before encryption.

Figure 11. Image 2 before encryption.

Figure 12. Image 2 after modified thresholding.

Figure 12. Image 2 after modified thresholding.

Figure 13. Image 2 after 50 iterations.

Figure 13. Image 2 after 50 iterations.

Figure 14. Image 2 after 75 iterations.

Figure 14. Image 2 after 75 iterations.

Figure 15. Image 2 after 100 iterations.

Figure 15. Image 2 after 100 iterations.

Figure 16. Image 2 after decryption.

Figure 16. Image 2 after decryption.

Figure 17. Color Histogram before Encryption.

Figure 17. Color Histogram before Encryption.

Figure 18. Color Histogram after Encryption.

Figure 18. Color Histogram after Encryption.

Figure 19. Image 3 before encryption.

Figure 19. Image 3 before encryption.

Figure 20. Image 3 after modified thresholding.

Figure 20. Image 3 after modified thresholding.

Figure 21. Image 3 after 50 iterations.

Figure 21. Image 3 after 50 iterations.

Figure 22. Image 3 after 75 iterations.

Figure 22. Image 3 after 75 iterations.

Figure 23. Image 3 after 100 iterations.

Figure 23. Image 3 after 100 iterations.

Figure 24. Image 3 after decryption.

Figure 24. Image 3 after decryption.

Figure 25. Color Histogram before Encryption.

Figure 25. Color Histogram before Encryption.

Figure 26. Color Histogram after Encryption.

Figure 26. Color Histogram after Encryption.

Figure 27. Image 4 before encryption.

Figure 27. Image 4 before encryption.

Figure 28. Image 4 after modified thresholding.

Figure 28. Image 4 after modified thresholding.

Figure 29. Image 4 after 50 iterations.

Figure 29. Image 4 after 50 iterations.

Figure 30. Image 4 after 75 iterations.

Figure 30. Image 4 after 75 iterations.

Figure 31. Image 4 after 100 iterations.

Figure 31. Image 4 after 100 iterations.

Figure 32. Image 4 after decryption.

Figure 32. Image 4 after decryption.

Figure 33. Color Histogram before Encryption.

Figure 33. Color Histogram before Encryption.

Figure 34. Color Histogram after Encryption.

Figure 34. Color Histogram after Encryption.

Figure 35. Image 5 before encryption.

Figure 35. Image 5 before encryption.

Figure 36. Image 5 after modified thresholding.

Figure 36. Image 5 after modified thresholding.

Figure 37. Image 5 after 50 iterations.

Figure 37. Image 5 after 50 iterations.

Figure 38. Image 5 after 75 iterations.

Figure 38. Image 5 after 75 iterations.

Figure 39. Image 5 after 100 iterations.

Figure 39. Image 5 after 100 iterations.

Figure 40. Image 5 after decryption.

Figure 40. Image 5 after decryption.

Figure 41. Color Histogram before Encryption.

Figure 41. Color Histogram before Encryption.

Figure 42. Color Histogram after Encryption.

Figure 42. Color Histogram after Encryption.

Figure 43. Image 6 before encryption.

Figure 43. Image 6 before encryption.

Figure 44. Image 6 after modified thresholding.

Figure 44. Image 6 after modified thresholding.

Figure 45. Image 6 after 50 iterations.

Figure 45. Image 6 after 50 iterations.

Figure 46. Image 6 after 75 iterations.

Figure 46. Image 6 after 75 iterations.

Figure 47. Image 6 after 100 iterations.

Figure 47. Image 6 after 100 iterations.

Figure 48. Image 6 after decryption.

Figure 48. Image 6 after decryption.

Figure 49. Color Histogram before Encryption.

Figure 49. Color Histogram before Encryption.

Figure 50. Color Histogram after Encryption.

Figure 50. Color Histogram after Encryption.

Figure 51. Image 1 before encryption.

Figure 51. Image 1 before encryption.

Figure 52. Image 1 after modified thresholding.

Figure 52. Image 1 after modified thresholding.

Figure 53. Image 1 after 50 iterations.

Figure 53. Image 1 after 50 iterations.

Figure 54. Image 1 after 75 iterations.

Figure 54. Image 1 after 75 iterations.

Figure 55. Image 1 after 100 iterations.

Figure 55. Image 1 after 100 iterations.

Figure 56. Image 1 after decryption.

Figure 56. Image 1 after decryption.

Figure 57. Color Histogram before Encryption.

Figure 57. Color Histogram before Encryption.

Figure 58. Color Histogram after Encryption.

Figure 58. Color Histogram after Encryption.

Figure 59. Image 2 before encryption.

Figure 59. Image 2 before encryption.

Figure 60. Image 2 after modified thresholding.

Figure 60. Image 2 after modified thresholding.

Figure 61. Image 2 after 50 iterations.

Figure 61. Image 2 after 50 iterations.

Figure 62. Image 2 after 75 iterations.

Figure 62. Image 2 after 75 iterations.

Figure 63. Image 2 after 100 iterations.

Figure 63. Image 2 after 100 iterations.

Figure 64. Image 2 after decryption.

Figure 64. Image 2 after decryption.

Figure 65. Color Histogram before Encryption.

Figure 65. Color Histogram before Encryption.

Figure 66. Color Histogram after Encryption.

Figure 66. Color Histogram after Encryption.

Figure 67. Image 3 before encryption.

Figure 67. Image 3 before encryption.

Figure 68. Image 3 after modified thresholding.

Figure 68. Image 3 after modified thresholding.

Figure 69. Image 3 after 50 iterations.

Figure 69. Image 3 after 50 iterations.

Figure 70. Image 3 after 75 iterations.

Figure 70. Image 3 after 75 iterations.

Figure 71. Image 3 after 100 iterations.

Figure 71. Image 3 after 100 iterations.

Figure 72. Image 3 after decryption.

Figure 72. Image 3 after decryption.

Figure 73. Color Histogram before Encryption.

Figure 73. Color Histogram before Encryption.

Figure 74. Color Histogram after Encryption.

Figure 74. Color Histogram after Encryption.

Figure 75. Image 4 before encryption.

Figure 75. Image 4 before encryption.

Figure 76. Image 4 after modified thresholding.

Figure 76. Image 4 after modified thresholding.

Figure 77. Image 4 after 50 iterations.

Figure 77. Image 4 after 50 iterations.

Figure 78. Image 4 after 75 iterations.

Figure 78. Image 4 after 75 iterations.

Figure 79. Image 4 after 100 iterations.

Figure 79. Image 4 after 100 iterations.

Figure 80. Image 4 after decryption.

Figure 80. Image 4 after decryption.

Figure 81. Color Histogram before Encryption.

Figure 81. Color Histogram before Encryption.

Figure 82. Color Histogram after Encryption.

Figure 82. Color Histogram after Encryption.

Figure 83. Image 5 before encryption.

Figure 83. Image 5 before encryption.

Figure 84. Image 5 after modified thresholding.

Figure 84. Image 5 after modified thresholding.

Figure 85. Image 5 after 50 iterations.

Figure 85. Image 5 after 50 iterations.

Figure 86. Image 5 after 75 iterations.

Figure 86. Image 5 after 75 iterations.

Figure 87. Image 5 after 100 iterations.

Figure 87. Image 5 after 100 iterations.

Figure 88. Image 5 after decryption.

Figure 88. Image 5 after decryption.

Figure 89. Color Histogram before Encryption.

Figure 89. Color Histogram before Encryption.

Figure 90. Color Histogram after Encryption.

Figure 90. Color Histogram after Encryption.

Figure 91. Image 6 before encryption.

Figure 91. Image 6 before encryption.

Figure 92. Image 6 after modified thresholding.

Figure 92. Image 6 after modified thresholding.

Figure 93. Image 6 after 50 iterations.

Figure 93. Image 6 after 50 iterations.

Figure 94. Image 6 after 75 iterations.

Figure 94. Image 6 after 75 iterations.

Figure 95. Image 6 after 100 iterations.

Figure 95. Image 6 after 100 iterations.

Figure 96. Image 6 after decryption.

Figure 96. Image 6 after decryption.

Figure 97. Color Histogram before Encryption.

Figure 97. Color Histogram before Encryption.

Figure 98. Color Histogram after Encryption.

Figure 98. Color Histogram after Encryption.

Figure 99. Sample Sudoku.

Figure 99. Sample Sudoku.

Figure 100. Sudoku defined on arbitrary key space.

Figure 100. Sudoku defined on arbitrary key space.

Figure 101. Time analysis in seconds.

Figure 101. Time analysis in seconds.

Figure 102. Time analysis of key generation in seconds.

Figure 102. Time analysis of key generation in seconds.

Table 1. Comparison of iterations for Lena.

Table 2. Time required for key generation.

Figure 103. Time analysis for the complete encryption process in seconds.

Figure 103. Time analysis for the complete encryption process in seconds.

Table 3. Total time per set of iterations for Lena for a Sudoku of size 9×9 in seconds.

Table 4. Total time required for 100 iterations of all images using 9×9 Sudoku and 16×16 Sudoku.

Table 5. Average pixel intensities of Images before and after encryption using 9×9 Sudoku and 16×16 Sudoku.

Table 6. Comparison of Shannon entropies of original images and encrypted Images.

Table 7. Information Entropies comparison for different algorithms on Lena.

Table 8. Obtained NPCR and UACI values for encrypted images using different Sudokus.

Table 9. Comparison of NPCR and UACI values between different algorithms on Lena.