Skip to main content
Log in

Chaotic encryption with different modes of operation based on Rubik’s cube for efficient wireless communication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A novel image encryption algorithm based on the Rubik’s cube scrambling is proposed in this paper to achieve simultaneous encryption of a group of images. This proposed encryption algorithm begins with chaotic Baker map permutation with a selected mode of operation or RC6 algorithm as a first step for encrypting the images, separately. After that, the obtained encrypted images are further encrypted in a second stage with Rubik’s cube. Chaotic or RC6 encrypted images are used as the faces of the Rubik’s cube. From the concepts of image encryption, the RC6 algorithm adds a degree of diffusion, while chaotic Baker map adds a degree of permutation. The Rubik’s cube algorithm adds more permutation to the encrypted images, simultaneously. The simulation results demonstrate that the proposed encryption algorithm is efficient, and it exhibits strong robustness and security. The encrypted images are further transmitted over a wireless channel with Orthogonal Frequency Division Multiplexing (OFDM) system, and decrypted at the receiver side. Evaluation of the quality of the decrypted images at the receiver side reveals good performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Abraham L, Daniel N (2013) Secure Image encryption algorithms: a review. Int J Sci Technol Res 2(4):80–83

  2. Abraham L, Daniel N (2013) An improved color image encryption algorithm with pixel permutation and bit substitution. Int J Res Eng Technol 02(11)

    Article  Google Scholar 

  3. Andrews JG, Ghosh A, Muhamed R (2007) Fundamentals of WiMAX understanding broadband wireless networking. In: Prentice Hall communications engineering and emerging technologies series, p 113–145

  4. Bergman C (2005) Encryption modes, Lecture, p 1-18, http://orion.math.iastate.edu/cbergman/crypto/ps files/4up/chaining.pdf

  5. Ebrahim M, Karachi SK, Karachi UBK (2013) Symmetric algorithm survey: a comparative analysis. Int J Comput Appl 61(20):12–19

    Google Scholar 

  6. Eldokany I, El-Rabaie E-SM, Elhalafawy SM, Zein Eldin MA, Shahieen MH, Soliman NF, El-Bendary MAM, El-Naby MA, Al-kamali FS, Elashry IF, Abd El-Samie FE (2015) Efficient transmission of encrypted images with OFDM in the presence of carrier frequency offset. Wireless Personal Communications. Springer Science + Business Media New York. 84(1):475–521. https://doi.org/10.1007/s11277-015-2645-2

    Article  Google Scholar 

  7. Elementray cryptography, Modes of operation, p 29-33, http://magma.maths.usyd.edu.au/~kohel/teaching/MATH3024/Lectures/lectures05.pdf

  8. El-Fishawy N, Abu Zaid OM (2007) Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int J Netw Secur 5(3):241–251

    Google Scholar 

  9. Elkamchouchi HM, Makar MA. Measuring encryption quality of Bitmap images encrypted with Rijndael and KAMKAR block ciphers. In: Proceedings Twenty second National Radio Science Conference (NRSC 2005), p C11, Cairo, Egypt, Mar. 15, 17, 2005

  10. Hashim AT, Mahdi JA, Abdullah SH (2010) A proposed 512 bits RC6 encryption algorithm. IJCCCE 10(1):12-25

  11. Joyner WD. Mathematics of the Rubik’s cube. Spring Semester, 1996–7. 1-275

  12. Lawrey E (1997) The suitability of OFDM as a modulation technique for wireless telecommunications, with a CDMA comparison. Bachelor thesis, James Cook University

  13. Lawrey EP (2001) Adaptive techniques for multiuser OFDM. Ph.D. thesis, James Cook University

  14. Lawrey E. The suitability of OFDM as a modulation technique for wireless telecommunications, with a CDMA comparison. Bachelor Thesis, James Cook University

  15. Li S, Mou X, Cai Y (2001) Improving security of a chaotic encryption approach. Phys Lett A 290(3–4):127–133

    Article  MathSciNet  Google Scholar 

  16. Li S, Zheng X, Mou X, Cai Y (2002) Chaotic encryption scheme for real-time digital video. In Proceedings of SPIE 4666: 149–160

  17. Mohamed AB, Zaibi G, Kachouri A (2011) Implementation of RC5 and RC6 Bolck ciphers on digital images systems, signals and devices (SSD), 8th International Multi-Conference, Sousse, Tunisia, 12 May 2011

  18. Ramia F, Qadir H (2006) GMU., RC6 implementation including key scheduling using FPGA, (ECE 646 Project)

  19. Sirisha M, Lakshmi SVVS (2014) Pixel transformation based on Rubik’s cube principle. Int J Appl Innov Eng Manage 3(5):273-277

  20. Swiss encryption technology, MediCrypt, Modes of operation, p 1-4, http://www.mediacrypt.com/pdf/MCmodes1204.pdf

  21. Tan P, Beaulieu NC (2005) Precise bit error probability analysis of DCT OFDM in the presence of carrier frequency offset on AWGN channels. In: Proceedings of the IEEE Globcom 2005, p 1429–1434

  22. Verma HK, Singh RK (2012) Performance analysis of RC6, Twofish and Rijndael block cipher algorithms. Int J Comput Appl 42(16):1–7

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mai Helmy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Helmy, M., El-Rabaie, ES.M., Eldokany, I.M. et al. Chaotic encryption with different modes of operation based on Rubik’s cube for efficient wireless communication. Multimed Tools Appl 77, 27337–27361 (2018). https://doi.org/10.1007/s11042-018-5923-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5923-7

Keywords

Navigation