Cite

Earthweb. How Much Data is Created Every Day? 2023 (Online). https://earthweb.com/how-much-data-is-created-every-day/ Search in Google Scholar

Mune, R., S. A. Bhura. An Analysis of Heterogeneous Data with Extreme Learning via Unsupervised Multiple Kernels. – In: Proc. of 2nd International Conference on Data, Engineering and Applications (IDEA’20), IEEE, 2020, pp. 1-7, Search in Google Scholar

Mhatre, M., H. Kashid, T. Jain, P. Chavan. BCPIS: Blockchain-Based Counterfeit Product Identification System. – Journal of Applied Security Research, 2022, pp. 1-26 (Online). Search in Google Scholar

Mehta, K., G. Dhingra, R. Mangrulkar. Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography. – Journal of Applied Security Research, 2022, pp. 1-24. DOI: 10.1080/19361610.2022.2157193. Fig. 16. Histogram analysis for encryption using standardization of dimensions – red, green and blue color planes image: Plain image (a); Encrypted b) 17. a single session key Search in Google Scholar

Sawant, V., A. Solkar, R. Mangrulkar. Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box. – Journal of Applied Security Research, 2022, pp. 1-34. Search in Google Scholar

Vidhya, R., M. Brindha. A Chaos-Based Image Encryption Algorithm Using Rubik’s Cube and Prime Factorization Process (CIERPF). – Journal of King Saud University – Computer and Information Sciences, Vol. 34, 2022, No 5, pp. 2000-2016. DOI: 10.1016/j.jksuci.2019.12.014. Search in Google Scholar

Kumar, A., M. Rani. A Novel Chaotic Encryption Scheme for Images. – Chaos, Solitons & Fractals, Vol. 28, October 2006, No 1, pp. 67-76. DOI: 10.1016/j.chaos.2005.05.022. Search in Google Scholar

Zhao, Y., R. Meng, Y. Zhang, Q. Yang. Image Encryption Algorithm Based on a New Chaotic System with Rubik’s Cube Transform and Brownian Motion Model. – Optik, Vol. 273, 2023, 170342. Search in Google Scholar

Deshpande, K., J. Girkar, R. Mangrulkar. Security Enhancement and Analysis of Images Using a Novel Sudoku-Based Encryption Algorithm. – Journal of Information and Telecommunication, 2023, pp. 1-34 Search in Google Scholar

Helmy, M., E. M. El-Rabaie, I. M. Eldokany et al. 3D Image Encryption Based on Rubik’s Cube and RC6 Algorithm. – 3D Res., Vol. 8, 2017, No 38. Search in Google Scholar

Gomathi, T., B. L. S. Kumar. Multistage Image Encryption Using Rubik’s Cube for Secured Image Transmission. – International Journal of Advanced Research in Computer Science, (S.l.), Vol. 6, January 2017, No 6, p. 54-58. ISSN 0976-5697. Search in Google Scholar

Ionescu, V. M., A. -V. Diaconu. Rubik’s Cube Principle-Based Image Encryption Algorithm Implementation on Mobile Devices. – In: Proc. of 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI’2015), 2015, pp. P-31-P-34. DOI: 10.1109/ECAI.2015.7301247. Search in Google Scholar

Abitha, K. A., P. K. Bharathan. Secure Communication Based on Rubik’s Cube Algorithm and Chaotic Baker Map. – Procedia Technology, 2016. Search in Google Scholar

Attkan, A., V. Ranga, P. Ahlawat. A Rubik’s Cube Cryptosystem Based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security. – ACM Transactions on Internet of Things, 2023. Search in Google Scholar

Jin, J., S. Park. Key Generation and Management Method Using AI Generated Rubik’s Cube States. – In: Proc. of International Conference on Information Networking (ICOIN’2023), IEEE, 2023. Search in Google Scholar

Chuman, T., W. Sirichotedumrong, H. Kiya. Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images. – IEEE Transactions on Information Forensics and Security, 1-1, 2018. DOI:10.1109/tifs.2018.2881677. Search in Google Scholar

Alshehri, A. A., M. S. Woong. Cryptographic Algorithm for Image Encryption Based on Chaotic Map. – Mathematical Problems in Engineering, Vol. 2013, February 2013, Article ID 848392. 10 p. DOI: 10.1155/2013/848392. Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology