Multimedia Encryption Using Rubik’s Cube-Inspired Algorithm: A Novel Approach to Audio and Image Security
DOI:
https://doi.org/10.4108/eetiot.9985Keywords:
Confusion and Diffusion, XOR-Based Encryption, Permutation-Substitution Network, Symmetric Key Cryptography, Image and Audio Encryption, Rubik's Cube Algorithm, Data Transmission, Symmetric EncryptionAbstract
This paper presents a fast and secure image and audio encryption scheme based on the principles of a Rubik’s Cube. The proposed method combines scrambling and XOR-based diffusion to ensure confidentiality during storage and transmission. Multimedia data are converted into matrix representations and permuted using randomly generated row and column secret keys. Circular shift operations are applied based on the parity of the key values to achieve effective confusion and diffusion. This paper highlights the application of rubric cube algorithm applied on audio data for the first time for encryption and decryption process for voice biometric system design. The experimental results are also presented on par to image data with execution time. Audio data is processed and modelled as a three-dimensional Rubik’s Cube and scrambled cube using random rotational transformations. Decryption is performed using inverse operations with identical keys. Experimental results confirm strong security, low computational complexity, and high reconstruction accuracy, demonstrating suitability for secure multimedia communication
Downloads
References
[1] Mane, J.S., Bhosale, S. (2023). Advancements in biometric authentication systems: A comprehensive survey on internal traits, multimodal systems, and vein pattern biometrics. Revue d'Intelligence Artificielle, Vol. 37, No. 3, pp. 709-718. https://doi.org/10.18280/ria.370319
[2] Shaveta Dargan, Munish Kumar, A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities, Expert Systems with Applications, Volume 143,2020,113114, ISSN 0957-4174, https://doi.org/10.1016/j.eswa.2019.113114.
[3] Review on Encryption of Video: Determination Optimal Measures for Robust Video Encryption AtaaRasol Alawi NidaaFlaih Hassan Department of Computer Science, University of Technology, Baghdad, Iraq
[4] N. K. Ratha, J. H. Connell and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," in IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001, doi: 10.1147/sj.403.0614.
[5] Demaine, Erik D. et al. “Algorithms for Solving Rubik’s Cubes.” Algorithms – ESA 2011.Ed. Camil Demetrescu & Magnús M. Halldórsson. LNCS Vol. 6942. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. 689–700.
[6] Aditi Nair, DitiDalal, Ramchandra Mangrulkar, Colour image encryption algorithm using Rubik’s cube scrambling with bitmap shuffling and frame rotation, Cyber Security and Applications, Volume 2,2024, 100030, ISSN 2772-9184, https://doi.org/10.1016/j.csa.2023.100030
[7] R. Vidhya, M. Brindha,A chaos based image encryption algorithm using Rubik’s cube and prime factorization process (CIERPF),Journal of King Saud University - Computer and Information Sciences, Volume 34, Issue 5,2022, Pages 2000-2016 ,ISSN 1319-1578, https://doi.org/10.1016/j.jksuci.2019.12.014.
[8] Yousaf, A., Razaq, A. &Baig, H. A lightweight image encryption algorithm based on patterns in Rubik’s revenge cube. Multimed Tools Appl 81, 28987–28998 (2022). https://doi.org/10.1007/s11042-022-11898-0
[9] Sinha, R.K., Agrawal, I., Jain, K., Gupta, A., Sahu, S.S. (2020). Image Encryption Using Modified Rubik’s Cube Algorithm. In: Sahana, S., Bhattacharjee, V. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 988. Springer, Singapore. https://doi.org/10.1007/978-981-13-8222-2_6
[10] Aditi Nair, Diti Dalal, Ramchandra Mangrulkar, Colour image encryption algorithm using Rubik’s cube scrambling with bitmap shuffling and frame rotation, Cyber Security and Applications, Volume 2,2024,100030, ISSN 2772-9184, https://doi.org/10.1016/j.csa.2023.100030.
[11] Hegui Zhu, Lewen Dai, Yating Liu, Lijun Wu, A three-dimensional bit-level image encryption algorithm with Rubik’s cube method, Mathematics and Computers in Simulation, Volume 185,2021, Pages 754-770, ISSN 0378-4754, https://doi.org/10.1016/j.matcom.2021.02.009.
[12] Zhao J, Zhang T, Jiang J, Fang T, Ma H. Color image encryption scheme based on alternate quantum walk and controlled Rubik's Cube. Sci Rep. 2022 Aug 22;12(1):14253. doi: 10.1038/s41598-022-18079-x. PMID: 35995941; PMCID: PMC9395402.
[13] Deshpande, K., Girkar, J., & Mangrulkar, R. (2023). Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm. Journal of Information and Telecommunication, 7(3), 270–303. https://doi.org/10.1080/24751839.2023.2183802
[14] Song, Wei & Fu, Chong & Zheng, Yu & Tie, Ming & Liu, Jun & Chen, Junxin, 2023. "A parallel image encryption algorithm using intra bitplane scrambling," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 204(C), pages 71-88.
[15] Murari T., V., K C, R. & M E, R. Selective encryption of video frames using the one-time random key algorithm and permutation techniques for secure transmission over the content delivery network. Multimed Tools Appl 83, 82303–82342 (2024). https://doi.org/10.1007/s11042-024-18613-1
[16] Mai Helmy, Walid El-Shafai, El-Sayed M. El-Rabaie, Ibrahim M. El-Dokany, Fathi E. Abd El-Samie,A hybrid encryption framework based on Rubik’s cube for cancellable biometric cyber security applications, Optik, Volume 258,2022, 168773, ISSN 003026, https://doi.org/10.1016/j.ijleo.2022.168773.
[17] Suo Gao, Jiafeng Liu, Herbert Ho-ChingIu, UğurErkan, Shuang Zhou, Rui Wu, Xianglong Tang, Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks, Applied Mathematical Modelling, Volume 134,2024,Pages 520-537, ISSN 0307-904X, https://doi.org/10.1016/j.apm.2024.06.016.
[18] Rupesh Kumar Sinha and SitanshuSekharSahu, Multi-level image security using modified Rubik's cube algorithm ,International Journal of Information and Computer Security Vol. 23, No. 4
[19] R. Zhao, Y. Zhang, J. Ji, S. Yi, W. Wen and R. Lan, "AES-AUDIO: An Encryption Scheme for Audio Supporting Differentiated Decryption," in IEEE Transactions on Multimedia, doi: 10.1109/TMM.2024.3521757.
[20] Cao, Y., Liu, H. An audio encryption algorithm based on a non-degenerate 2D integer domain hyper chaotic map over GF(2n). Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18746-3
[21] Zhou, L., Li, X., Tan, F. et al. A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization. Soft Compute 26, 9761–9774 (2022). https://doi.org/10.1007/s00500-022-07335-x
[22] Parekh, A., Antani, M., Suvarna, K. et al. Multilayer symmetric and asymmetric technique for audiovisual cryptography. Multimed Tools Appl 83, 31465–31503 (2024). https://doi.org/10.1007/s11042-023-16401-x
[23] J. Joy and L. Koshy, "Rubi Crypt: Image Scrambling Encryption System Based on Rubik’s Cube Configuration," 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 2019, pp. 1-8, doi: 10.1109/ICSCAN.2019.8878785.
[24] Khaled Loukhaoukha, Jean-Yves Chouinard, Abdellah BerdaiA Secure Image Encryption Algorithm Based on Rubik′s Cube Principle, Journal of electrical and computer engineering,2012
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Vani HY, Anusuya M A, Shwethashree G C, KB Drakshayini, Vinod D S

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 4.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.
