SlideShare a Scribd company logo
1 of 19
A NOVEL IMAGE SCRAMBLING BASED ON SUDOKU
PUZZLE
D.N.R College Of engineering & technology
Department Of Electronics & Communication Engineering
Under the esteemed guidance of
N.S.V.L Sowjanya M.Tech
Asst. Professor
Presented by-batch16
S.RAJA -129P1A0457
V.SATEESH -139P5A0433
T.NEERAJA -132E5A0416
P.SURI BABU -139P5A0428
S.H.S.S KISHORE -129P1A0455
CONTENTS
 Objective
 Existing method
 Proposal method
 Block diagram
 Working methodology
 Conclusion
 Future scope
 Reference
OBJECTIVE
 This paper introduces a novel image scrambling algorithm based
on Sudoku puzzle.
 According to the special property that every number from 1 to N
appears only once in each row or column in an N*N Sudoku
puzzle, a 1-1 relationship can be setup between two Sudoku
puzzles.
 These two Sudoku puzzles will be used to map the original images
to a scrambled one.
EXISTING METHOD
 In old technique use only the pixel scrambling to
over come this method we use the Sudoku puzzle
technique in this we apply pixel scrambling and
bits scrambling.
PROPOSAL METHOD
 One of the new method in image encryption in this
involving a both block scrambling and bit scrambling
and also introduce a Sudoku puzzle based on the all
these things we can scramble and descramble the image.
BLOCK DIAGRAM
Original
image
Puzzle
pair
Puzzle
preparation
Block
scrambling
Bits
scrambling
o/p
Received
image
Bits
Descrambling
Block
Descrambling
Original
image
Decoding
Encoding
SCRAMBLING
4 2 1 3
3 1 2 4
2 3 4 1
1 4 3 2
1 2 3 4
4 3 1 2
2 1 4 3
3 4 2 1
1 2 3 4
5 6 7 8
9 10 11 12
13 14 15 16
Puzzle 1 Puzzle 2 Original image
PUZZLE SELECTION
PUZZLE PREPARATION
 Row: New Value = Old Value + (Row × 10^digits)
 Column: New Value = Old Value + (Column × 10^digits)
4 2 1 3
3 1 2 4
2 3 4 1
1 4 3 2
1 2 3 4
4 3 1 2
2 1 4 3
3 4 2 1
PUZZLE PREPARATION
 By using this column formula we can change the each
value in column.
 By using this row formula we can change the each value
in row.
4 2 1 3
3 1 2 4
2 3 4 1
1 4 3 2
14 22 31 43
13 21 32 44
12 23 34 41
11 24 33 42
1 2 3 4
4 3 1 2
2 1 4 3
3 4 2 1
11 12 13 14
24 23 21 22
32 31 34 33
43 44 42 41
BLOCK SCRAMBLING
 By using this block scrambling we can mapping the
puzzles and converted into a single puzzle.
example: mapping process.
14 22 31 43
13 21 32 44
12 23 34 41
11 24 33 42
11 12 13 14
24 23 21 22
32 31 34 33
43 44 42 41
BLOCK SCRAMBLING
 By using above technique we can mapping the original image.
original image scrambled image
1 2 3 4
5 6 7 8
9 10 11 12
13 14 15 16
13 9 5 1
14 10 6 2
7 3 11 15
4 8 16 12
BITS SCRAMBLING
 In order to reduce the block effects of the scrambled image obtained from above
step, it is necessary to scramble it at bits level. The following steps will show
how to achieve this goal. Before doing the bits scrambling, the scrambled image
is needed to be changed to a 1-D matrix by connecting each rows together (Row
2 is moved to the end of row 1 and row 3 is moved to the end of row 2, etc.).
13 9 5 1
14 10 6 2
7 3 11 15
4 8 16 12
13 9 5 1 14 10 6 2 7 3 11 15 4 8 16 12
13 9 5 1 14 10 6 2 7 3 11 15 4 8 16 12
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0
1 1 0 0 1 1 0 0 0 0 1 1 0 1 0 1
1 0 1 0 1 0 1 0 1 0 0 1 1 0 0 1
0 0 0 0 1 1 1 1 1 1 1 1 0 0 0 0
1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 0
BITS SCRAMBLING
BITS SCRAMBLING
1 1 0 0
1 0 1 0
0 0 0 0
1 1 1 1
1 1 0 1
1 0 0 1
1 0 0 1
0 0 1 0
DESCRAMBLING
 We can descrambling the above process by converting bits
scrambling into block scrambling, block scrambling into original
image at the decoder.
Bits descrambling Block descrambling Original image
CONCLUSION
 A new image scrambling algorithm is introduced.
The main idea is to pair of Sudoku puzzle to map
the block in one matrix to other.
 based on that key the information contained in the
scrambled image has good security so these can
applied to a encrypt digital images.
FUTURE SCOPE
 These can be implemented in hardware kit.
 This algorithm can be used to scramble the
watermark image in image and video
watermarking.
 Military applications.
REFERENCES
 Dimitri Van De Ville, Wilfried Philips, Rik Van De Walle,
IgnaceLemahieu, “Image Scrambling Without Bandwidth
Expansion,” IEEE transactions on Circuits and Systems for Video
Technology, Vol. 14, pp. 892-897, June 2004
 Aaronson, L, “Sudoku Science”, IEEE Spectrum, vol.43, pp. 16-
17, Feb.2006.
 Baochen Sun, Xiwei Sun, Yue Wu, Yiling Yin, Goping Yang, “A
New Algorithm for Generating Unique- Solution Sudoku”, Fourth
International Conference on Natural Computation (ICNC '08),
Vol.7, pp. 215, Nov. 2008
Thank you

More Related Content

What's hot

Normal ditribution
Normal ditributionNormal ditribution
Normal ditributionsialkot123
 
Singular Value Decomposition Image Compression
Singular Value Decomposition Image CompressionSingular Value Decomposition Image Compression
Singular Value Decomposition Image CompressionAishwarya K. M.
 
Image compression using singular value decomposition
Image compression using singular value decompositionImage compression using singular value decomposition
Image compression using singular value decompositionPRADEEP Cheekatla
 
Blur Filter - Hanpo
Blur Filter - HanpoBlur Filter - Hanpo
Blur Filter - HanpoHanpo Cheng
 
ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL Masayuki Tanaka
 
Gaussian Image Blurring in CUDA C++
Gaussian Image Blurring in CUDA C++Gaussian Image Blurring in CUDA C++
Gaussian Image Blurring in CUDA C++Darshan Parsana
 
Data Augmentation and Disaggregation by Neal Fultz
Data Augmentation and Disaggregation by Neal FultzData Augmentation and Disaggregation by Neal Fultz
Data Augmentation and Disaggregation by Neal FultzData Con LA
 
Numerical Methods: curve fitting and interpolation
Numerical Methods: curve fitting and interpolationNumerical Methods: curve fitting and interpolation
Numerical Methods: curve fitting and interpolationNikolai Priezjev
 
Dimensionality reduction: SVD and its applications
Dimensionality reduction: SVD and its applicationsDimensionality reduction: SVD and its applications
Dimensionality reduction: SVD and its applicationsViet-Trung TRAN
 
Applied numerical methods lec1
Applied numerical methods lec1Applied numerical methods lec1
Applied numerical methods lec1Yasser Ahmed
 
fast-matmul-ppopp2015
fast-matmul-ppopp2015fast-matmul-ppopp2015
fast-matmul-ppopp2015Austin Benson
 
A non-stiff boundary integral method for internal waves
A non-stiff boundary integral method for internal wavesA non-stiff boundary integral method for internal waves
A non-stiff boundary integral method for internal wavesAlex (Oleksiy) Varfolomiyev
 
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...Edureka!
 
Lab lecture 2 bresenham
Lab lecture 2 bresenhamLab lecture 2 bresenham
Lab lecture 2 bresenhamsimpleok
 
Raster Scan Graphics, Line Drawing Algorithm and Circle Drawing Algorithm
Raster Scan Graphics, Line Drawing Algorithm and Circle Drawing Algorithm Raster Scan Graphics, Line Drawing Algorithm and Circle Drawing Algorithm
Raster Scan Graphics, Line Drawing Algorithm and Circle Drawing Algorithm Aparna Joshi
 

What's hot (20)

Normal ditribution
Normal ditributionNormal ditribution
Normal ditribution
 
Singular Value Decomposition Image Compression
Singular Value Decomposition Image CompressionSingular Value Decomposition Image Compression
Singular Value Decomposition Image Compression
 
Image compression using singular value decomposition
Image compression using singular value decompositionImage compression using singular value decomposition
Image compression using singular value decomposition
 
Blur Filter - Hanpo
Blur Filter - HanpoBlur Filter - Hanpo
Blur Filter - Hanpo
 
ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL
 
Gaussian Image Blurring in CUDA C++
Gaussian Image Blurring in CUDA C++Gaussian Image Blurring in CUDA C++
Gaussian Image Blurring in CUDA C++
 
Data Augmentation and Disaggregation by Neal Fultz
Data Augmentation and Disaggregation by Neal FultzData Augmentation and Disaggregation by Neal Fultz
Data Augmentation and Disaggregation by Neal Fultz
 
Numerical Methods: curve fitting and interpolation
Numerical Methods: curve fitting and interpolationNumerical Methods: curve fitting and interpolation
Numerical Methods: curve fitting and interpolation
 
Dimensionality reduction: SVD and its applications
Dimensionality reduction: SVD and its applicationsDimensionality reduction: SVD and its applications
Dimensionality reduction: SVD and its applications
 
1638 vector quantities
1638 vector quantities1638 vector quantities
1638 vector quantities
 
Computer Organisation Part 3
Computer Organisation Part 3Computer Organisation Part 3
Computer Organisation Part 3
 
Solution 2 i ph o 37
Solution 2 i ph o 37Solution 2 i ph o 37
Solution 2 i ph o 37
 
Applied numerical methods lec1
Applied numerical methods lec1Applied numerical methods lec1
Applied numerical methods lec1
 
fast-matmul-ppopp2015
fast-matmul-ppopp2015fast-matmul-ppopp2015
fast-matmul-ppopp2015
 
Design of slabs using wood
Design of slabs using woodDesign of slabs using wood
Design of slabs using wood
 
A non-stiff boundary integral method for internal waves
A non-stiff boundary integral method for internal wavesA non-stiff boundary integral method for internal waves
A non-stiff boundary integral method for internal waves
 
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
 
Finite difference Matlab Code
Finite difference Matlab CodeFinite difference Matlab Code
Finite difference Matlab Code
 
Lab lecture 2 bresenham
Lab lecture 2 bresenhamLab lecture 2 bresenham
Lab lecture 2 bresenham
 
Raster Scan Graphics, Line Drawing Algorithm and Circle Drawing Algorithm
Raster Scan Graphics, Line Drawing Algorithm and Circle Drawing Algorithm Raster Scan Graphics, Line Drawing Algorithm and Circle Drawing Algorithm
Raster Scan Graphics, Line Drawing Algorithm and Circle Drawing Algorithm
 

Viewers also liked (6)

Kare 3
Kare 3Kare 3
Kare 3
 
Practica2
Practica2Practica2
Practica2
 
Tapas-CV (2)
Tapas-CV (2)Tapas-CV (2)
Tapas-CV (2)
 
Storyboard For Our Opening
Storyboard For Our OpeningStoryboard For Our Opening
Storyboard For Our Opening
 
Vocacional
VocacionalVocacional
Vocacional
 
Anexo 17 practica 3 instalar y configurar en maquina virtual sistema operativ...
Anexo 17 practica 3 instalar y configurar en maquina virtual sistema operativ...Anexo 17 practica 3 instalar y configurar en maquina virtual sistema operativ...
Anexo 17 practica 3 instalar y configurar en maquina virtual sistema operativ...
 

Similar to Image Scrambling Using Sudoku Puzzle

VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcscpconf
 
Data hiding using image interpolation
Data hiding using image interpolationData hiding using image interpolation
Data hiding using image interpolationVikrant Arya
 
nips report
nips reportnips report
nips report?? ?
 
Seq2grid aaai 2021
Seq2grid aaai 2021Seq2grid aaai 2021
Seq2grid aaai 2021segwangkim
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
 
Do's and Don'ts of using t-SNE.pdf
Do's and Don'ts of using t-SNE.pdfDo's and Don'ts of using t-SNE.pdf
Do's and Don'ts of using t-SNE.pdfFrankClat
 
Spiking Neural P System
Spiking Neural P SystemSpiking Neural P System
Spiking Neural P SystemAtit Gaonkar
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionIRJET Journal
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Bidirectional graph search techniques for finding shortest path in image base...
Bidirectional graph search techniques for finding shortest path in image base...Bidirectional graph search techniques for finding shortest path in image base...
Bidirectional graph search techniques for finding shortest path in image base...Navin Kumar
 
Lossless Huffman coding image compression implementation in spatial domain by...
Lossless Huffman coding image compression implementation in spatial domain by...Lossless Huffman coding image compression implementation in spatial domain by...
Lossless Huffman coding image compression implementation in spatial domain by...IRJET Journal
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyIOSR Journals
 
slide9_short.pdf
slide9_short.pdfslide9_short.pdf
slide9_short.pdfkmnv2
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsIOSR Journals
 
Picture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanationPicture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanationhari krishnan.n
 

Similar to Image Scrambling Using Sudoku Puzzle (20)

VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
Data hiding using image interpolation
Data hiding using image interpolationData hiding using image interpolation
Data hiding using image interpolation
 
nips report
nips reportnips report
nips report
 
Seq2grid aaai 2021
Seq2grid aaai 2021Seq2grid aaai 2021
Seq2grid aaai 2021
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
 
Do's and Don'ts of using t-SNE.pdf
Do's and Don'ts of using t-SNE.pdfDo's and Don'ts of using t-SNE.pdf
Do's and Don'ts of using t-SNE.pdf
 
1.pptx
1.pptx1.pptx
1.pptx
 
Spiking Neural P System
Spiking Neural P SystemSpiking Neural P System
Spiking Neural P System
 
Densebox
DenseboxDensebox
Densebox
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Bidirectional graph search techniques for finding shortest path in image base...
Bidirectional graph search techniques for finding shortest path in image base...Bidirectional graph search techniques for finding shortest path in image base...
Bidirectional graph search techniques for finding shortest path in image base...
 
Lossless Huffman coding image compression implementation in spatial domain by...
Lossless Huffman coding image compression implementation in spatial domain by...Lossless Huffman coding image compression implementation in spatial domain by...
Lossless Huffman coding image compression implementation in spatial domain by...
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 
slide9_short.pdf
slide9_short.pdfslide9_short.pdf
slide9_short.pdf
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixels
 
Picture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanationPicture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanation
 

Image Scrambling Using Sudoku Puzzle

  • 1. A NOVEL IMAGE SCRAMBLING BASED ON SUDOKU PUZZLE D.N.R College Of engineering & technology Department Of Electronics & Communication Engineering Under the esteemed guidance of N.S.V.L Sowjanya M.Tech Asst. Professor Presented by-batch16 S.RAJA -129P1A0457 V.SATEESH -139P5A0433 T.NEERAJA -132E5A0416 P.SURI BABU -139P5A0428 S.H.S.S KISHORE -129P1A0455
  • 2. CONTENTS  Objective  Existing method  Proposal method  Block diagram  Working methodology  Conclusion  Future scope  Reference
  • 3. OBJECTIVE  This paper introduces a novel image scrambling algorithm based on Sudoku puzzle.  According to the special property that every number from 1 to N appears only once in each row or column in an N*N Sudoku puzzle, a 1-1 relationship can be setup between two Sudoku puzzles.  These two Sudoku puzzles will be used to map the original images to a scrambled one.
  • 4. EXISTING METHOD  In old technique use only the pixel scrambling to over come this method we use the Sudoku puzzle technique in this we apply pixel scrambling and bits scrambling.
  • 5. PROPOSAL METHOD  One of the new method in image encryption in this involving a both block scrambling and bit scrambling and also introduce a Sudoku puzzle based on the all these things we can scramble and descramble the image.
  • 7. SCRAMBLING 4 2 1 3 3 1 2 4 2 3 4 1 1 4 3 2 1 2 3 4 4 3 1 2 2 1 4 3 3 4 2 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Puzzle 1 Puzzle 2 Original image PUZZLE SELECTION
  • 8. PUZZLE PREPARATION  Row: New Value = Old Value + (Row × 10^digits)  Column: New Value = Old Value + (Column × 10^digits) 4 2 1 3 3 1 2 4 2 3 4 1 1 4 3 2 1 2 3 4 4 3 1 2 2 1 4 3 3 4 2 1
  • 9. PUZZLE PREPARATION  By using this column formula we can change the each value in column.  By using this row formula we can change the each value in row. 4 2 1 3 3 1 2 4 2 3 4 1 1 4 3 2 14 22 31 43 13 21 32 44 12 23 34 41 11 24 33 42 1 2 3 4 4 3 1 2 2 1 4 3 3 4 2 1 11 12 13 14 24 23 21 22 32 31 34 33 43 44 42 41
  • 10. BLOCK SCRAMBLING  By using this block scrambling we can mapping the puzzles and converted into a single puzzle. example: mapping process. 14 22 31 43 13 21 32 44 12 23 34 41 11 24 33 42 11 12 13 14 24 23 21 22 32 31 34 33 43 44 42 41
  • 11. BLOCK SCRAMBLING  By using above technique we can mapping the original image. original image scrambled image 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 13 9 5 1 14 10 6 2 7 3 11 15 4 8 16 12
  • 12. BITS SCRAMBLING  In order to reduce the block effects of the scrambled image obtained from above step, it is necessary to scramble it at bits level. The following steps will show how to achieve this goal. Before doing the bits scrambling, the scrambled image is needed to be changed to a 1-D matrix by connecting each rows together (Row 2 is moved to the end of row 1 and row 3 is moved to the end of row 2, etc.). 13 9 5 1 14 10 6 2 7 3 11 15 4 8 16 12 13 9 5 1 14 10 6 2 7 3 11 15 4 8 16 12
  • 13. 13 9 5 1 14 10 6 2 7 3 11 15 4 8 16 12 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 0 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 1 0 1 0 1 0 1 0 0 1 1 0 0 1 0 0 0 0 1 1 1 1 1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 0 BITS SCRAMBLING
  • 14. BITS SCRAMBLING 1 1 0 0 1 0 1 0 0 0 0 0 1 1 1 1 1 1 0 1 1 0 0 1 1 0 0 1 0 0 1 0
  • 15. DESCRAMBLING  We can descrambling the above process by converting bits scrambling into block scrambling, block scrambling into original image at the decoder. Bits descrambling Block descrambling Original image
  • 16. CONCLUSION  A new image scrambling algorithm is introduced. The main idea is to pair of Sudoku puzzle to map the block in one matrix to other.  based on that key the information contained in the scrambled image has good security so these can applied to a encrypt digital images.
  • 17. FUTURE SCOPE  These can be implemented in hardware kit.  This algorithm can be used to scramble the watermark image in image and video watermarking.  Military applications.
  • 18. REFERENCES  Dimitri Van De Ville, Wilfried Philips, Rik Van De Walle, IgnaceLemahieu, “Image Scrambling Without Bandwidth Expansion,” IEEE transactions on Circuits and Systems for Video Technology, Vol. 14, pp. 892-897, June 2004  Aaronson, L, “Sudoku Science”, IEEE Spectrum, vol.43, pp. 16- 17, Feb.2006.  Baochen Sun, Xiwei Sun, Yue Wu, Yiling Yin, Goping Yang, “A New Algorithm for Generating Unique- Solution Sudoku”, Fourth International Conference on Natural Computation (ICNC '08), Vol.7, pp. 215, Nov. 2008