The Sudoku Array and Its Applications in Information Security.
Abstract: As one of the
most popular pencil-and-paper puzzles with simple constraints, Sudoku puzzles are almost
everywhere in the world. The popularity of these Sudoku puzzles also encouraged research
on their mathematical properties in recent years, but possible engineering applications
of Sudoku puzzles are rarely considered. In this dissertation, a generalized Sudoku
solution, the Sudoku ... read morearray, is studied for its theoretical properties, practical
generation algorithm and many applications in information security. In particular, a
number of Sudoku based encryption techniques are developed for digital data by using
various properties of a Sudoku array. By using these techniques as building blocks,
Sudoku based cryptosystems are constructed with respect to different data types:
Sudoku-AES cipher for one dimensional data like texts, binary sequences, audio etc;
Sudoku-Image cipher for two dimensional data like images; and Sudoku video encryption
for videos compressed using discrete cosine transforms. Simulation results show that
these Sudoku-based cryptosystems are robust, secure, and comparable to or outperform
existing solutions. Moreover, different Sudoku based multimedia security applications,
including pseudorandom number generators, secret sharing schemes, image watermarking
schemes, and visual cryptography schemes are also considered and developed. Finally,
three different statistical tests to distinguish an insecure image cipher are derived
for the first time and used for the performance evaluations of image
Thesis (Ph.D.)--Tufts University, 2012.
Submitted to the Dept. of Electrical Engineering.
Advisor: Joseph Noonan.
Committee: Sos Agaian, Karen Panetta, and Brian Tracey.
Keywords: Engineering, and Mathematics.read less
- Component ID:
- To Cite:
- TARC Citation Guide EndNote