Image Encryption Algorithms Based on Non-uniform Second-Order Reversible Cellular Automata with Balanced Rules

Author(s):  
Kai Li ◽  
Mingyu Sun ◽  
Lvzhou Li ◽  
Juhua Chen
2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Shihua Zhou ◽  
Bin Wang ◽  
Xuedong Zheng ◽  
Changjun Zhou

Networks have developed very quickly, allowing the speedy transfer of image information through Internet. However, the openness of these networks poses a serious threat to the security of image information. The field of image encryption has drawn attention for this reason. In this paper, the concepts of 1-dimensional DNA cellular automata and T-DNA cellular automata are defined, and the concept of reversible T-DNA cellular automata is introduced. An efficient approach to encryption involving reversible T-DNA cellular automata as an encryption tool and natural DNA sequences as the main keys is here proposed. The results of a simulation experiment, performance analysis, and comparison to other encryption algorithms showed this algorithm to be capable of resisting brute force attacks, statistical attacks, and differential attacks. It also enlarged the key space enormously. It meets the criteria for one-time pad and resolves the problem that one-time pad is difficult to save.


2011 ◽  
Vol 08 (03) ◽  
pp. 227-241 ◽  
Author(s):  
I. A. ISMAIL ◽  
A. A. ABDO ◽  
M. AMIN ◽  
H. DIAB

Based on memory reversible cellular automata, a new self-adaptive image encryption is proposed in this paper. The self-adaptive encryption is realized by dividing the image data in to equal halves and then encrypting each half of image data using other mutually. We utilize cellular neural network chaotic system as a pseudo-random key sequence generation. Simulation results on some gray level images confirm that the proposed algorithm can be realized easily while guaranteeing high security and sensitivity levels, and other properties such as randomness.


2020 ◽  
Vol 39 (3) ◽  
pp. 4313-4318
Author(s):  
A. Anjalin Sweatha ◽  
K. Mohaideen Pitchai

In cryptography the block ciphers are the mostly used symmetric algorithms. In the existing system the standard S-Box of Advanced Encryption Standard(AES) is performed using the irreducible polynomial equation in table form known as look-up tables(LUTs). For more security purposes, second-order reversible cellular automata based S-box is created. The security aspects of the S-Box used in the AES algorithm are evaluated using cryptographic properties like Strict Avalanche Criteria, Non-Linearity, Entropy, and Common Immunity Bias. The design of S-Box using second-order reversible Cellular Automata is better concerning security and dynamic aspect as compared to the classical S-boxes used Advanced Encryption Standard.


2019 ◽  
Vol 1 (1) ◽  
Author(s):  
AliMohammad Latif ◽  
Zeinab Mehrnahad

In this paper, a new scheme for image encryption is presented by reversible cellular automata. The presented scheme is applied in three individual steps. Firstly, the image is blocked and the pixels are substituted by a reversible cellular automaton. Then, image pixels are scrambled by an elementary cellular automata and finally the blocks are attached and pixels are substituted by an individual reversible cellular automaton. Due to reversibility of used cellular automata, decryption scheme can reversely be applied. The experimental results show that encrypted image is suitable visually and this scheme has satisfied quantitative performance.


Sign in / Sign up

Export Citation Format

Share Document