LICCA: a lightweight image cipher using 3-D cellular automata

Author(s):  
Manu Shrivastava ◽  
Satyabrata Roy ◽  
Krishna Kumar ◽  
Chirag Vinodkumar Pandey ◽  
Jyoti Grover
2018 ◽  
Vol 150 ◽  
pp. 233-247 ◽  
Author(s):  
Ping Ping ◽  
Jinjie Wu ◽  
Yingchi Mao ◽  
Feng Xu ◽  
Jinyang Fan

2021 ◽  
Vol 50 (1) ◽  
pp. 55-75
Author(s):  
K SundaraKrishnan ◽  
RAJA SP ◽  
JAISON B

The transmission of significant masses of sensitive and secret images over a public network is inevitable, and demands effective tools and technology to safeguard and conceal the data. In this paper, a symmetric multiple color image encryption technique is proposed by adopting a dual permutation and dual substitution framework. Firstly, the input images are combined into a large image and then segmented into many small and equal-sized pure-image elements. Secondly, using the elementary cellular automata Rule-30, these pure-image elements are permuted to obtain mixed-image elements. Thirdly, second-level permutation is undertaken on the mixed-image elements by applying zigzag pattern scanning. Fourthly, pixel values are substituted by employing the circular shift method; subsequently, second-level pixel substitution is realized through using chaotic random sequences from a 2D logistic map. Finally, the big encrypted image is segmented into smaller encrypted images. Additionally, the keys are calculated from the input images to attain input sensitivity. The efficiency of this method is quantified, based on the unified average changing intensity (UACI), information entropy, number of pixels change rate (NPCR), key sensitivity, key space, histogram, peak signal-to-noise ratio (PSNR) and correlation coefficient (CC) performance metrics. The outcome of the experiments and a comparative analysis with two similar methods indicate that the proposed method produced high security results.


2001 ◽  
Vol 11 (PR3) ◽  
pp. Pr3-205-Pr3-212
Author(s):  
G. Ch. Sirakoulis ◽  
I. Karafyllidis ◽  
A. Thanailakis
Keyword(s):  

1998 ◽  
Vol 4 (4) ◽  
pp. 49-54
Author(s):  
V.А. Val'kovskii ◽  
◽  
D.D. Zerbino ◽  
Keyword(s):  

2014 ◽  
Vol 2014 (1) ◽  
pp. 37-44 ◽  
Author(s):  
Arighna Sarkar ◽  
◽  
Debarka Mukhopadhyay ◽  

Author(s):  
Mohd Javed ◽  
Khaleel Ahmad ◽  
Ahmad Talha Siddiqui

WiMAX is the innovation and upgradation of 802.16 benchmarks given by IEEE. It has numerous remarkable qualities, for example, high information rate, the nature of the service, versatility, security and portability putting it heads and shoulder over the current advancements like broadband link, DSL and remote systems. Though like its competitors the concern for security remains mandatory. Since the remote medium is accessible to call, the assailants can undoubtedly get into the system, making the powerless against the client. Many modern confirmations and encryption methods have been installed into WiMAX; however, regardless it opens with up different dangers. In this paper, we proposed Elliptic curve Cryptography based on Cellular Automata (EC3A) for encryption and decryption the message for improving the WiMAX security


Sign in / Sign up

Export Citation Format

Share Document