Image encryption method based on Elementary Cellular Automata

Author(s):  
Jin Jun
TEM Journal ◽  
2021 ◽  
pp. 546-553
Author(s):  
Dana S. ALdosarry ◽  
Nouf F. ALotaibi ◽  
Tahani H. AL ghobari ◽  
Ruba M. ALbqumi ◽  
Tahani S. ALharthi ◽  
...  

This paper proposes an image encryption technique for smart phones devices to encrypt images and then upload on the cloud. The process of retrieving and decrypting images will be under full control by the user. Also, if the user wants to retrieve an image, he can retrieve it completely, but not as he needed. Our research can solve two main issues in current mobile applications which will protect photo that will be decrypt by the user only, and will help the user to recover the photo needed. An encryption mechanism based on hybrid between elementary cellular automata (ECA) and RC4 algorithms are used to encrypt images on the smart android mobiles. Experimental results on the application showed that our proposed encryption technique used for image encryption has a good quality en cryption with secure requirements.


2015 ◽  
Vol 764-765 ◽  
pp. 992-996
Author(s):  
Arum Sulgi Cho ◽  
Xiao Wei Li ◽  
Sung Jin Cho ◽  
Seok Tae Kim

In this paper, we propose a video image encryption approach by using maximum length cellular automata (MLCA) methods. First, the plane images of video of the encryption method are obtained by dividing frame units. Then the XOR operation and Arnold transform are applied to each of RGB plane images. Lastly, the encryption image is encrypted by the basis image of MLCA. To demonstrate the usefulness of the proposed method, we carry out preliminary experiments and present the experimental results. The experimental results show that the proposed method provides high security.


2015 ◽  
Vol 26 (01) ◽  
pp. 1450069 ◽  
Author(s):  
A. Martín Del Rey ◽  
G. Rodríguez Sánchez

A novel encryption algorithm to cipher digital images is presented in this work. The digital image is rendering into a three-dimensional (3D) lattice and the protocol consists of two phases: the confusion phase where 24 chaotic Cat maps are applied and the diffusion phase where a 3D cellular automata is evolved. The encryption method is shown to be secure against the most important cryptanalytic attacks.


2014 ◽  
Vol 981 ◽  
pp. 372-375 ◽  
Author(s):  
Tie Jun Zhang ◽  
I.M. Manhrawy ◽  
A.A. Abdo ◽  
A.A. Abd El-Latif ◽  
R. Rhouma

An image encryption based on elementary cellular automata was proposed in [Yu Xiao yang etal., International Journal of Security and Its Applications Vol.7, No.5 (2013), pp.397-406.]. In this paper, we analyze the security weaknesses of their algorithm. Based on the given analysis, it is demonstrated that the scheme under study can be broken by various attacks (Chosen Plaintext and Chosen ciphertext attacks).


2010 ◽  
Vol 19 (3) ◽  
pp. 243-262
Author(s):  
Jiang Zhisong ◽  
◽  
Qin Dakang ◽  

Sign in / Sign up

Export Citation Format

Share Document