Video Image Encryption Technique Using Maximum-Length Cellular Automata and Arnold’s Cat Map

2015 ◽  
Vol 764-765 ◽  
pp. 992-996
Author(s):  
Arum Sulgi Cho ◽  
Xiao Wei Li ◽  
Sung Jin Cho ◽  
Seok Tae Kim

In this paper, we propose a video image encryption approach by using maximum length cellular automata (MLCA) methods. First, the plane images of video of the encryption method are obtained by dividing frame units. Then the XOR operation and Arnold transform are applied to each of RGB plane images. Lastly, the encryption image is encrypted by the basis image of MLCA. To demonstrate the usefulness of the proposed method, we carry out preliminary experiments and present the experimental results. The experimental results show that the proposed method provides high security.

Recently, security for the image is becoming very important. Image Encryption is the only choice in protecting the digital image by transforming the image into an unreadable format. There are many methods used to protect against unauthorized access. This research proposes a framework for image encryption using Chaos Baker map with SHA-1 algorithm. The Chaotic Baker map is a randomization technique used to make the pixels more shuffled. Key generation is essential part of image encryption, which will be carried out by SHA-1 algorithm. Experimental results show that the proposed method is well suited for high security, key sensitivity and resists various attacks.


2013 ◽  
Vol 284-287 ◽  
pp. 2992-2997 ◽  
Author(s):  
Xiao Wei Li ◽  
Dong Hwan Kim ◽  
Sung Jin Cho ◽  
Seok Tae Kim

Three dimensional (3-D) images encryption schemes can provide feasible and secure for images encryption due to the 3-D properties of images. In this paper, we present a novel 3-D images encryption algorithm by combining use of integral imaging (II) and maximum-length cellular automata (MLCA) as the secret key ciphering for 3D image encryption technique. In this proposed algorithm, a lenslet array first decomposes the 3-D object into 2-D elemental images (EIs) via the pick-up process of II. We encrypt the 2-D EIs with an encryption method based on linear and complemented MLCA. Decryption process is the opposite of operation encryption process: The 2-D EIs is recovered by the MLCA key, 3-D object is reconstructed by the recovered EIs via computational integral imaging (CII) reconstruction. To verify the usefulness of the proposed algorithm, we carry out the computational experiments and present the experimental results for various attacks. Experimental results show that the proposed algorithm can improve the performance of encryption against various attacks due to large key space in MLCA and 3-D characteristic of data redundancy.


Author(s):  
Chao Chen ◽  
Hongying Zhang ◽  
Bin Wu

In view of the problem of cracking easily and partial distortion of images after encryption or decryption, a novel image encryption and decryption algorithm based on Arnod Transform and fractional chaotic is proposed. To begin with, the Arnold transform is used to encrypt. So that the spatial confidence of the original image has been comprehensively disturbed. Secondly, the XOR involving the fractional order chaotic sequence is used to encrypt. The key sequence is dynamically generated to ensure the randomness and difference of key generation. When decryption is required, the first decryption is performed using the key and XOR. Then the second decryption is carried out by using the inverse Arnold transform, and finally the decrypted image is obtained. Experimental results show that the improved algorithm has achieved better performance in encryption and decryption.


2013 ◽  
Vol 284-287 ◽  
pp. 2955-2960 ◽  
Author(s):  
Dong Hwan Kim ◽  
Yong Ri Piao ◽  
Sung Jin Cho ◽  
Seok Tae Kim

A new 3D image encryption method using integral imaging technology and maximum length cellular automata (MLCA) is proposed in this paper. First, an elemental image (EI) is generated by the integral imaging pickup process. The Wolfram rule is then selected and the state transition matrix, T, is created by MLCA. A random number matrix (RNM) is generated according to the MLCA rule. The generated EI and RNM are compared and pixel values are transitioned. Finally, a basis image is generated by another MLCA rule. The basis image is applied by performing a logic bit exclusive-OR (XOR) operation on the final encrypted image. This method changes the basic image information. Using pixel values to visualize image data gives better encryption results than the previous method. The robustness of the encryption method for lost data, including added noise or cropping attacks, was analyzed and the results of encryption method safety test experiments are presented using histograms.


2013 ◽  
Vol 23 (04) ◽  
pp. 1350075 ◽  
Author(s):  
CHENGQING LI ◽  
YUANSHENG LIU ◽  
LEO YU ZHANG ◽  
MICHAEL Z. Q. CHEN

This paper re-evaluates the security of a chaotic image encryption algorithm called MCKBA/ HCKBA and finds that it can be broken efficiently with two known plain-images and the corresponding cipher-images. In addition, it is reported that a previously proposed breaking on MCKBA/HCKBA can be further improved by reducing the number of chosen plain-images from four to two. The two attacks are both based on the properties of solving a composite function involving the carry bit, which is composed of the modulo addition and the bitwise OR operations. Both rigorous theoretical analysis and detailed experimental results are provided.


2020 ◽  
Vol 79 (31-32) ◽  
pp. 22825-22842
Author(s):  
Un Sook Choi ◽  
Sung Jin Cho ◽  
Jin Gyoung Kim ◽  
Sung Won Kang ◽  
Han Doo Kim

TEM Journal ◽  
2021 ◽  
pp. 546-553
Author(s):  
Dana S. ALdosarry ◽  
Nouf F. ALotaibi ◽  
Tahani H. AL ghobari ◽  
Ruba M. ALbqumi ◽  
Tahani S. ALharthi ◽  
...  

This paper proposes an image encryption technique for smart phones devices to encrypt images and then upload on the cloud. The process of retrieving and decrypting images will be under full control by the user. Also, if the user wants to retrieve an image, he can retrieve it completely, but not as he needed. Our research can solve two main issues in current mobile applications which will protect photo that will be decrypt by the user only, and will help the user to recover the photo needed. An encryption mechanism based on hybrid between elementary cellular automata (ECA) and RC4 algorithms are used to encrypt images on the smart android mobiles. Experimental results on the application showed that our proposed encryption technique used for image encryption has a good quality en cryption with secure requirements.


Author(s):  
Suresh. G. B ◽  
V. Mathivanan

<p>New method of secure image encryption and decryption scheme based on the chaos is proposed. There are two steps are followed after the preprocessing step in the proposed system namely, Encryption and Decryption. In preprocessing, images are denoised using median filter. Then the original input images will be encrypted by using the chaos mapping algorithm. At last the original images are retrieved back from the encrypted image by using the key that is specified during the encryption process for the decryption of the original images. Then the histogram mapping is done for the encrypted and the decrypted images. The proposed system is tested on well-known images like Lena, Mandrill, Clown and Barbara. The experimental results have demonstrated that the introduced image encryption scheme can achieve high security for practical image encryption.</p>


Sign in / Sign up

Export Citation Format

Share Document