Double image compression and encryption scheme using logistic mapped convolution and cellular automata

被引:33
作者
Hanis, S. [1 ]
Amutha, R. [1 ]
机构
[1] SSN Coll Engn, Dept Elect & Commun, Chennai, Tamil Nadu, India
关键词
Cellular automata; Chaotic logistic mapping; Convolution; Compression; Diffusion; Encryption; TRANSFORMS; SYSTEM; MAPS;
D O I
10.1007/s11042-017-4606-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the availability and increased usage of multimedia applications, features such as compression and security has gained more importance. Here, we propose a key generation algorithm and a double image encryption scheme with combined compression and encryption. The keys for encryption are generated using a novel modified convolution and chaotic mapping technique. First, the four least significant bits of the two images were truncated and then combined after permutation using the proposed logistic mapping. Also, cellular automata based diffusion is performed on the resultant image to strengthen the security further. Here, both confusion and diffusion seem to be integrated thus improvising the encryption scheme. The performance results and the test of randomness of the key and the algorithm were found to be successful. Since two images are compressed and encrypted simultaneously, it is useful in real - time scenarios.
引用
收藏
页码:6897 / 6912
页数:16
相关论文
共 30 条
[1]   A new image encryption scheme based on cyclic elliptic curve and chaotic system [J].
Abd El-Latif, Ahmed A. ;
Li, Li ;
Niu, Xiamu .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) :1559-1584
[2]   A cryptosystem based on elementary cellular automata [J].
Abdo, A. A. ;
Lian, Shiguo ;
Ismail, I. A. ;
Amin, M. ;
Diab, H. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (01) :136-147
[3]   Multi-scale local structure patterns histogram for describing visual contents in social image retrieval systems [J].
Ahmad, Jamil ;
Sajjad, Muhammad ;
Rho, Seungmin ;
Baik, Sung Wook .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (20) :12669-12692
[4]   A secure wifi system for wireless networks: An experimental evaluation [J].
Aljawarneh S. ;
Masadeh S. ;
Alkhateeb F. .
Network Security, 2010, 2010 (06) :6-12
[5]   Cloud Security Engineering: Avoiding Security Threats the Right Way [J].
Aljawarneh, Shadi .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (02) :64-70
[6]   Investigations of automatic methods for detecting the polymorphic worms signatures [J].
Aljawarneh, Shadi A. ;
Moftah, Raja A. ;
Maatuk, Abdelsalam M. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 60 :67-77
[7]   Image encryption via discrete fractional Fourier-type transforms generated by random matrices [J].
Annaby, M. H. ;
Rushdi, M. A. ;
Nehary, E. A. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2016, 49 :25-46
[8]   An authenticated image encryption scheme based on chaotic maps and memory cellular automata [J].
Bakhshandeh, Atieh ;
Eslami, Ziba .
OPTICS AND LASERS IN ENGINEERING, 2013, 51 (06) :665-673
[9]   Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata [J].
Chen, Rong-Jian ;
Horng, Shi-Jinn .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2010, 25 (06) :413-426
[10]   A new chaos-based image encryption system [J].
El Assad, Safwan ;
Farajallah, Mousa .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2016, 41 :144-157