Image encryption using progressive cellular automata substitution and SCAN

被引:19
作者
Chen, RJ [1 ]
Lu, WK [1 ]
Lai, JL [1 ]
机构
[1] Natl United Univ, Dept Elect Engn, Miaoli, Taiwan
来源
2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS | 2005年
关键词
D O I
10.1109/ISCAS.2005.1464931
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a new method for image encryption. Its encryption scheme is based on permutation of the pixels of the image and replacement of the pixel values. The permutation is done by scan patterns generated by the SCAN methodology. The pixel values are replaced using a progressive cellular automata (CA) substitution. The proposed image encryption method satisfies the properties of confusion and diffusion due to the CA substitution is wonderful. The characteristics of the proposed image encryption method are loss-less, symmetric private key encryption, very large number of security keys (number of possible of security keys is large than 109536), key-dependent permutation, and key-dependent pixel value replacement. Simulation results for color images show that the proposed image encryption method works well as our expectation.
引用
收藏
页码:1690 / 1693
页数:4
相关论文
共 8 条
[1]   PICTURE DATA ENCRYPTION USING SCAN PATTERNS [J].
BOURBAKIS, N ;
ALEXOPOULOS, C .
PATTERN RECOGNITION, 1992, 25 (06) :567-581
[2]  
CHUANG T, 1998, ELECT IMAGING, P50356
[3]   Large encrypting binary images with higher security [J].
Chung, KL ;
Chang, LC .
PATTERN RECOGNITION LETTERS, 1998, 19 (5-6) :461-468
[4]   CELLULAR AUTOMATA-BASED PSEUDORANDOM NUMBER GENERATORS FOR BUILT-IN SELF-TEST [J].
HORTENSIUS, PD ;
MCLEOD, RD ;
PRIES, W ;
MILLER, DM ;
CARD, HC .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 1989, 8 (08) :842-859
[5]   Data compression and encryption using cellular automata transforms [J].
Lafe, O .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 1997, 10 (06) :581-591
[6]   Image and video encryption using SCAN patterns [J].
Maniccam, SS ;
Bourbakis, NG .
PATTERN RECOGNITION, 2004, 37 (04) :725-737
[7]   CAA decoder for Cellular Automata based byte error correcting code [J].
Sasidhar, K ;
Chattopadhyay, S ;
Chaudhuri, PP .
IEEE TRANSACTIONS ON COMPUTERS, 1996, 45 (09) :1003-1016
[8]   Fast encryption of image data using chaotic Kolmogorov flows [J].
Scharinger, J .
JOURNAL OF ELECTRONIC IMAGING, 1998, 7 (02) :318-325