An efficient image encryption scheme using elementary cellular automata with novel permutation box

被引:0
|
作者
Ashish Kumar
N. S. Raghava
机构
[1] Delhi Technological University,Department of Information Technology
[2] Delhi Technological University,Department of Electronics and Communication Engineering
来源
Multimedia Tools and Applications | 2021年 / 80卷
关键词
Cellular automata; Chaotic map; Confusion; Diffusion; Image encryption;
D O I
暂无
中图分类号
学科分类号
摘要
Digital image communication over public networks requires a high level of security to protect picture elements that represent information. Security is an important and challenging issue that can be solved using cryptography techniques. Generally, image encryption techniques are based on multiple rounds and iterations. In this paper, a secured lightweight cryptosystem is designed based on lookup table operations that reduce computational overhead, resource requirement and power consumption compared to traditional security mechanisms. In this context, one-dimensional elementary cellular automaton has been combined with Henon chaotic map to design a cryptosystem, which can produce unprecedented results in cryptography. Initially, state attractors for rule space are investigated and analyzed in Wolfram’s cellular automata to extract the properties and functional abilities to perform cryptographic operations. A novel algorithm of keyed transposition cipher is applied to digital image in P-Box module to produce shuffled image. Then, the extracted properties of ECA are preserved in a tabular form and further used in the diffusion process. Based on the simulation and comparison with other existing mechanisms, it is evident that the proposed algorithm is promising and obstructive to all kinds of statistical attacks, and it yields security primacy in various areas of cryptography. Encryption/Decryption is based on indexed based lookup tables principal using ECA and can be easily implemented using logic gates. The proposed algorithm provides confidentiality and can be adopted in IoT networks that require lightweight cryptography modules. Experimental results of color and gray images demonstrate flourishing results in the real-time environment of cryptography.
引用
收藏
页码:21727 / 21750
页数:23
相关论文
共 50 条
  • [21] An efficient chaotic image encryption scheme using simultaneous permutation–diffusion operation
    Qingxin Sheng
    Chong Fu
    Zhaonan Lin
    Junxin Chen
    Lin Cao
    Chiu-Wing Sham
    The Visual Computer, 2024, 40 : 1643 - 1658
  • [22] A novel image encryption algorithm using chaos and reversible cellular automata
    Wang, Xingyuan
    Luan, Dapeng
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (11) : 3075 - 3085
  • [23] Image encryption using partitioned cellular automata
    Wang, Yong
    Zhao, Yi
    Zhou, Qing
    Lin, Zehui
    NEUROCOMPUTING, 2018, 275 : 1318 - 1332
  • [24] A Novel Image Encryption Scheme Based on Hyper Chaotic Systems and Fuzzy Cellular Automata
    Zamani, Samaneh
    Javanmard, Mahdi
    Jafarzadeh, Nima
    Zamani, Mostafa
    2014 22ND IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2014, : 1136 - 1141
  • [25] Partial Image Encryption Using Cellular Automata
    Ramirez Torres, Marco Tulio
    Mejla Carlos, Marcela
    Murguia Ibarra, Jose S.
    Ontanon Garcia, Luis Javier
    COMPUTACION Y SISTEMAS, 2019, 23 (04): : 1575 - 1582
  • [26] Increasing the security of image encryption based on intertwining logistic map and elementary cellular automata
    Hosseini, Seyed Alireza
    Kamel, Seyed Reza
    REVISTA PUBLICANDO, 2018, 5 (15): : 18 - 36
  • [27] An Application of Keystream Using Cellular Automata for Image Encryption in IoT
    Wu, Shyi-Tsong
    JOURNAL OF INTERNET TECHNOLOGY, 2023, 24 (01): : 149 - 162
  • [28] RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System
    Alexan, Wassim
    ElBeltagy, Mohamed
    Aboshousha, Amr
    SYMMETRY-BASEL, 2022, 14 (03):
  • [29] EnCash: an Authenticated Encryption scheme using Cellular Automata
    Banerjee, Tapadyoti
    Chowdhury, Dipanwita Roy
    CELLULAR AUTOMATA, ACRI 2020, 2021, 12599 (5-6): : 67 - 79
  • [30] Reverse Iterative Image Encryption Scheme Using 8-layer Cellular Automata
    Zhang, Xing
    Zhang, Hong
    Xu, Chungen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3397 - 3413