2016
DOI: 10.1007/s11071-016-2912-0
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption scheme combining chaos-memory cellular automata and weighted histogram

Abstract: This paper presents a new symmetric scheme for enciphering digital images. The proposal is based on the combination of chaos and cellular automata (CA) under the scenarios of one round enciphering/deciphering and permutation-diffusion architecture. All the generated key-streams in the proposed cryptosystem are based on the use of an improved one-dimensional (1D) chaotic system [i.e., logistictent system (LTS)] with excellent chaotic properties.These key-streams are related to both the secret key and the charac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(21 citation statements)
references
References 44 publications
0
21
0
Order By: Relevance
“…[25] used the quadtree decomposition strategy for decomposing the image into several blocks at multiple levels and then reversible memory cellular automata (MCA) are used to induce confusion and diffusion in the original image. In [26], a mixture of chaos-based systems and CA is used for image encryption along with the quadtree decomposition strategy. Secret key streams are generated using LTS chaotic sequences, and an improved (one-dimensional) 1D chaotic system is used for bit level permutation in confusion phase.…”
Section: Introductionmentioning
confidence: 99%
“…[25] used the quadtree decomposition strategy for decomposing the image into several blocks at multiple levels and then reversible memory cellular automata (MCA) are used to induce confusion and diffusion in the original image. In [26], a mixture of chaos-based systems and CA is used for image encryption along with the quadtree decomposition strategy. Secret key streams are generated using LTS chaotic sequences, and an improved (one-dimensional) 1D chaotic system is used for bit level permutation in confusion phase.…”
Section: Introductionmentioning
confidence: 99%
“…They are maximum deviation (MaxD), irregular deviation (IDev) and deviation from uniform histogram (DHist) which were calculated using the Eqns. (15)- (17). The findings of this analysis are presented in Table 4.…”
Section: Encryption Quality Analysismentioning
confidence: 93%
“…A digital scrambling according to four classes of behaviours proposed by wolfram such as ordered behaviour, periodic behaviour, random or chaotic behaviour and complex behaviour is proposed 15 . This CA is most widely used for diffusion operation and confusion process has been carried out with logistic map and chaos memory combinations [16][17][18] . Considering the earlier works, the proposed work combines CA and IWT in an attempt to study the efficiency with chaotic maps or attractors.…”
Section: Introductionmentioning
confidence: 99%
“…A novel image encryption algorithm is introduced based on the two-dimensional logistic map and the Latin square image cipher in [6]. An image encryption scheme combining chaos-memory cellular automata and weighted histogram is proposed in [7]. DNA computing in [8][9][10][11] is applied to chaos based image encryption system due to its several good characteristics, such as massive parallelism, huge storage and ultralow power consumption, etc.…”
Section: Introductionmentioning
confidence: 99%