2019
DOI: 10.13053/rcs-148-10-13
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption System Based on Cellular Automata and S-Box

Abstract: This investigation presents an image encryption system and its security analysis, it is based on cellular automata and a substitution box. The joint of these two techniques, allow to encrypt digital images with a high adjacent redundancy and pass different statistical and differential tests and cryptanalytic attacks. The synchronization phenomenon of cellular automata, is sensitive to initial conditions, therefore has been used in Pseudo Random Number Generators (PRNG) and cryptosystems. In this system, the sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…In this paper, a novel framework was presented, in which the key to solving an NPcomplete problem is obtained; this provides not only authentication but also confidentiality in security services. Another point is that, as shown in Table 1, the framework encrypts different types of files, unlike in [13,37], but similarly, it works with cellular automata. Moreover, the encryption time depends on the file size; in comparison with, [38] is faster and has better avalanche achieved percentages (Table 2), so it is better because of the efficiency of the diffusion mechanism.…”
Section: Discussionmentioning
confidence: 99%
“…In this paper, a novel framework was presented, in which the key to solving an NPcomplete problem is obtained; this provides not only authentication but also confidentiality in security services. Another point is that, as shown in Table 1, the framework encrypts different types of files, unlike in [13,37], but similarly, it works with cellular automata. Moreover, the encryption time depends on the file size; in comparison with, [38] is faster and has better avalanche achieved percentages (Table 2), so it is better because of the efficiency of the diffusion mechanism.…”
Section: Discussionmentioning
confidence: 99%