2014
DOI: 10.1142/s0129183114500545
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption with an improved cryptosystem based on a matrix approach

Abstract: This paper carries out the image encryption with a revised and modified cryptosystem based on a rule-90 cellular automaton. For this purpose, we used an appropriate and convenient matrix approach to implement the main components of the encryption system, two indexed families of permutations and a pseudo-random bit generator. Furthermore, we modify the encryption scheme for improving its security. This makes our encryption proposal resist some common attacks, e.g. chosen plain-text attack, and the encryption an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
3

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 21 publications
0
9
0
3
Order By: Relevance
“…In Ref. [8] a preprocessing function was created to exchange the values of the plaintext, based on the pseudo-random number generator, making a modification in its feedback, see Fig. 3.…”
Section: Cellular Automatamentioning
confidence: 99%
“…In Ref. [8] a preprocessing function was created to exchange the values of the plaintext, based on the pseudo-random number generator, making a modification in its feedback, see Fig. 3.…”
Section: Cellular Automatamentioning
confidence: 99%
“…La regla local 90 es clasificada como de clase III [6], lo que quiere decir que es de patrón caótico, por lo que ha sido utilizada para crear generadores de números pseudoaleatorios y criptosistemas [5]. Es una de las reglas de los autómatas celulares elementales, para su cálculo se considera una vecindad de radio uno y dos estados {0,1}, puede ser descrita con la siguiente expresión:…”
Section: Materiales Y Métodos 21 Autómatas Celularesunclassified
“…En la Ref. [5] este generador se modificó para diseñar una función de procesamiento, capaz de intercambiar los coeficientes de pixeles idénticos, por valores diferentes en función del tiempo. Es totalmente reversible gracias a la regla local 90 y a las retroalimentaciones que utiliza.…”
Section: Generador De Números Pseudoaleatorios Y Función De Procesamiunclassified
See 1 more Smart Citation
“…The encryption system considered in this implementation is based on the synchronization of the cellular automaton rule 90 [9]. This cryptosystem is named ESCA (for short) and it has been validated and implemented for image encryption in [6,7]. The ESCA system can be considered secure for images encryption but latency time is too high to incorporate it in real-time applications.…”
Section: Introductionmentioning
confidence: 99%