2021
DOI: 10.5755/j01.itc.50.1.28012
|View full text |Cite
|
Sign up to set email alerts
|

A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing

Abstract: The transmission of significant masses of sensitive and secret images over a public network is inevitable, and demands effective tools and technology to safeguard and conceal the data. In this paper, a symmetric multiple color image encryption technique is proposed by adopting a dual permutation and dual substitution framework. Firstly, the input images are combined into a large image and then segmented into many small and equal-sized pure-image elements. Secondly, using the elementary cellular automata Rule-3… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 41 publications
(67 reference statements)
0
3
0
Order By: Relevance
“…An image encryption technique aims to change an original idea into an obscure one. Most security measures in healthcare digital image technologies are based on well-known encryption algorithms, including AES, DES, RSA, and IDEA [35].…”
Section: Effective Steganography Propertiesmentioning
confidence: 99%
“…An image encryption technique aims to change an original idea into an obscure one. Most security measures in healthcare digital image technologies are based on well-known encryption algorithms, including AES, DES, RSA, and IDEA [35].…”
Section: Effective Steganography Propertiesmentioning
confidence: 99%
“…The approach proposed in [ 28 ] combines chaotic systems with particle swarm optimization algorithm to improve the security of color image encryption. In [ 29 ], a dual permutation and dual substitution framework that utilizes cellular automata, chaos theory and image mixing is proposed for color image encryption. The work in [ 30 ] proposes an Enhanced Logistic Map (ELM) that can be combined with chaotic maps and simple encryption techniques to improve the security of cipher images.…”
Section: Introductionmentioning
confidence: 99%
“…Choi et al combined chaotic maps and cellular automata for encryption [ 21 , 22 ]. Sundarakrishnan et al used chaotic mapping and cellular automata to encrypt color images, increased the key space, and used a double permutation and replacement framework, which significantly reduced the correlation and improved the security of the algorithm [ 23 ]. Based on the advantage of chaos theory to encryption, many scholars began to use multiple chaotic systems in the encryption framework.…”
Section: Introductionmentioning
confidence: 99%