2012
DOI: 10.1016/j.optlaseng.2012.06.002
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption based on elementary cellular automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
38
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 104 publications
(45 citation statements)
references
References 13 publications
0
38
0
Order By: Relevance
“…ELCAs were examined as an alternative ECA based PRNG in data security [24], and CDMA applications [25,36]. In other researches, uses of cycles of length 8 were suggested for encryptions of gray scale images [6, 14,40], thus potential uses of ELCAs of length 8 were argued for image encryption in [25]. In another research, Equal Length Cycle Cellular Automata (ELCCAs) were synthesized as a special case of invertible CAs and were suggested for uses in protein synthesis [11].…”
Section: Comparisons Of Various Solutions For Prngsmentioning
confidence: 99%
“…ELCAs were examined as an alternative ECA based PRNG in data security [24], and CDMA applications [25,36]. In other researches, uses of cycles of length 8 were suggested for encryptions of gray scale images [6, 14,40], thus potential uses of ELCAs of length 8 were argued for image encryption in [25]. In another research, Equal Length Cycle Cellular Automata (ELCCAs) were synthesized as a special case of invertible CAs and were suggested for uses in protein synthesis [11].…”
Section: Comparisons Of Various Solutions For Prngsmentioning
confidence: 99%
“…It was initially the idea of Steven Wolfram who suggested for the first time the use of CA for cryptography in 1985 [12]. After that, several works are proposed in the scientific literature for image encryption including [13][14][15][16][17][18][19]. A combination of both cellular automata and chaos for designing cryptosystems for image security is also proposed where the use of chaotic map is selected in the permutation phase and cellular automata solely in the diffusion phase [20,21,26,42] or the use of both chaotic map and cellular automata in the diffusion phase [22].…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, these algorithms are vulnerable to chosen-plaintext attacks [1,23]. Consequently, many other encryption schemes that are not susceptible to this type of attack have been proposed [3,5,12,13,21].…”
Section: Introductionmentioning
confidence: 99%