2020
DOI: 10.4108/eai.21-6-2021.170238
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption algorithm using chaotic maps and cellular automata

Abstract: Nowadays, some encryption schemes are not sensitive enough to plain-image, which leads to poor robustness and the scheme is vulnerability to attacks. By employing chaotic maps and cellular automata (CA), a novel image encryption algorithm is presented in this work to increase the sensitivity to plain-image and improve the security. Firstly, initial values of the two-dimensional Logistic-Sine-coupling map (2D-LSCM) and the Logistic-Sine-Cosine map (LSC) are calculated by the SHA-256 hash value of original image… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…In the begging, the inputting color image is divided into two equal parts (upper UP and lower LW) with size Sk. Second, using LFSRs that comprise three registers with different lengths (29,31,33) and different taps (2,7,13), (1,2,3), (11,13,22), respectively, key K is generated that contains non-repetitive random numbers with size Sk. The same key is used to redistribute the locations of the pixels in each part.…”
Section: Changing the Pixel's Position (Confusion)mentioning
confidence: 99%
See 3 more Smart Citations
“…In the begging, the inputting color image is divided into two equal parts (upper UP and lower LW) with size Sk. Second, using LFSRs that comprise three registers with different lengths (29,31,33) and different taps (2,7,13), (1,2,3), (11,13,22), respectively, key K is generated that contains non-repetitive random numbers with size Sk. The same key is used to redistribute the locations of the pixels in each part.…”
Section: Changing the Pixel's Position (Confusion)mentioning
confidence: 99%
“…We isolate the image colors that result from the previous stage to the three basic components red, green, and blue (RGB) in the first step. The 3D chaotic maps in (1), (2), and (3) generate three keys (Kr, Kg, Kb), each used to encrypt a specific color. Image data encryption is performed by applying an XOR process between the data of each color, with the key corresponding to where the value of each point is changed in the second step.…”
Section: Changing the Pixel Values (Diffusion)mentioning
confidence: 99%
See 2 more Smart Citations