Skip to main content

Image Encryption with Parallel Evolution of 2-D Cellular Automata

  • Conference paper
  • First Online:
Proceedings of the Seventh International Conference on Mathematics and Computing

Abstract

The paper introduces an image encryption scheme using two-dimensional Cellular Automata (CA). The random evolution of CA along with masking makes the scheme secure as well as very well suited for software encryption. Interestingly, the model has achieved a noticeable speedup using a window-based parallel implementation of CA. Security analysis has been performed and the results show that the scheme with high diffusion and confusion is strong against correlation and differential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons, Fractals 21(3):749–761

    Article  MathSciNet  Google Scholar 

  2. Maniccam SS, Bourbakis NG (1999) Scan based lossless image compression and encryption. In: Proceedings 1999 international conference on information intelligence and systems (Cat. No.PR00446), pp 490–499

    Google Scholar 

  3. Li X, Knipe J, Cheng H (1997) Image compression and encryption using tree structures1this research is supported in part by motorola wireless data group and the canadian natural sciences and engineering research council under grant ogp9198.1. Pattern Recogn Lett 18(11):1253–1259

    Google Scholar 

  4. Jin J (2009) Image encryption method based on elementary cellular automata. IEEE southeastcon 2009:345–349

    Google Scholar 

  5. Wolfram S (1986) Cryptography with cellular automata. In: Williams HC (ed) Advances in cryptology – CRYPTO ’85 proceedings. Springer, Berlin, pp 429–432

    Chapter  Google Scholar 

  6. Xuelong Z, Qianmu L, Manwu X, Fengyu L (2005) A symmetric cryptography based on extended cellular automata. In: 2005 IEEE international conference on systems, man and cybernetics, vol 1, pp 499–503

    Google Scholar 

  7. Chen R-J, Lai J-L (2007) Image security system using recursive cellular automata substitution. Pattern Recogn 40(5):1621–1631

    Article  Google Scholar 

  8. Perales JCM, de Cómputo ES (2015) Color image encryption by cellular automata

    Google Scholar 

  9. Alvarez G, Hernandez A, Hernandez L, Martin A, Rodriguez G (2005) A new graphic cryptosystem based on one-dimensional memory cellular automata. In: Proceedings 39th annual 2005 international carnahan conference on security technology, pp 200–203

    Google Scholar 

  10. Maleki F, Mohades A, Hashemi SM, Shiri ME (2008) An image encryption system by cellular automata with memory. In: 2008 third international conference on availability, reliability and security, pp 1266–1271

    Google Scholar 

  11. Yu L, Li Y, Xia X (2008) Image encryption algorithm based on self-adaptive symmetrical-coupled toggle cellular automata. In: 2008 Congress on image and signal processing, vol 3, pp 32–36

    Google Scholar 

  12. Chaudhuri PP, Chowdhury DR, Nandi S, Chattopadhyay S (1997) Additive cellular automata: theory and applications, vol 43. Wiley, New York

    MATH  Google Scholar 

  13. Wang Y, Zhao Y, Zhou Q, Lin Z (2018) Image encryption using partitioned cellular automata. Neurocomputing 275:1318–1332

    Article  Google Scholar 

  14. Chen R-J, Chen Y-H, Chen C-S, Lai J-L (2006) Image encryption/decryption system using 2-d cellular automata. In: 2006 IEEE international symposium on consumer electronics, pp 1–6

    Google Scholar 

  15. Choi US, Cho SJ, Kim JG, Kang SW, Kim HD (2020) Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-d chaotic cat map. Multimedia Tools Appl 79:22825–22842

    Article  Google Scholar 

  16. Roy S, Shrivastava M, Pandey CV, Nayak SK, Rawat U (2020) Ievca: an efficient image encryption technique for iot applications using 2-d von-neumann cellular automata. Multimedia Tools Appl 1–39

    Google Scholar 

  17. Brassard G et al (1988) Modern cryptology: a tutorial, vol 325. Springer, Berlin

    MATH  Google Scholar 

  18. Xiao S, Yu ZJ, Deng YS (2020) Design and analysis of a novel chaos-based image encryption algorithm via switch control mechanism. Security and communication networks 2020

    Google Scholar 

  19. Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput Appl 31(1):219–237

    Article  Google Scholar 

  20. Kulsoom A, Xiao D, Abbas SA et al (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and dna complementary rules. Multimedia Tools Appl 75(1):1–23

    Article  Google Scholar 

  21. Pak C, Huang L (2017) A new color image encryption using combination of the 1d chaotic map. Signal Proc 138:129–137

    Article  Google Scholar 

  22. Zhang Y, Chen A, Tang Y, Dang J, Wang G (2020) Plaintext-related image encryption algorithm based on perceptron-like network. Inf Sci 526:180–202

    Article  MathSciNet  Google Scholar 

  23. Zhu K, Lin Z, Ding Y (2019) A new RSA image encryption algorithm based on singular value decomposition. Int J Pattern Recogn Artif Intell 33(01):1954002

    Article  Google Scholar 

  24. Luo Y, Cao L, Qiu S, Lin H, Harkin J, Liu J (2016) A chaotic map-control-based and the plain image-related cryptosystem. Nonlinear Dyn 83(4):2293–2310

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shramona Chakraborty .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chakraborty, S., Kundu, S., Chowdhury, D.R. (2022). Image Encryption with Parallel Evolution of 2-D Cellular Automata. In: Giri, D., Raymond Choo, KK., Ponnusamy, S., Meng, W., Akleylek, S., Prasad Maity, S. (eds) Proceedings of the Seventh International Conference on Mathematics and Computing . Advances in Intelligent Systems and Computing, vol 1412. Springer, Singapore. https://doi.org/10.1007/978-981-16-6890-6_6

Download citation

Publish with us

Policies and ethics