A block-based image encryption scheme using cellular automata with authentication capability
Autor: | Ziba Eslami, Saeideh Kabirirad |
---|---|
Přispěvatelé: | Maltepe Üniversitesi, İnsan ve Toplum Bilimleri Fakültesi |
Jazyk: | angličtina |
Rok vydání: | 2019 |
Předmět: |
Security properties
Cellular automata Authentication Pixel Computer science business.industry Computer Science Interdisciplinary Application Key space Cipher image Encryption Cellular automaton Image encryption Image Encryption Cellular Automata Chaotic Map Computer engineering Robustness (computer science) Chaotic map Computer Science::Multimedia business Bilgisayar Bilimleri Disiplinler Arası Uygulamalar Computer Science::Cryptography and Security |
Zdroj: | Volume: 1, Issue: 2 41-50 Proceedings of International Mathematical Sciences |
ISSN: | 2717-6355 |
Popis: | Cellular automata (CA) are discrete dynamical system formed by a finite array of identical objects called cells. Each cell is endowed with a state which changes at every time-step depending on the states of its adjacent cells at previous time-steps. This feature provides confusion and therefore makes CA attractive in cryptography. This paper presents an authenticated image encryption algorithm based on CA. To accelerate the process, we divide the image into blocks and use a permutation algorithm to apply chaos on the blocks and then use CA-based algorithm to permutate the pixels and change their values simultaneously. The authentication mechanism of our scheme, adjustable to the desired level, can detect slight tampering in the cipher image before full decryption. Furthermore the authentication ability can be adjusted to any desired level. Existing image encryption schemes usually cannot provide parallel processing capability and high sensitivity to changes simultaneously. This study tries to overcome this drawback as well. Our scheme further provides the ability of decryption parts of the cipher image independently from others which is very useful for real time applications. We show that our proposal fulfills desired security properties including large key space, statistical attacks, differential attack and chosen-plaintext attack. |
Databáze: | OpenAIRE |
Externí odkaz: |