Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
CAA Decoder for Cellular Automata Based Byte Error Correcting Code
IEEE Transactions on Computers
Image compression and encryption using tree structures
Pattern Recognition Letters - special issue on pattern recognition in practice V
Large encrypting binary images with higher security
Pattern Recognition Letters
On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata
IEEE Transactions on Computers
Comments on "Theory and Applications of Cellular Automata in Cryptography"
IEEE Transactions on Computers
Image security system using recursive cellular automata substitution
Pattern Recognition
Attacks on the RC4 stream cipher
Designs, Codes and Cryptography
ICMCS '99 Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems - Volume 02
A parallel implementation of the SCAN language
Computer Languages
Cellular automata-based pseudorandom number generators for built-in self-test
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
A new 1D chaotic system for image encryption
Signal Processing
Hi-index | 0.01 |
This paper presents a novel SCAN-CA-based image security system which belongs to synchronous stream cipher. Its encryption method is based on permutation of the image pixels and replacement of the pixel values. Permutation is done by scan patterns generated by the SCAN approach. The pixel values are replaced using the recursive cellular automata (CA) substitution. The proposed image encryption method satisfies the properties of confusion and diffusion as the characteristics of SCAN and CA substitution are flexible. The salient features of the proposed image encryption method are lossless, symmetric private key encryption, very large number of secret keys, key-dependent permutation, and key-dependent pixel value replacement. Simulation results obtained using some color and gray-level images clearly demonstrate the strong performance of the proposed SCAN-CA-based image security system.