Modern cryptology
Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
CAA Decoder for Cellular Automata Based Byte Error Correcting Code
IEEE Transactions on Computers
Image compression and encryption using tree structures
Pattern Recognition Letters - special issue on pattern recognition in practice V
Large encrypting binary images with higher security
Pattern Recognition Letters
On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata
IEEE Transactions on Computers
Comments on "Theory and Applications of Cellular Automata in Cryptography"
IEEE Transactions on Computers
Finite Dimensional Generalized Baker Dynamical Systems for Cryptographic Applications
EUROCAST '95 Selection of Papers from the Fifth International Workshop on Computer Aided Systems Theory
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
A parallel implementation of the SCAN language
Computer Languages
Cellular automata-based pseudorandom number generators for built-in self-test
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
A novel encryption method with associative approach for gray-scale images
MICAI'12 Proceedings of the 11th Mexican international conference on Advances in Artificial Intelligence - Volume Part I
Design of image cipher using latin squares
Information Sciences: an International Journal
Hi-index | 0.01 |
This paper presents a novel image security system based on the replacement of the pixel values using recursive cellular automata (CA) substitution. This proposed image encryption method exhibits the properties of confusion and diffusion because of the characteristics of CA substitution are flexible. The salient features of the proposed image encryption method are its losslessness, symmetric private key encryption, very large number of secret keys, and key-dependent pixel value replacement. Simulation results obtained using some color and gray-level images clearly demonstrate the strong performance of the proposed image security system.