Image Encryption using Complemented MLCA based on IBCA and 2D CAT

IBCA에 기초한 여원 MLCA와 2D CAT를 이용한 영상 암호화

  • Nam, Tae-Hee (Dept. of Biomedical Engineering, Dongju College University) ;
  • Kim, Seok-Tae (Division of Electronic, Computer and Telecommunication Engineering, Pukyung National University) ;
  • Cho, Sung-Jin (Division of Mathematical Sciences, Pukyung National University)
  • 남태희 (동주대학 의료기공학과) ;
  • 김석태 (부경대학교 전자컴퓨터정보통신공학부) ;
  • 조성진 (부경대학교 수리과학부)
  • Published : 2009.07.25

Abstract

In this paper we propose a new image encryption method which utilizes Complemented MLCA(Complemented Maximum Length Cellular Automata) based on IBCA(Intermediate Boundary CA) and 2D CAT(Cellular Automata Transform). The encryption method is processed in the following order. First, Complemented MLCA is used to create a PN (pseudo noise) sequence, which matches the size of the original image. And, the original image goes through a XOR operation with the created sequence to convert the image into Complemented MLCA image. Then, the gateway value is set to produce a 2D CAT basis function. The produced basis function is multiplied by the encrypted MLCA image that has been converted to process the encipherment. Lastly, the stability analysis and PSNR(Peak Signal to Noise Ratio) verifies that the proposed method holds a high encryption quality status.

본 논문에서는 IBCA(Intermediate Boundary Cellular Automata)에 기반을 둔 여원 MLCA(Maximum Length Cellular Automata)와 2D CAT(Cellular Automata Transform)를 단계적으로 이용하여 영상을 암호화하는 방법을 제안한다. 암호화 방법은 먼저, 여원 MLCA를 이용하여 원 영상의 크기만큼 PN(pseudo noise) 수열을 생성한다. 그리고, 원 영상과 생성된 수열을 XOR 연산하여 여원 MLCA 영상으로 변환한다. 그 후, 게이트웨이 값을 설정하여 2D CAT 기저함수를 생성한다. 생성된 기저 함수를 변환된 여원 MLCA 영상에 곱하여 암호화를 한다. 마지막으로 PSNR(Peak Signal to Noise Ratio) 및 안정성 분석을 통하여 제안한 방법이 높은 암호화 수준의 성질을 가졌음을 검증한다.

Keywords

References

  1. 홍도원, 장구영, 박태준, 정교일, "유비쿼터스 환경을 위한 암호 기술 동향",전자통신동향분석 제20권 제1호, Feb. 2005
  2. 박성호, 최현준, 서영호, 김동욱, "DCT-기반 영상/비디오 보안을 위한 암호화 기법 및 하드웨어 구현", 전자공학회논문지, Vol. 42, SP No. 2, pp. 27-36, Mar. 2005
  3. R. Want, and G. Borriello, "Survey on Information Appliances", IEEE Compute Graphics and Applications, Vol. 20 Issue 3, May-Jun. 2000
  4. 서동환, 김수중, "가상 위상 영상을이용한 잡음 및 변이에 강한 암호화 시스템", 전자공학회 논문지, 제40권 SD 제9호, Sep. 2003
  5. B. Schneier, "Applied Cryptography: Second Edition",Wiley Computer Publishing, John Wiley & Sons, Inc, 1996
  6. A. Menezes, P. Oorschot, and S. Vanstone, "Handbook of Applied Cryptography", CRC Press, 1997
  7. C. Charles, "A Practical Approach to Using Visual Cryptography in Technical Drawing Environments", Masters Thesis, Florida State University, Dec. 1997
  8. J. Scharinger, "Fast encryption of image data using chaotic Kolmogorov Flows", J. Electron Image, Vol. 2, No. 2, pp. 318-325, Apr. 1998
  9. K.W. Wong, "Fast image encryption scheme based on chaotic standard map", Physics Letters A, Dec. 2007
  10. X. Tong, "Image encryption with compound chaotic sequence cipher shifting dynamically", Image and Vision Computing, Sep. 2007
  11. N.K. Pareek, "Image encryption using chaotic logistic map", Image and Vision Computing, Feb. 2006
  12. A.K. Das, "Additive Cellular Automata : Theory and application as a built-in self-test structure", Ph D thesis, I.I.T., Kharagpur, India, 1990
  13. S.J. Cho, U.S. Choi, H.D. Kim, Y.H. Hwang, J.G. Kim, and S.H. Heo, "New synthesis of One-Dimensional 90/150 Linear Hybrid Group Cellular Automata", IEEE Transactions on computer-aided design of integrated circuits and systems, Vol. 26, No. 9, pp. 1720-1724, Aug. 2007 https://doi.org/10.1109/TCAD.2007.895784
  14. O. Lafe, "Cellular Automata Transforms: Theory and Application in Multimedia Compression, Encryption, and Modeling", Kluwer Academic Publishers, Boston/Dordrecht/London, 2000
  15. , "다해상도 특성을 갖는 2D 셀룰러 오토마타변환을 이용한 디지탈 워터마킹", 한국통신학회논문지, Vol. 34, No. 1, pp. 105-112, Jan. 2009
  16. J. Giesl, "Image encryption based on strange attractor", ICGST-GVIP Journal, Vol. 9, Issue (II), Apr. 2009