Browse > Article

Image Encryption using Complemented MLCA based on IBCA and 2D CAT  

Nam, Tae-Hee (Dept. of Biomedical Engineering, Dongju College University)
Kim, Seok-Tae (Division of Electronic, Computer and Telecommunication Engineering, Pukyung National University)
Cho, Sung-Jin (Division of Mathematical Sciences, Pukyung National University)
Publication Information
Abstract
In this paper we propose a new image encryption method which utilizes Complemented MLCA(Complemented Maximum Length Cellular Automata) based on IBCA(Intermediate Boundary CA) and 2D CAT(Cellular Automata Transform). The encryption method is processed in the following order. First, Complemented MLCA is used to create a PN (pseudo noise) sequence, which matches the size of the original image. And, the original image goes through a XOR operation with the created sequence to convert the image into Complemented MLCA image. Then, the gateway value is set to produce a 2D CAT basis function. The produced basis function is multiplied by the encrypted MLCA image that has been converted to process the encipherment. Lastly, the stability analysis and PSNR(Peak Signal to Noise Ratio) verifies that the proposed method holds a high encryption quality status.
Keywords
Maximum Length; CAT(Cellular Automata Transform); IBCA(Intermediate Boundary Cellular Automata); Gateway values; Complemented MLCA(Maximum Length Cellular Automata);
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 서동환, 김수중, "가상 위상 영상을이용한 잡음 및 변이에 강한 암호화 시스템", 전자공학회 논문지, 제40권 SD 제9호, Sep. 2003
2 J. Scharinger, "Fast encryption of image data using chaotic Kolmogorov Flows", J. Electron Image, Vol. 2, No. 2, pp. 318-325, Apr. 1998
3 N.K. Pareek, "Image encryption using chaotic logistic map", Image and Vision Computing, Feb. 2006
4 C. Charles, "A Practical Approach to Using Visual Cryptography in Technical Drawing Environments", Masters Thesis, Florida State University, Dec. 1997
5 A. Menezes, P. Oorschot, and S. Vanstone, "Handbook of Applied Cryptography", CRC Press, 1997
6 박성호, 최현준, 서영호, 김동욱, "DCT-기반 영상/비디오 보안을 위한 암호화 기법 및 하드웨어 구현", 전자공학회논문지, Vol. 42, SP No. 2, pp. 27-36, Mar. 2005   과학기술학회마을
7 X. Tong, "Image encryption with compound chaotic sequence cipher shifting dynamically", Image and Vision Computing, Sep. 2007
8 O. Lafe, "Cellular Automata Transforms: Theory and Application in Multimedia Compression, Encryption, and Modeling", Kluwer Academic Publishers, Boston/Dordrecht/London, 2000
9 홍도원, 장구영, 박태준, 정교일, "유비쿼터스 환경을 위한 암호 기술 동향",전자통신동향분석 제20권 제1호, Feb. 2005
10 R. Want, and G. Borriello, "Survey on Information Appliances", IEEE Compute Graphics and Applications, Vol. 20 Issue 3, May-Jun. 2000
11 J. Giesl, "Image encryption based on strange attractor", ICGST-GVIP Journal, Vol. 9, Issue (II), Apr. 2009
12 S.J. Cho, U.S. Choi, H.D. Kim, Y.H. Hwang, J.G. Kim, and S.H. Heo, "New synthesis of One-Dimensional 90/150 Linear Hybrid Group Cellular Automata", IEEE Transactions on computer-aided design of integrated circuits and systems, Vol. 26, No. 9, pp. 1720-1724, Aug. 2007   DOI   ScienceOn
13 K.W. Wong, "Fast image encryption scheme based on chaotic standard map", Physics Letters A, Dec. 2007
14 A.K. Das, "Additive Cellular Automata : Theory and application as a built-in self-test structure", Ph D thesis, I.I.T., Kharagpur, India, 1990
15 , "다해상도 특성을 갖는 2D 셀룰러 오토마타변환을 이용한 디지탈 워터마킹", 한국통신학회논문지, Vol. 34, No. 1, pp. 105-112, Jan. 2009
16 B. Schneier, "Applied Cryptography: Second Edition",Wiley Computer Publishing, John Wiley & Sons, Inc, 1996