Browse > Article
http://dx.doi.org/10.3837/tiis.2016.07.029

Reverse Iterative Image Encryption Scheme Using 8-layer Cellular Automata  

Zhang, Xing (School of Computer Sciences and Engineering, Nanjing University of Science & Technology)
Zhang, Hong (School of Computer Sciences and Engineering, Nanjing University of Science & Technology)
Xu, Chungen (School of Science, Nanjing University of Science & Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.7, 2016 , pp. 3397-3413 More about this Journal
Abstract
Considering that the layered cellular automata (LCA) are naturally fit for representing image data in various applications, a novel reverse iterative image encryption scheme based on LCA is proposed. Specifically, the plain image is set as the final configuration of an 8-layer CA, and some sequences derived from a random sequence are set as the pre-final configuration, which ensure that the same plain image will never be encrypted in the same way when encrypted many times. Then, this LCA is backward evolved by following some reversible two order rules, which are generated with the aid of a newly defined T-shaped neighborhood. The cipher image is obtained from the recovered initial configuration. Several analyses and experimental results show that the proposed scheme possesses a high security level and executive performance.
Keywords
Image encryption; layered cellular automata; T-shaped neighborhood; two order rule; reverse iteration;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Priya S S S, KarthigaiKumar P and Mangai N M S et al., "Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes,” Smart Computer Review, vol. 2, no. 6, pp. 379-390, December 2012. Article (CrossRef Link)
2 Mohamed and Faraoun Kamel, "A parallel block-based encryption schema for digital images using reversible cellular automata," Engineering Science and Technology, an International Journal, vol. 17, no. 2, pp. 85-94, 2014. Article (CrossRef Link)   DOI
3 Wang, Xingyuan, and Dapeng Luan, "A novel image encryption algorithm using chaos and reversible cellular automata," Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 11, pp. 3075-3085, 2014. Article (CrossRef Link)   DOI
4 Abdo, A. A., et al., "A cryptosystem based on elementary cellular automata," Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 1, pp. 136-147, 2013. Article (CrossRef Link)   DOI
5 Jin and Jun, "An image encryption based on elementary cellular automata," Optics and Lasers in Engineering, vol. 50, no. 12, pp. 1836-1843, 2012. Article (CrossRef Link)   DOI
6 Wang, Xingyuan, and Dahai Xu, "A novel image encryption scheme using chaos and Langton’s Ant cellular automaton," Nonlinear Dynamics, vol. 79, no. 4, pp. 2449-2456, 2015. Article (CrossRef Link)   DOI
7 Zhang, Xiaoyan, et al., "Image encryption scheme based on balanced two-dimensional cellular automata," Mathematical Problems in Engineering. 2013. Article (CrossRef Link)
8 Ping, Ping, Feng Xu, and Zhi-Jian Wang, "Image encryption based on non-affine and balanced cellular automata," Signal Processing, vol. 105, pp. 419-429, December 2014. Article (CrossRef Link)   DOI
9 Ping, Ping, Wang Zhi-jian, and Feng Xu, "A Two-Dimensional Cellular Automata Based Method for Multiple Image Encryption," in Proc. of International Conference on Computer Science and Service System (CSSS 2014), pp. 525-528, 2014. Article (CrossRef Link)
10 Chen, Rong-Jian, and Jui-Lin Lai, "Image security system using recursive cellular automata substitution," Pattern Recognition, vol. 40, no. 5, pp. 1621-1631, 2007. Article (CrossRef Link)   DOI
11 Zhang, Shuiping, and Huijune Luo, "The research of image encryption algorithm based on chaos cellular automata," Journal of Multimedia, vol. 7, no. 1, pp. 66-73, 2012. Article (CrossRef Link)
12 del Rey, A. Martín, G. Rodríguez Sánchez, and A. de la Villa Cuenca, "Encrypting digital images using cellular automata," Hybrid Artificial Intelligent Systems. Springer Berlin Heidelberg, pp. 78-88, 2012. Article (CrossRef Link)
13 Zamani, Samaneh, et al., "A novel image encryption scheme based on hyper chaotic systems and fuzzy cellular automata," in Proc. of Electrical Engineering (ICEE), 2014 22nd Iranian Conference on. IEEE, 2014. Article (CrossRef Link)
14 Tafti, Ahmad Pahlavan, and Safoura Janosepah, "Digital images encryption in frequency domain based on DCT and one dimensional cellular automata," Informatics Engineering and Information Science. Springer Berlin Heidelberg, pp. 421-427, 2011. Article (CrossRef Link)
15 Bakhshandeh, Atieh, and Ziba Eslami, "An authenticated image encryption scheme based on chaotic maps and memory cellular automata," Optics and Lasers in Engineering, vol. 51, no. 6, pp. 665-673, 2013. Article (CrossRef Link)   DOI
16 Wu, Xiaotian, and Wei Sun, "Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform," Journal of Systems and Software, vol. 86, no. 4, pp. 1068-1088, 2013. Article (CrossRef Link)   DOI
17 Chen, Rong-Jian, and Shi-Jinn Horng, "Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata," Signal Processing: Image Communication, vol. 25, no. 6, pp. 413-426, 2010. Article (CrossRef Link)   DOI
18 Nandi, Subrata, et al., "1-D Group Cellular Automata based Image Encryption Technique," in Proc. of Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014 International Conference on. IEEE, 2014. Article (CrossRef Link)
19 Ping, Ping, Feng Xu, and Zhi-Jian Wang, "Color image encryption based on two-dimensional cellular automata," International Journal of Modern Physics C, vol. 24, no. 10, 2013. Article (CrossRef Link)   DOI
20 Machicao, Jeaneth, Anderson G. Marco, and Odemir Martinez Bruno, "Chaotic encryption method based on life-like cellular automata," Expert Systems with Applications, vol. 39, no. 16, pp. 12626 -12635, 2012. Article (CrossRef Link)   DOI
21 Zhang, Xing, et al., "A New Public Key Encryption Scheme based on Layered Cellular Automata," KSII Transactions on Internet and Information Systems (TIIS), vol. 8, no. 10, pp. 3572-3590, 2014. Article (CrossRef Link)   DOI
22 Ayanzadeh, Ramin, et al., "Multi-layer cellular automata for generating normal random numbers," in Proc. of Electrical Engineering (ICEE), 2010 18th Iranian Conference on. IEEE, 2010. Article (CrossRef Link)
23 Jaberi, Alireza, Ramin Ayanzadeh and Azam S. Zavar Mousavi, "Two-layer cellular automata based cryptography," Trends in applied sciences research, vol. 7, no. 1, pp. 68-77, 2012. Article (CrossRef Link)   DOI
24 Rao, Chinta Somswara, et al., "Implementation of object oriented encryption system using layered cellular automata," International Journal of Engineering Science and Technology (IJEST), vol. 3, no. 7, 2011. Article (CrossRef Link)
25 Kari, Jarkko, "Reversibility of 2D cellular automata is undecidable," Cellular Automata: Theory and Experiment, vol. 45, no. 1-3, pp. 379-385, September 1990. Article (CrossRef Link)
26 Kari, Jarkko, "Reversibility and surjectivity problems of cellular automata," Journal of Computer and System Sciences, vol. 48, no. 1, pp. 149-182, 1994. Article (CrossRef Link)   DOI
27 Das, Debasis, "A survey on cellular automata and its applications," Global trends in computing and communication systems. Springer Berlin Heidelberg, pp. 753-762, 2012. Article (CrossRef Link)
28 Xuewen, Xia, et al., "Data encryption based on multi-granularity reversible cellular automata," in Proc. of Computational Intelligence and Security, 2009. CIS'09. International Conference on. Vol. 2. IEEE, pp. 192-196, 2009. Article (CrossRef Link)