Browse > Article

Image Encryption using Non-linear FSR and 2D CAT  

Nam, Tae-Hee (동주대학 의료기공학과)
Cho, Sung-Jin (부경대학교 전자컴퓨터정보통신공학부)
Kim, Seok-Tae (부경대학교 수리과학부)
Abstract
In this paper, we propose the image encryption method which gradually uses NFSR(Non-linear Feedback Shift Register) and 20 CAT(Two-Dimensional Cellular Automata Transform). The encryption method is processed in the following order. First, NFSR is used to create a PN(pseudo noise) sequence, which matches the size of the original image. Then, the created sequence goes through a XOR operation with the original image and process the encipherment. Next, the gateway value is set to produce a 20 CAT basis function. The produced basis function is multiplied by encryption image that has been converted to process the 20 CAT encipherment. Lastly, the results of the experiment which are key space analysis, entropy analysis, and sensitivity analysis verify that the proposed method is efficient and very secure.
Keywords
NFSR; CAT; PN(pseudo noise) sequences; Image Encryption;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 N.K. Pareek, V. Patidar, and K.K. Sud, "Imageencryption using chaotic logistic map", Image and Vision Computing, Feb., 2006.   DOI   ScienceOn
2 L. Zhang, X. Liao, and X. Wang, "An ImageEncryption Approach based on chaotic maps",Chaos, Solitons and Fractals, Sep., 2004   DOI   ScienceOn
3 Q. Zhou, K.W. Wong, X. Liao, T. Xiang, and Y. Hu, "Parallel Image Encryption Algorithm based on discretized chaotic map", Chaos,Solitons and Fractals, Jan., 2007.   DOI   ScienceOn
4 S. Nandi, B.K. Kar, and P.P. Chaudhuri,"Theory and application of cellular automata in cryptography," IEEE Trans. Computer, Vol.43,Dec., 1994.   DOI   ScienceOn
5 A. Uhl, Image and Video Encryption, Springer Science, 2005.
6 A.Menezes,P.Van Oorschot,and S.Vanstone,Handbook of Applied Cryptography , CRC Press, Oct., 1996.
7 이지범, 고형화, "인터리빙과 랜덤 셔플링을 이용한 디지털 영상의 암호화 방법", 한국통신학회논문지. Vol.31, No. 5C, pp.497-502, May, 2006.
8 K.W. Wong, S.H. Kwok, and W.S. Law, "Afast image encryption scheme based on chaotic standard map", Physics Letters A, Dec., 2007.   DOI   ScienceOn
9 홍도원, 장구영, 박태준, 정교일, "유비쿼터스 환경을 위한 암호 기술 동향", 전자통신동향분석,Vol.20, No.1, Feb., 2005.
10 S.J. Cho, U.S. Choi, H.D. Kim, Y.H. Hwang,J.G. Kim, and S.H. Heo, 'New synthesis of One-Dimensional 90/150 Linear Hybrid GroupCellular Automata', IEEE Transactions on computer-aided design of integrated circuits and systems, Vol.26, No.9, pp.1720-1724, Aug., 2007   DOI   ScienceOn
11 G. Chen, Y. Mao, and C. Chui, "Symmetricimage encryption scheme based on 3D chaotic cat maps", Chaos, Solitons & Fractals, Vol.21,No.3, pp.749-761,Sep., 2004.   DOI   ScienceOn
12 서동환, 김수중, "가상 위상 영상을 이용한 잡음 및 변이에 강한 암호화 시스템", 전자공학회논문지, Vol.40, SD No.9, pp.28-35, Sep., 2003.
13 G. Ateniese, C. Blundo, and A. Santis, "ExtendedSchemes for Visual Cryptography,"TheoreticalComputer Science, Vol.250, pp.143-161, Feb.,2001.   DOI   ScienceOn
14 박영일, 김석태, "다해상도 특성을 갖는 2D 셀룰러 오토마타변환을 이용한 디지탈 워터마킹", 한국통신학회논문지, Vol.34, No.1, pp.105-112,Jan., 2009.
15 J. Scharinger, "Fast encryption of image datausing chaotic Kolmogorov Flows", J Electron Image, Vol.2, No.2, pp.318-325, Apr., 1998.